49 results
Search Results
2. Scalable Decentralized Indexing and Querying of Multi-Streams in the Fog.
- Author
-
Dazzi, Patrizio and Mordacchini, Matteo
- Abstract
NOA-AID (Network Overlays for Adaptive information Aggregation, Indexing and Discovery on the fog) is an approach for decentralized indexing, aggregation and discovery of data belonging to streams. It is organized on two network layers. The upper layer is in charge of delivering an information discovery approach by providing a distributed index structure. The lower layer is devoted to resource aggregation based on epidemic protocols designed for highly dynamic environment, well suited to stream-oriented scenarios. It defines a flexible approach to express queries targeting highly heterogeneous data, as well as a self-organizing dynamic system allowing the optimal resolution of queries on the most suitable stream producers. The paper also presents a theoretical study and discusses the costs related to information management operations; it also gives an empirical validation of findings. Finally, it reports an extended experimental evaluation that demonstrated the ability of NOA-AID to be effective and efficient for retrieving information extracted from streams in highly-dynamic and distributed processing architectures. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
3. Design optimization of TTEthernet-based distributed real-time systems.
- Author
-
Tămaş-Selicean, Domiţian, Pop, Paul, and Steiner, Wilfried
- Subjects
REAL-time computing ,ETHERNET ,COMPUTER network protocols ,SCHEDULING software ,ROUTING (Computer network management) ,COMPUTER network architectures - Abstract
Many safety-critical real-time applications are implemented using distributed architectures, composed of heterogeneous processing elements interconnected in a network. Our focus in this paper is on the TTEthernet protocol, a deterministic, synchronized and congestion-free network protocol based on the Ethernet standard and compliant with the ARINC 664 Specification Part 7. TTEthernet is highly suitable for safety-critical real-time applications since it offers separation for messages using the concept of virtual links and supports three time-criticality classes: Time-Triggered (TT), Rate-Constrained (RC) and Best-Effort. In this paper we are interested in the design optimization of TTEthernet networks used to transmit real-time application messages. Given the set of TT and RC messages, and the topology of the network, our approach optimizes the packing of messages in frames, the assignment of frames to virtual links, the routing of virtual links and the TT static schedules, such that all frames are schedulable and the worst-case end-to-end delay of the RC messages is minimized. We propose a Tabu Search-based metaheuristic for this optimization problem. The proposed algorithm has been evaluated using several benchmarks. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
4. Link State Routing Based on Compressed Sensing.
- Author
-
Kargar, Samane, Hendessi, Faramarz, and Gulliver, T. Aaron
- Subjects
NETWORK routing protocols ,COMPRESSED sensing ,MESH networks ,WIRELESS communications ,WAVELET transforms - Abstract
In table routing protocols such as link state routing, every node in the network periodically broadcasts its link state and the state of its neighbors. These routing updates result in the transmission of a large number of packets. Some of these packets contain correlated or even redundant data which could be compressed if there is central management in the network. However, in autonomous networks, each node acts as a router, in which case central coordination is not possible. In this paper, compressed sensing is used to reduce routing traffic overhead. This can be done at nodes which have greater processing capabilities and no power consumption limitations such as backbone nodes in wireless mesh networks. A method is proposed to select a subset of nodes and thus a subset of links to probe their state. The sensed states are encoded to generate a low dimension sampled vector. This compressed link state vector is broadcast to the entire network. Nodes can then reconstruct link states from this vector using side information. Performance results are presented which demonstrate accurate anomaly detection while adapting to topology changes. Further, it is shown that a proper choice of weighting coefficients in the sampling process can improve detection performance. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
5. Topology Update Based on Compressed Sensing in WMNs.
- Author
-
Kargar, Samane and Hendessi, Faramarz
- Subjects
TOPOLOGY ,COMPRESSED sensing ,WIRELESS mesh networks ,NETWORK routing protocols ,COMPUTER network protocols - Abstract
Routing protocols in wireless mesh networks considering its special topology has been an open field for years. Routing methods which are used now could be classified to two groups. Some methods based on common wireless routing protocols with some changes in metrics and other methods based on opportunistic routing methods. In this paper we use the compressed sensing idea to suggest a new topology update protocol for backbone nodes in WMNs. Stable nodes with low probability of failure beside its capability of processing could support a compressed sensing problem for detection of failed links in predefined topology. In our proposed routing method, link states of backbone nodes should be randomly sampled. Then this sampled link states would be coded. All backbone nodes of WMN would be advertised about these codes by some a few nodes which broadcast these codes. So we would have a compressed sense of link states in all nodes. Our proposed verification based reconstruction method could be used in nodes to detection of failed links. Simulation results show that about 60% overhead decrease of routing protocol would be reached by this method with up to 95% probability of correct detection of failed links. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
6. Sleep scheduling with expected common coverage in wireless sensor networks.
- Author
-
Bulut, Eyuphan and Korpeoglu, Ibrahim
- Subjects
WIRELESS sensor networks ,AD hoc computer networks ,DISTRIBUTED algorithms ,COMPUTER network protocols ,SLEEP-wake cycle ,ROUTING (Computer network management) ,NETWORK routing protocols ,SIMULATION methods & models - Abstract
Sleep scheduling, which is putting some sensor nodes into sleep mode without harming network functionality, is a common method to reduce energy consumption in dense wireless sensor networks. This paper proposes a distributed and energy efficient sleep scheduling and routing scheme that can be used to extend the lifetime of a sensor network while maintaining a user defined coverage and connectivity. The scheme can activate and deactivate the three basic units of a sensor node (sensing, processing, and communication units) independently. The paper also provides a probabilistic method to estimate how much the sensing area of a node is covered by other active nodes in its neighborhood. The method is utilized by the proposed scheduling and routing scheme to reduce the control message overhead while deciding the next modes (full-active, semi-active, inactive/sleeping) of sensor nodes. We evaluated our estimation method and scheduling scheme via simulation experiments and compared our scheme also with another scheme. The results validate our probabilistic method for coverage estimation and show that our sleep scheduling and routing scheme can significantly increase the network lifetime while keeping the message complexity low and preserving both connectivity and coverage. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
7. The Impact of Digital Technologies on Public Health in Developed and Developing Countries. 18th International Conference, ICOST 2020, Hammamet, Tunisia, June 24-26, 2020, Proceedings.
- Author
-
Jmaiel, Mohamed, Abdulrazak, Bessam, Aloulou, Hamdi, Jmaiel, Mohamed, Kallel, Slim, and Mokhtari, Mounir
- Subjects
Artificial intelligence ,Expert systems / knowledge-based systems ,Information retrieval ,Network hardware ,Systems analysis & design ,User interface design & usability ,Artificial Intelligence ,Computer Communication Networks ,Computer System Implementation ,Computer and Information Systems Applications ,Information Systems Applications (incl. Internet) ,Internet of Things ,Internet searching ,IoT ,Special Purpose and Application-Based Systems ,User Interfaces and Human Computer Interaction ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,machine learning ,network protocols ,open access ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems - Abstract
Summary: This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
8. Participative Urban Health and Healthy Aging in the Age of AI. 19th International Conference, ICOST 2022, Paris, France, June 27-30, 2022, Proceedings.
- Author
-
Aloulou, Hamdi, Abdulrazak, Bessam, Aloulou, Hamdi, Mokhtari, Mounir, and de Marassé-Enouf, Antoine
- Subjects
Computer vision ,Information retrieval ,Information technology: general issues ,Network hardware ,Software Engineering ,User interface design & usability ,Human-Computer Interaction (HCI) ,Internet of Things (IoT) ,architecture types ,artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer science ,computer systems ,engineering ,internet ,network protocols ,sensors ,signal processing ,software architecture ,software design ,software engineering ,telecommunication systems ,ubiquitous computing ,user interfaces - Abstract
Summary: This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2022, held in Paris, France, in June 2022. The 15 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 33 submissions. They cover topics such as design, development, deployment, and evaluation of AI for health, smart urban environments, assistive technologies, chronic disease management, and coaching and health telematics systems.
9. An overview of the verification of SET.
- Author
-
Bella, Giampaolo, Massacci, Fabio, and Paulson, Lawrence C.
- Subjects
SET (Computer network protocol) ,COMPUTER network protocols ,ELECTRONIC funds transfer security standards ,ELECTRONIC commerce ,DOCUMENTATION ,COMPUTER systems - Abstract
This paper describes the verification of Secure Electronic Transaction (SET), an e-commerce protocol by VISA and MasterCard. The main tasks are to comprehend the written documentation, to produce an accurate formal model, to identify specific protocol goals, and, finally, to prove them. The main obstacles are the protocol’s complexity (due in part to its use of digital envelopes) and its unusual goals involving partial information sharing. Our verification efforts show that the protocol does not completely satisfy its goals, although the flaws are minor. The primary outcome of the project is experience with verification of enormous and complicated protocols. This paper summarizes the project - the details appear elsewhere [11, 12 , 13 ] - focusing on the issues and the conclusions. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
10. 802.11 power-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues.
- Author
-
Anastasi, G., Conti, M., Gregori, E., and Passarella, A.
- Subjects
WIRELESS Internet ,IEEE 802.11 (Standard) ,WIRELESS communications ,COMPUTER network architectures ,ENERGY conservation ,MOBILE computing ,COMPUTER network protocols ,ENERGY consumption ,ENERGY development - Abstract
Nowadays Wi-Fi is the most mature technology for wireless-Internet access. Despite the large (and ever increasing) diffusion of Wi-Fi hotspots, energy limitations of mobile devices are still an issue. To deal with this, the standard 802.11 includes a Power-Saving Mode (PSM), but not much attention has been devoted by the research community to understand its performance in depth. We think that this paper contributes to fill the gap. We focus on a typical Wi-Fi hotspot scenario, and assess the dependence of the PSM behavior on several key parameters such as the packet loss probability, the Round Trip Time, the number of users within the hotspot. We show that during traffic bursts PSM is able to save up to 90% of the energy spent when no energy management is used, and introduces a limited additional delay. Unfortunately, in the case of long inactivity periods between bursts, PSM is not the optimal solution for energy management. We thus propose a very simple Cross-Layer Energy Manager (XEM) that dynamically tunes its energy-saving strategy depending on the application behavior and key network parameters. XEM does not require any modification to the applications or to the 802.11 standard, and can thus be easily integrated in current Wi-Fi devices. Depending on the network traffic pattern, XEM reduces the energy consumption of an additional 20–96% with respect to the standard PSM. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
11. Concurrent Maintenance of Rings.
- Author
-
Li, Xiaozhou, Misra, Jayadev, and Plaxton, C.
- Subjects
PEER-to-peer architecture (Computer networks) ,COMPUTER network architectures ,TOPOLOGY ,MAINTAINABILITY (Engineering) ,COMPUTER network protocols ,COMPUTER networks - Abstract
A central problem for structured peer-to-peer networks is topology maintenance, that is, how to properly update neighbor variables when nodes join or leave the network, possibly concurrently. In this paper, we consider the maintenance of the ring topology, the basisof several peer-to-peer networks, in the fault-free environment. We design, and prove the correctness of, protocols that maintain a bidirectional ring under both joins and leaves. Our protocols update neighbor variables once a membership change occurs. We prove the correctness of our protocols using an assertional proof method, that is, we first identify a global invariant for a protocol and then show that every action of the protocol preserves the invariant. Our protocols are simple and our proofs are rigorous and explicit. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
12. INCP: Practical Wireless Network Coding for Multiple Unicast Sessions.
- Author
-
Shafieinejad, Alireza, Motamedi, Norooz, Hendessi, Faramarz, and Mahdavi, Mojtaba
- Subjects
LINEAR network coding ,WIRELESS mesh networks ,WAVE packets ,LOSSY data compression ,IEEE 802.11 (Standard) - Abstract
In this paper, we propose INCP, inter-flow network coding protocol, for wireless mesh networks. INCP is designed with the concept of Layered Approach. It acts as a distinct layer above the MAC and has close cooperation with IP layer. INCP exploits the opportunities of network coding through multiple unicast sessions to decrease the number of transmissions, thereby increasing the aggregated throughput. Unlike most prior work that is mainly theoretical, INCP addresses the practical issues of network coding such as impact of lossy links, enabling/disabling RTS/CTS mechanism, packet size and its variation. We consider a retransmission mechanism to ensure a reliable broadcasting. We analyze the cost of this approach by providing a theoretical formulation for the amount of required bandwidth for successful broadcasting a coded packet to n neighbors. Further, we examine the coding gain for lossy networks by considering the ETX metric for routing in addition to traditionally shortest-path metric. The results, implemented in ns-3, show that not only INCP increases network throughput, but also improves the fairness of the IEEE 802.11 MAC. Moreover, the gain for real MAC is greater than the theoretical gain in most cases. The performance gain of INCP reaches up to several folds depending on the traffic model and congestion level. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. Provably secure extended chaotic map-based three-party key agreement protocols using password authentication.
- Author
-
Lee, Tian-Fu, Lin, Ching-Ying, Hwang, Tzonelih, and Lin, Chun-Li
- Abstract
This paper presents a novel three-party key agreement protocol using password authentication, which enables each client sharing a long-lived secret only with a trusted server to exchange confidential and authenticated information with another client over an insecure network via the server. The proposed protocol is based on extended chaotic maps and adopts the technique that the clients can publicly exchange the factors for generating the session key without the help of the server such that the numbers of transmissions are reduced. A round-efficient version of the proposed key agreement protocol is also described. Compared to related chaotic map-based approaches, the proposed protocol not only possesses higher security and lower computational cost, but also has fewer transmissions. Additionally, the proposed protocol is proven secure in the random oracle model and realizes optimal in communications. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
14. Frontiers of Combining Systems
- Author
-
Sattler, Uli and Suda, Martin
- Subjects
artificial intelligence ,computer networks ,automated reasoning ,computer systems ,description logics ,formal languages ,formal logic ,constraint solving ,decision procedures ,network protocols ,ontologies ,semantics ,software architecture ,software design ,software engineering ,software quality ,verification and validation ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYA Mathematical theory of computation - Abstract
This book constitutes the refereed proceedings of the 14th International Symposium on Frontiers of Combining Systems, FroCoS 2023, held in Prague, Czech Republic, in September 2023. The symposium was co-located with the 32nd International Conference on Automated Reasoning with Analytic Tableaux and Related Methods, TABLEAUX 2023. The 14 papers presented were thorouhgly reviewed and selected from the 22 high-quality paper submissions. They are grouped in the volume according to the following topic classification: analysis of programs and equations; unification; decidable fragments; frameworks; higher-order theorem proving. This is an open access book.
- Published
- 2023
- Full Text
- View/download PDF
15. Digital Health Transformation, Smart Ageing, and Managing Disability
- Author
-
Jongbae, Kim, Mokhtari, Mounir, Aloulou, Hamdi, Abdulrazak, Bessam, and Seungbok, Lee
- Subjects
architechture types ,Information systems ,Security and privacy ,Human-centered computing ,Applied computing ,Emerging technologies ,Network protocols ,Network algorithms ,Data management systems ,Information storage systems ,Information retrieval ,Information systems applications ,system security ,Network security ,Software and application security ,Data base and storage security ,Human computer interaction ,Ubiquitous and mobile computing ,Life and medical sciences ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design - Abstract
This open access book constitutes the refereed proceedings of the 20th International Conference on Digital Health Transformation and Smart Ageing, ICOST 2023, held in Wonju, South Korea, during July 7–8, 2023. The 18 full papers and 16 short papers included in this book were carefully reviewed and selected from 41 submissions. They were organized in topical sections as follows: IoT and AI Solutions for E-health, Biomedical and Health Informatics, Wellbeing Technologies, Short Contributions: Medical Systems and E-health Solutions and Short Contributions: Wellbeing Technologies.
- Published
- 2023
- Full Text
- View/download PDF
16. ReFormat: Automatic Reverse Engineering of Encrypted Messages.
- Author
-
Wang, Zhi, Jiang, Xuxian, Cui, Weidong, Wang, Xinyuan, and Grace, Mike
- Abstract
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypted input message will typically go through two phases: message decryption and normal protocol processing. These two phases can be differentiated because the corresponding instructions are significantly different. Further, with the help of data lifetime analysis of run-time buffers, we can pinpoint the memory locations that contain the decrypted message generated from the first phase and are later accessed in the second phase. We have developed a prototype and evaluated it with several real-world protocols. Our experiments show that ReFormat can accurately identify decrypted message buffers and then reveal the associated message structure. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
17. An Artificial Chemistry for Networking.
- Author
-
Meyer, Thomas, Yamamoto, Lidia, and Tschudin, Christian
- Abstract
Chemical computing models have been proposed since the 1980ies for expressing concurrent computations in elegant ways for shared memory systems. In this paper we look at the distributed case of network protocol execution for which we developed an online artificial chemistry. In this chemistry, data packets become molecules which can interact with each other, yielding computation networks comparable to biological metabolisms. Using this execution support, we show how to compute an average over arbitrary networking topologies and relate it to traditional forms of implementing load balancing. Our long-term interest lies in the robust implementation, operation and evolution of network protocols, for which artificial chemistries provide a promising basis. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
18. Policy enforcement in stub autonomous domains.
- Author
-
Tsudik, Gene
- Abstract
Interconnection across administrative boundaries prompts the need for comprehensive policy enforcement (i.e., access control) with respect to inter-domain packet traffic. Due to the nature of the communication services they provide, stub and transit domains require different mechanisms for policing inter-domain traffic. This paper addresses the design of a policy enforcement mechanism geared specifically towards stub domains. With the aid of some basic concepts borrowed from
Visa protocol[5], a much more powerful mechanism is developed and analyzed. Protocol implementation and experimental results are discussed. [ABSTRACT FROM AUTHOR]- Published
- 1992
- Full Text
- View/download PDF
19. A multi-layer framework for puzzle-based denial-of-service defense.
- Author
-
Wang, XiaoFeng and Reiter, Michael
- Subjects
COMPUTER crimes ,MANAGEMENT information systems ,COMPUTERS ,MANAGEMENT science research ,COMPUTER security research ,COMPUTER operating systems ,COMPUTER network protocols - Abstract
Client puzzles have been advocated as a promising countermeasure to denial-of-service (DoS) attacks in recent years. However, how to operationalize this idea in network protocol stacks still has not been sufficiently studied. In this paper, we describe our research on a multi-layer puzzle-based DoS defense architecture, which embeds puzzle techniques into both end-to-end and IP-layer services. Specifically, our research results in two new puzzle techniques: puzzle auctions for end-to-end protection and congestion puzzles for IP-layer protection. We present the designs of these approaches and evaluations of their efficacy. We demonstrate that our techniques effectively mitigate DoS threats to IP, TCP and application protocols; maintain full interoperability with legacy systems; and support incremental deployment. We also provide a game theoretic analysis that sheds light on the potential to use client puzzles for incentive engineering: the costs of solving puzzles on an attackers’ behalf could motivate computer owners to more aggressively cleanse their computers of malware, in turn hindering the attacker from capturing a large number of computers with which it can launch DoS attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
20. A Survey of Energy Efficient Network Protocols for Wireless Networks.
- Author
-
Jones, Christine, Sivalingam, Krishna, Agrawal, Prathima, and Chen, Jyh
- Abstract
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern communication infrastructure, energy efficiency will be an important design consideration due to the limited battery life of mobile terminals. Power conservation techniques are commonly used in the hardware design of such systems. Since the network interface is a significant consumer of power, considerable research has been devoted to low-power design of the entire network protocol stack of wireless networks in an effort to enhance energy efficiency. This paper presents a comprehensive summary of recent work addressing energy efficient and low-power design within all layers of the wireless network protocol stack. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
21. Cyber Security
- Author
-
Lu, Wei, Zhang, Yuqing, Wen, Weiping, Yan, Hanbing, and Li, Chao
- Subjects
artificial intelligence ,authentication ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data mining ,data security ,databases ,information retrieval ,network protocols ,network security ,privacy ,signal processing ,telecommunication networks ,telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering - Abstract
This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers presented were carefully reviewed and selected from 51 submissions. The papers are organized according to the following topical sections: data security; privacy protection; anomaly detection; traffic analysis; social network security; vulnerability detection; text classification.
- Published
- 2022
- Full Text
- View/download PDF
22. Participative Urban Health and Healthy Aging in the Age of AI
- Author
-
Aloulou, Hamdi, Abdulrazak, Bessam, de Marassé-Enouf, Antoine, and Mokhtari, Mounir
- Subjects
architecture types ,artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer science ,computer systems ,engineering ,Human-Computer Interaction (HCI) ,internet ,Internet of Things (IoT) ,network protocols ,sensors ,signal processing ,software architecture ,software design ,software engineering ,telecommunication systems ,ubiquitous computing ,user interfaces ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2022, held in Paris, France, in June 2022. The 15 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 33 submissions. They cover topics such as design, development, deployment, and evaluation of AI for health, smart urban environments, assistive technologies, chronic disease management, and coaching and health telematics systems.
- Published
- 2022
- Full Text
- View/download PDF
23. Psychology, Learning, Technology
- Author
-
Limone, Pierpaolo, Di Fuccio, Raffaele, and Toto, Giusi Antonia
- Subjects
artificial intelligence ,cognitive systems ,communication systems ,computer hardware ,computer networks ,data communication systems ,e-learning ,Human-Computer Interaction (HCI) ,information systems ,mobile computing ,network protocols ,online systems ,signal processing ,telecommunication networks ,wireless telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::J Society & social sciences::JN Education::JNV Educational equipment & technology, computer-aided learning (CAL) ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems - Abstract
This open access book constitutes the refereed proceedings of 1st International Workshop on Psychology, Learning, Technology, PLT 2022, Foggia, Italy, during January 2022. The 8 full papers presented here were carefully reviewed and selected from 23 submissions. In addition, one invited paper is also included. Psychology, Learning, ad Technology Conference (PLT2022) aims to explore learning paths that incorporate digital technologies in innovative and transformative ways and the improvement of the psychological and relational life. The conference includes topics about the methodology of application of the ICT tools in psychology and education: from blended learning to the application of artificial intelligence in education; from the teaching, learning, and assessment strategies and practices to the new frontiers on Human-Computer Interaction.
- Published
- 2022
- Full Text
- View/download PDF
24. Computational Science – ICCS 2022
- Author
-
Groen, Derek, de Mulatier, Clélia, Paszynski, Maciej, Krzhizhanovskaya, Valeria V., Dongarra, Jack J., and Sloot, Peter M. A.
- Subjects
artificial intelligence ,communication systems ,computer networks ,computer systems ,computer vision ,correlation analysis ,data mining ,image analysis ,image processing ,machine learning ,network protocols ,neural networks ,numerical methods ,signal processing ,telecommunication systems ,thema EDItEUR::U Computing and Information Technology::UY Computer science ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ,thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYA Mathematical theory of computation ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision - Abstract
The four-volume set LNCS 13350, 13351, 13352, and 13353 constitutes the proceedings of the 22ndt International Conference on Computational Science, ICCS 2022, held in London, UK, in June 2022.* The total of 175 full papers and 78 short papers presented in this book set were carefully reviewed and selected from 474 submissions. 169 full and 36 short papers were accepted to the main track; 120 full and 42 short papers were accepted to the workshops/ thematic tracks. *The conference was held in a hybrid format This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
25. Automated Reasoning
- Author
-
Blanchette, Jasmin, Kovács, Laura, and Pattinson, Dirk
- Subjects
artificial intelligence ,automata theory ,computer hardware ,computer networks ,computer programming ,computer systems ,embedded systems ,formal languages ,formal logic ,logic programming ,network protocols ,semantics ,software architecture ,software design ,software engineering ,theoretical computer science ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYA Mathematical theory of computation ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development - Abstract
This volume, LNAI 13385, constitutes the refereed proceedings of the 11th International Joint Conference on Automated Reasoning, IJCAR 2022, held in Haifa, Israel, in August 2022. The 32 full research papers and 9 short papers presented together with two invited talks were carefully reviewed and selected from 85 submissions. The papers focus on the following topics: Satisfiability, SMT Solving,Arithmetic; Calculi and Orderings; Knowledge Representation and Jutsification; Choices, Invariance, Substitutions and Formalization; Modal Logics; Proofs System and Proofs Search; Evolution, Termination and Decision Prolems. This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
26. Security in Computer and Information Sciences
- Author
-
Gelenbe, Erol, Jankovic, Marija, Kehagias, Dionysios, Marton, Anna, and Vilmos, Andras
- Subjects
architecture types ,artificial intelligence ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data security ,Internet of Things (IoT) ,network protocols ,network security ,signal processing ,software architecture ,software design ,software engineering ,telecommunication networks ,telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues::UBL Legal aspects of IT ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology - Abstract
This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October 2021. The 9 papers presented together with 1 invited paper were carefully reviewed and selected from 21 submissions. The papers focus on topics of security of distributed interconnected systems, software systems, Internet of Things, health informatics systems, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures. This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
27. Handoffs in Cellular Wireless Networks: The Daedalus Implementation and Experience.
- Author
-
Seshan, Srinivasan, Balakrishnan, Hari, and Katz, Randy
- Abstract
Network protocols in cellular wireless data networks must update routes as a mobile host moves between cells. These routing updates combined with some associated state changes are called handoffs. Most current handoff schemes in wireless networks result in data loss or large variations in packet delivery times. Unfortunately, many applications, such as real-time multimedia applications and reliable transport protocols, adapt to long term estimates of end-to-end delay and loss. Violations and rapid fluctuations of these estimates caused by handoff processing often result in degraded performance. For example, loss during handoff adversely affects TCP performance [4], and high packet loss and variable delays result in poor real-time multimedia performance. In this paper, we describe a multicast-based protocol that eliminates data loss and incurs negligible delays during a handoff. The basic technique of the algorithm is to anticipate a handoff using wireless network information in the form of received signal strengths and to multicast data destined for the mobile host to nearby base stations in advance. This routing, combined with intelligent buffering techniques at the base stations, enables very rapid routing updates and eliminates data loss without the use of explicit data forwarding. We have implemented this protocol using IP Multicast and Mobile IP-like routing. In our implementation, handoffs typically take between 8 and 15 ms to complete and result in no data loss. [ABSTRACT FROM AUTHOR]
- Published
- 1997
- Full Text
- View/download PDF
28. Enclosing and monitoring of disaster area boundary using multi-UAV network.
- Author
-
Joshi, Abhishek, Dhongdi, Sarang, Dharmadhikari, Mihir, Mehta, Ojit, and Anupama, K. R.
- Abstract
Flying Ad-Hoc Networks (FANETs) consist of multi-Unmanned Aerial Vehicle (UAV) nodes with ad-hoc networking capabilities. FANETs are increasingly gaining popularity in real-world applications where communication infrastructure is lacking. In this work, an application of FANET in monitoring the geographical spread of a certain type of disaster event has been showcased. For this task, suitable network topology construction algorithms have been developed. Additionally, various protocols of the network protocol stack have been implemented for this FANET. A bespoke co-simulator platform has been developed to simulate this network. The co-simulator platform makes use of a network simulator (NS-3), and robot simulator (Gazebo) interfaced with each other using an interlinking framework of Robot Operating System (ROS). This platform has been used to simulate network topology construction algorithms as well as networking protocols. The proposed FANET has been analyzed for the deployment of an optimum number of drones in the varying profile of disaster event. Also, the temporal analysis has been conducted to showcase the time-effectiveness of the FANET deployment in such cases. For example, if the disaster event is located at 250 m from the Base Station (BS), with a spread of around 70 m radius, the total number of drones required is 16, and the deployment time is merely 4.25 mins. Along with this, a link analysis of the network also has been conducted for calculating throughput. It indicates that the FANET can be utilized for multimedia streaming as there is ample scope for throughput enhancement. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. Smart Technologies for Precision Assembly
- Author
-
Ratchev, Svetan
- Subjects
Computer Applications ,Special Purpose and Application-Based Systems ,User Interfaces and Human Computer Interaction ,Robotics ,Computer and Information Systems Applications ,open access ,artificial intelligence ,computer vision ,hci ,human engineering ,human-computer interaction ,image processing ,manipulators ,mobile robots ,motion planning ,network protocols ,robots ,sensors ,signal processing ,software engineering ,telecommunication networks ,user interfaces ,Information technology: general issues ,Expert systems / knowledge-based systems ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UB Information technology: general issues ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction - Abstract
This open access book constitutes the refereed post-conference proceedings of the 9th IFIP WG 5.5 International Precision Assembly Seminar, IPAS 2020, held virtually in December 2020. The 16 revised full papers and 10 revised short papers presented together with 1 keynote paper were carefully reviewed and selected from numerous submissions. The papers address topics such as assembly design and planning; assembly operations; assembly cells and systems; human centred assembly; and assistance methods in assembly.
- Published
- 2021
- Full Text
- View/download PDF
30. Brain-Inspired Computing
- Author
-
Amunts, Katrin, Grandinetti, Lucio, Lippert, Thomas, and Petkov, Nicolai
- Subjects
artificial intelligence ,communication systems ,computer hardware ,computer networks ,computer programming ,computer systems ,computer vision ,deep learning ,distributed computer systems ,image analysis ,image processing ,machine learning ,network protocols ,neural networks ,signal processing ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications - Abstract
This open access book constitutes revised selected papers from the 4th International Workshop on Brain-Inspired Computing, BrainComp 2019, held in Cetraro, Italy, in July 2019. The 11 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They deal with research on brain atlasing, multi-scale models and simulation, HPC and data infra-structures for neuroscience as well as artificial and natural neural architectures.
- Published
- 2021
- Full Text
- View/download PDF
31. Cyber Security
- Author
-
Lu, Wei, Wen, Qiaoyan, Zhang, Yuqing, Lang, Bo, Wen, Weiping, Yan, Hanbing, Li, Chao, Ding, Li, Li, Ruiguang, and Zhou, Yu
- Subjects
Systems and Data Security ,Computer Communication Networks ,Information Systems Applications (incl. Internet) ,Computer System Implementation ,Cryptology ,Mobile and Network Security ,Data and Information Security ,Computer and Information Systems Applications ,communication channels (information theory) ,communication systems ,computer crime ,computer hardware ,computer networks ,computer security ,computer systems ,cryptography ,data communication systems ,data security ,databases ,network protocols ,network security ,sensors ,signal processing ,telecommunication networks ,telecommunication systems ,telecommunication traffic ,wireless telecommunication systems ,Network hardware ,Information retrieval ,Internet searching ,Systems analysis & design ,Coding theory & cryptology ,Data encryption ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security - Abstract
This open access book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, held in Beijing, China, in August 2020. The 17 papers presented were carefully reviewed and selected from 58 submissions. The papers are organized according to the following topical sections: access control; cryptography; denial-of-service attacks; hardware security implementation; intrusion/anomaly detection and malware mitigation; social network security and privacy; systems security.
- Published
- 2020
- Full Text
- View/download PDF
32. Computer Aided Verification
- Author
-
Lahiri, Shuvendu K. and Wang, Chao
- Subjects
Software Engineering ,Theory of Computation ,Computer Systems Organization and Communication Networks ,Artificial Intelligence ,Information Systems and Communication Service ,Computer Hardware ,Computer Engineering and Networks ,Database Management System ,architecture verification and validation ,artificial intelligence ,computer hardware ,computer networks ,computer programming ,computer systems ,data security ,distributed computer systems ,embedded systems ,formal logic ,linguistics ,model checking ,network protocols ,parallel processing systems ,signal processing ,software architecture ,software design ,software quality ,verification and validation ,Open Access ,Computer science ,Mathematical theory of computation ,Computer networking & communications ,Artificial intelligence ,Computer hardware ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMZ Software Engineering ,bic Book Industry Communication::U Computing & information technology::UY Computer science ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware - Abstract
The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
33. The Impact of Digital Technologies on Public Health in Developed and Developing Countries
- Author
-
Jmaiel, Mohamed, Mokhtari, Mounir, Abdulrazak, Bessam, Aloulou, Hamdi, and Kallel, Slim
- Subjects
Computer Communication Networks ,Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Special Purpose and Application-Based Systems ,Computer System Implementation ,User Interfaces and Human Computer Interaction ,Computer and Information Systems Applications ,open access ,artificial intelligence ,communication systems ,computer vision ,databases ,hci ,human-computer interaction ,image processing ,Internet of Things ,IoT ,machine learning ,network protocols ,sensors ,signal processing ,software architecture ,software design ,telecommunication networks ,telecommunication systems ,user interfaces ,wireless telecommunication systems ,Network hardware ,Artificial intelligence ,Information retrieval ,Internet searching ,Expert systems / knowledge-based systems ,Systems analysis & design ,User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYD Systems analysis & design ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability - Abstract
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: IoT and AI solutions for e-health; biomedical and health informatics; behavior and activity monitoring; behavior and activity monitoring; and wellbeing technology. *This conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
- Full Text
- View/download PDF
34. Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth.
- Author
-
Mare, Shrirang, Sorber, Jacob, Shin, Minho, Cornelius, Cory, and Kotz, David
- Subjects
MEDICAL care ,POPULATION aging ,COMPUTER network protocols ,MOBILE health ,MOBILE communication systems - Abstract
As healthcare in many countries faces an aging population and rising costs, mobile sensing technologies promise a new opportunity. Using mobile health (mHealth) sensing, which uses medical sensors to collect data about the patients, and mobile phones to act as a gateway between sensors and electronic health record systems, caregivers can continuously monitor the patients and deliver better care. Furthermore, individuals can become better engaged in monitoring and managing their own health. Although some work on mHealth sensing has addressed security, achieving strong privacy for low-power sensors remains a challenge. We make three contributions. First, we propose an mHealth sensing protocol that provides strong security and privacy properties at the link layer, with low energy overhead, suitable for low-power sensors. The protocol uses three novel techniques: adaptive security, to dynamically modify transmission overhead; MAC striping, to make forgery difficult even for small-sized Message Authentication Codes; and asymmetric resource requirements, in recognition of the limited resources in tiny mHealth sensors. Second, we demonstrate its feasibility by implementing a prototype on a Chronos wrist device, and evaluating it experimentally. Third, we provide a security, privacy, and energy analysis of our system. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
35. A wrinkle in time: a case study in DNS poisoning.
- Author
-
Berger, Harel, Dvir, Amit Z., and Geva, Moti
- Subjects
INTERNET domain naming system ,POISONING ,POISONS ,INTERNET protocol address ,INTERNET service providers ,COMPUTER networking equipment ,SELF-poisoning - Abstract
The domain name system (DNS) provides a translation between readable domain names and IP addresses. The DNS is a key infrastructure component of the Internet and a prime target for a variety of attacks. One of the most significant threats to DNS' well-being is a DNS poisoning attack in which the DNS responses are maliciously replaced, or poisoned, by an attacker. To identify this kind of attack, we start by an analysis of different kinds of response times. We present an analysis of typical and atypical response times, while differentiating between the different levels of DNS servers' response times, from root servers down to internal caching servers. We successfully identify empirical DNS poisoning attacks based on a novel method for DNS response timing analysis. We then present a system we developed to validate our technique that does not require any changes to the DNS protocol or any existing network equipment. Our validation system tested data from different architectures including LAN and cloud environments and real data from an internet service provider. Our method and system differ from most other DNS poisoning detection methods and achieved high detection rates exceeding 98%. These findings suggest that when used in conjunction with other methods, they can considerably enhance the accuracy of these methods. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) versus QUIC.
- Author
-
Chen, Shan, Jero, Samuel, Jagielski, Matthew, Boldyreva, Alexandra, and Nita-Rotaru, Cristina
- Abstract
Secure channel establishment protocols such as Transport Layer Security (TLS) are some of the most important cryptographic protocols, enabling the encryption of Internet traffic. Reducing latency (the number of interactions between parties before encrypted data can be transmitted) in such protocols has become an important design goal to improve user experience. The most important protocols addressing this goal are TLS 1.3, the latest TLS version standardized in 2018 to replace the widely deployed TLS 1.2, and Quick UDP Internet Connections (QUIC), a secure transport protocol from Google that is implemented in the Chrome browser. There have been a number of formal security analyses for TLS 1.3 and QUIC, but their security, when layered with their underlying transport protocols, cannot be easily compared. Our work is the first to thoroughly compare the security and availability properties of these protocols. Toward this goal, we develop novel security models that permit “layered” security analysis. In addition to the standard goals of server authentication and data confidentiality and integrity, we consider the goals of IP spoofing prevention, key exchange packet integrity, secure channel header integrity, and reset authentication, which capture a range of practical threats not usually taken into account by existing security models that focus mainly on the cryptographic cores of the protocols. Equipped with our new models we provide a detailed comparison of three low-latency layered protocols: TLS 1.3 over TCP Fast Open (TFO), QUIC over UDP, and QUIC[TLS] (a new design for QUIC that uses TLS 1.3 key exchange) over UDP. In particular, we show that TFO’s cookie mechanism does provably achieve the security goal of IP spoofing prevention. Additionally, we find several new availability attacks that manipulate the early key exchange packets without being detected by the communicating parties. By including packet-level attacks in our analysis, our results shed light on how the reliability, flow control, and congestion control of the above layered protocols compare, in adversarial settings. We hope that our models will help protocol designers in their future protocol analyses and that our results will help practitioners better understand the advantages and limitations of secure channel establishment protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
37. Silicon Valley Cybersecurity Conference
- Author
-
Bathen, Luis, Saldamli, Gokay, Sun, Xiaoyan, Austin, Thomas H., and Nelson, Alex J.
- Subjects
artificial intelligence ,blockchain ,classification ,computer crime ,computer networks ,computer security ,computer systems ,computer vision ,cryptography ,data communication systems ,data security ,distributed computer systems ,distributed ledger ,image analysis ,intrusion detection ,machine learning ,network protocols ,network security ,parallel processing systems ,query languages ,thema EDItEUR::U Computing and Information Technology::UR Computer security ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ,thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications - Abstract
This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full papers included in this book were carefully reviewed and selected from 10 submissions. The contributions are divided into the following thematic blocks: Malware Analysis; Blockchain and Smart Contracts; Remote Device Assessment. This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
38. Nordic Artificial Intelligence Research and Development
- Author
-
Zouganeli, Evi, Yazidi, Anis, Mello, Gustavo, and Lind, Pedro
- Subjects
artificial intelligence ,clustering algorithms ,computer security ,computer vision ,correlation analysis ,data handling ,data integration ,engineering ,expert systems ,Human-Computer Interaction (HCI) ,image analysis ,image processing ,integrated data ,machine learning ,network protocols ,software engineering ,unsupervised learning ,thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ,thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQV Computer vision ,thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ,thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ,thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering - Abstract
This book constitutes the refereed proceedings of the 4th Symposium of the Norwegian AI Society, NAIS 2022, held in Oslo, Norway, during May 31–June 1, 2022. The 11 full papers included in this book were carefully reviewed and selected from 17 submissions. They were organized in topical sections as follows: robotics and intelligent systems; ai in cyber and digital sphere; ai in biological applications and medicine; and towards new ai methods. This is an open access book.
- Published
- 2022
- Full Text
- View/download PDF
39. Haptics: Science, Technology, Applications
- Author
-
Seifi, Hasti, Kappers, Astrid M. L., Schneider, Oliver, Drewing, Knut, Pacchierotti, Claudio, Abbasimoshaei, Alireza, Huisman, Gijs, and Kern, Thorsten A.
- Subjects
communication systems ,computer networks ,data communication systems ,haptic interfaces ,human engineering ,Human-Computer Interaction (HCI) ,mobile computing ,mobile devices ,network protocols ,rehabilitation systems ,robotics ,signal processing ,telecommunication networks ,telecommunication systems ,user interfaces ,virtual reality ,wireless telecommunication systems ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYT Image processing ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence - Abstract
This open access book constitutes the proceedings of the 13th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2022, held in Hamburg, Germany, in May 2022. The 36 regular papers included in this book were carefully reviewed and selected from 129 submissions. They were organized in topical sections as follows: haptic science; haptic technology; and haptic applications.
- Published
- 2022
- Full Text
- View/download PDF
40. Electronic Voting
- Author
-
Krimmer, Robert, Volkamer, Melanie, Duenas-Cid, David, Rønne, Peter, and Germann, Micha
- Subjects
artificial intelligence ,communication ,communication systems ,computer crime ,computer hardware ,computer networks ,computer science ,computer security ,computer systems ,computer vision ,cryptography ,data security ,engineering ,fuzzy sets ,internet ,network protocols ,network security ,privacy ,signal processing ,telecommunication systems ,bic Book Industry Communication::G Reference, information & interdisciplinary subjects::GP Research & information: general::GPJ Coding theory & cryptology ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications::UTN Network security ,bic Book Industry Communication::U Computing & information technology::UR Computer security ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware - Abstract
This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.
- Published
- 2022
- Full Text
- View/download PDF
41. Graph Structures for Knowledge Representation and Reasoning
- Author
-
Cochez, Michael, Croitoru, Madalina, Marquis, Pierre, and Rudolph, Sebastian
- Subjects
Artificial Intelligence ,Information Systems Applications (incl. Internet) ,Computer Communication Networks ,Mathematical Logic and Formal Languages ,Computer and Information Systems Applications ,Formal Languages and Automata Theory ,open access ,concept lattices ,data mining ,databases ,fca ,formal concept analysis ,formal languages ,formal logic ,information analysis ,information systems ,knowledge-based system ,model-based reasoning ,network protocols ,ontologies ,Information retrieval ,Internet searching ,Network hardware ,Mathematical theory of computation ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UK Computer hardware::UKN Network hardware ,bic Book Industry Communication::U Computing & information technology::UY Computer science - Abstract
This open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence. The 7 revised full papers presented together with 2 invited contributions were reviewed and selected from 9 submissions. The contributions address various issues for knowledge representation and reasoning and the common graph-theoretic background, which allows to bridge the gap between the different communities.
- Published
- 2021
- Full Text
- View/download PDF
42. Location-independent routing in process network overlays.
- Author
-
Dam, Mads and Palmskog, Karl
- Abstract
In distributed computing, location transparency-the decoupling of objects from their physical location-is desirable in that it can simplify application development and enables efficient resource allocation. Many systems for location transparency are built on TCP/IP. We argue that addressing mobile objects in terms of temporary hosts may not be the best design decision. Object migration makes it necessary to use dedicated routing infrastructures, e.g., location servers, to deliver inter-object messages. This incurs high costs in terms of complexity, overhead, and latency. Here, we defer object overlay routing to a networking layer, by replacing TCP/IP with a location-independent routing scheme which directs messages to destinations determined by flat identifiers instead of IP addresses. Consequently, messages are delivered directly to objects, instead of possibly out-of-date locations. We explore the scheme using a small object-based language with asynchronous message passing, similar to Core Erlang. We provide a standard, network-oblivious operational semantics of this language, and a network-aware semantics which accounts for many aspects of distribution and routing. The main result is that program execution on top of an abstract network of processing nodes connected by asynchronous point-to-point communication channels preserves network-oblivious behavior in a sound and fully abstract way, in the sense of contextual equivalence. This is a novel and strong result for such a low-level model. Previous work has addressed distributed implementations only for fully connected TCP underlays, where contextual equivalence is typically too strong, due to the need for locking to resolve preemption arising from mobility. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
43. Efficient three-party authenticated key agreements based on Chebyshev chaotic map-based Diffie-Hellman assumption.
- Author
-
Lee, Tian-Fu
- Abstract
An efficient and secure three-party authenticated key agreement protocol is proposed to enable two users to establish a common secret key for exchanging confidential and authenticated information with the help of a trusted server. The proposed protocol only employs extended chaotic maps and hash operations, i.e., it does not require a server public key, symmetric cryptosystems, time-consuming modular exponential computations, or time-consuming modular exponential computations and scalar multiplications on elliptic curve. A round-efficient version of the proposed protocol is also implemented by rearranging and sending the messages in parallel. The session security of the proposed protocol is based on the Chebyshev chaotic map-based Diffie-Hellman assumption. Compared to related chaotic map-based approaches, the proposed protocol not only requires lower computational cost, but also has fewer transmissions. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
44. Supercomputing Frontiers
- Author
-
Panda, Dhabaleswar K.
- Subjects
Computer Systems Organization and Communication Networks ,Image Processing and Computer Vision ,Control Structures and Microprogramming ,Input/Output and Data Communications ,Operating Systems ,Information Systems and Communication Service ,Computer Engineering and Networks ,Computer Vision ,Database Management System ,computer hardware ,computer networks ,computer systems ,distributed computer systems ,distributed systems ,embedded systems ,hpc ,image processing ,microprocessor chips ,network protocols ,parallel architectures ,parallel processing systems ,processors ,signal processing ,telecommunication networks ,telecommunication systems ,telecommunication traffic ,open access ,Computer networking & communications ,Image processing ,Computer vision ,Algorithms & data structures ,Distributed databases ,Operating systems ,bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYT Image processing ,bic Book Industry Communication::U Computing & information technology::UM Computer programming / software development::UMB Algorithms & data structures ,bic Book Industry Communication::U Computing & information technology::UL Operating systems - Abstract
This open access book constitutes the refereed proceedings of the 6th Asian Supercomputing Conference, SCFA 2020, which was planned to be held in February 2020, but unfortunately, the physical conference was cancelled due to the COVID-19 pandemic. The 8 full papers presented in this book were carefully reviewed and selected from 22 submissions. They cover a range of topics including file systems, memory hierarchy, HPC cloud platform, container image configuration workflow, large-scale applications, and scheduling.
- Published
- 2020
- Full Text
- View/download PDF
45. Haptics: Science, Technology, Applications
- Author
-
Nisky, Ilana, Hartcher-O’Brien, Jess, Wiertlewski, Michaël, and Smeets, Jeroen
- Subjects
User Interfaces and Human Computer Interaction ,Robotics ,Special Purpose and Application-Based Systems ,Information Systems Applications (incl. Internet) ,Image Processing and Computer Vision ,Computer and Information Systems Applications ,Computer Vision ,communication systems ,computer networks ,data communication systems ,display devices ,engineering ,haptic devices ,haptic interfaces ,human engineering ,Human-Computer Interaction (HCI) ,mobile computing ,network protocols ,robotics ,signal processing ,telecommunication networks ,user interfaces ,virtual reality ,wireless telecommunication systems ,User interface design & usability ,Artificial intelligence ,Expert systems / knowledge-based systems ,Information retrieval ,Internet searching ,Image processing ,Computer vision ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYZ Human-computer interaction::UYZG User interface design & usability ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence::UYQE Expert systems / knowledge-based systems ,bic Book Industry Communication::U Computing & information technology::UN Databases::UNH Information retrieval ,bic Book Industry Communication::U Computing & information technology::UY Computer science::UYT Image processing - Abstract
This open access book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2020, held in Leiden, The Netherlands, in September 2020. The 60 papers presented in this volume were carefully reviewed and selected from 111 submissions. The were organized in topical sections on haptic science, haptic technology, and haptic applications. This year's focus is on accessibility.
- Published
- 2020
- Full Text
- View/download PDF
46. On Designing for Tussle: Future Internet in Retrospect.
- Author
-
Kalogiros, Costas, Kostopoulos, Alexandros, and Ford, Alan
- Abstract
Over the past decades, the fundamental principles of the Internet architecture have not significantly changed. However, Internet evolution and its effects on participants΄ interests have triggered the need for re-defining these design principles. ˵Design for Tussle″ is an aspiration for future network designs, which enables the involved stakeholders to express their possibly conflicting socio-economic preferences on service instances. We performed a series of case studies examining whether established technologies are compatible with this new approach. Using the knowledge gained, we provide canonical examples and help protocol and network designers better to consider how to come up to the problem of ˵designing for tussle″ in order to realize a flexible architecture. Finally, we associate protocol success to adoption and show, using empirical evidences, that carefully embracing the ˵Design for Tussle″ paradigm can outweigh the higher complexity in protocol design. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
47. Performance evaluation of wireless sensor network protocols for industrial applications.
- Author
-
Jeong, Wootae and Nof, Shimon
- Subjects
WIRELESS communications ,COMMUNICATION ,DETECTORS ,ELECTRIC network topology ,INDUSTRIAL applications ,EVALUATION ,TOPOLOGY - Abstract
Recently, distributed wireless microsensor systems have provided more flexible leverage to emerging industrial applications. The tiny distributed wireless microsensor network systems, however, should be designed to overcome various constraints such as limited energy, bandwidth limit, and unexpected failure of communication under disturbances. In addition, their network topologies need to be managed with designated communication protocols. Thus, design of microsensor network protocols still needs to be application-specific. It should be also evaluated through designated tools at each level of networking characteristics. This research describes essential factors that affect the performance of sensor network systems in the design of wireless microsensor network protocols, and presents effective time-based network protocol and performance evaluation tool which are applicable for various protocols in industrial applications. The developed network evaluation tool, called TIE/MEMS, also includes functional comparison with recent protocols proposed for wireless microsensor networks, and provides design guidelines for multi-sensor network systems needed for emerging industrial applications. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
48. Energy-Scalable Protocols for Battery-Operated MicroSensor Networks.
- Author
-
Wang, Alice, Heinzelman, Wendi, Sinha, Amit, and Chandrakasan, Anantha
- Abstract
In wireless sensor networks, the goal is to gather information from a large number of sensor nodes and communicate the information to the end-user, all under the constraint of limited energy resources. Network protocols minimize energy by using localized communication and control and by exploiting computation/communication tradeoffs. In addition, data fusion algorithms such as beamforming aggregate data from multiple sources to reduce data redundancy and enhance signal-to-noise ratios, thus further reducing the required communications. We have developed a sensor network system that uses a localized clustering protocol and beamforming data fusion to enable energy-efficient collaboration. We compare the performance of two beamforming algorithms, the Maximum Power and the Least Mean Squares (LMS) beamforming algorithms, using the StrongARM SA-1100 processor. Results show that the LMS algorithm requires less than one-fifth the energy required by the Maximum Power beamforming algorithm with only a 3 dB loss in performance, thus showing that the LMS algorithm is better suited for energy-constrained systems. We explore the energy-scalability of the LMS algorithm, and we propose an energy-quality scalable architecture that incorporates techniques such as variable filter length, variable voltage supply and variable adaptation time. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
49. TCP-Call Admission Control Interaction in Multiplatform Space Architectures
- Author
-
Georgios Theodoridis, Niovi Pavlidou, Cesare Roseti, and Michele Luglio
- Subjects
Transmission Control Protocol ,Computer science ,Computer Networks and Communications ,Call Admission Control ,lcsh:TK7800-8360 ,Congestion window ,Access control ,Algorithms ,Quality of service ,Satellite communication systems ,Space research ,Wireless networks ,High altitude platform (HAP) systems ,Nonterrestrial wireless architectures ,Network protocols ,lcsh:Telecommunication ,lcsh:TK5101-6720 ,Wireless ,Flexibility (engineering) ,Settore ING-INF/03 - Telecomunicazioni ,Wireless network ,business.industry ,lcsh:Electronics ,Frame (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Computer Science Applications ,Signal Processing ,business ,Computer network - Abstract
The implementation of efficient call admission control (CAC) algorithms is useful to prevent congestion and guarantee target quality of service (QoS). When TCP protocol is adopted, some inefficiencies can arise due to the peculiar evolution of the congestion window. The development of cross-layer techniques can greatly help to improve efficiency and flexibility for wireless networks. In this frame, the present paper addresses the introduction of TCP feedback into the CAC procedures in different nonterrestrial wireless architectures. CAC performance improvement is shown for different space-based architectures, including both satellites and high altitude platform (HAP) systems.
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.