The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
City logistics seeks to optimize the distribution of goods in urban areas by developing new business models. Such models are not only centered on cost reduction, but also account for reducing the negative impact resulting from city logistics activities. Therefore, environmental aspects or congestion are important factors as well. Through consolidation of goods of different shipper-consignee pairs,...
Interest in City Logistics has been increasing among scholars, the industry, local administrations and various stakeholders. In particular, a number of projects have been developing with the aim of overcoming the negative impact of urban parcel delivery and making it more efficient and sustainable, from both the operations and environmental standpoints. However, most of these initiatives are more...
Biometric binarization is the feature-type transformation that converts a specific feature representation into a binary representation. It is a fundamental issue to transform the real-valued feature vectors to the binary vectors in biometric template protection schemes. The transformed binary vectors should be high for both discriminability and privacy protection when they are employed as the input...
In contrast to electronic travel documents (e.g. ePassports), the standardisation of breeder documents (e.g. birth certificates), regarding harmonisation of content and contained security features is in statu nascendi. Due to the fact that breeder documents can be used as an evidence of identity and enable the application for electronic travel documents, they pose the weakest link in the identity...
While cloud services are becoming more and more widely used, their security issues are noticed by researchers. Multimedia data, especially images, which usually contain a lot of private information, sometimes are carelessly handled by users and the cloud servers as well. There for, it is necessary to protect those outsourced image data. Although data encryption is useful for storage purposes, data...
This paperwork proposes a more economical and efficient Local Public Transport (LPT) transit routes for Rome. Optimization of public transit will result in greater capacity and efficiency for transit users. This proposal is based on real data of the public transit network of Rome, elaborated by an Ant Colony System (ACS) algorithm. The source information has been obtained via recorded phone data of...
Cyberlearning is challenged by the lack of personal and assessment-driven learning, and students are often puzzled by the lack of instructor guidance and feedback; the huge volume and diversity of the learning materials; and the lack of the ability to zoom in from the general concepts to the more specific ones, or the opposite. Knowledge-driven tutoring systems are needed to improve the cyberlearning...
Due to the diffusion of Internet of Things (IoT), many devices such as water meters, smart dumpsters, and many other objects have the capacity to record data. Gathering these data from the devices is a problem that could be solved in three ways: by building a huge network infrastructure, by using regular workforce or by using opportunistic IoT networks, i.e. by using as mobile hotspots the devices...
Delegated authorization protocols have become wide-spread to implement Web applications and services, where some popular providers managing people identity information and personal data allow their users to delegate third party Web services to access their data. In this paper, we analyze the risks related to untrusted providers not behaving correctly, and we solve this problem by proposing the first...
A group of mobile nodes with limited capabilities sparsed in different clusters forms the backbone of Mobile Ad-Hoc Networks (MANET). In such situations, the requirements (mobility, performance, security, trust and timing constraints) vary with change in context, time, and geographic location of deployment. This leads to various performance and security challenges which necessitates a trade-off between...
In this paper, we derive the average and the distribution of message delivery delays in a geographic DTN routing with multiple mobile agents, whose mobility patterns are given by random walks on a graph and message routing algorithm is FIFO (First-In First-Out) algorithm. A geographic DTN routing aims at realization of message delivery among multiple (generally, geographically-dispersed) geographic...
Information flow security has been considered as a critical requirement on complicated component-based software. The recent efforts on the compositional information flow analyses were limited on the expressiveness of security lattice and the efficiency of compositional enforcement. Extending these approaches to support more general security lattices is usually nontrivial because the compositionality...
Security threats from cyber attacks never stop threatening human's social activities. Even though, carrying mobile devices with confidential data is still popular among people without constraint due to business needs and usability. In this paper, we propose an in-depth concealed file system with GPS authentication adaptable for multiple locations in order to mitigate data breaches and file destructions...
With the advent of Web services, service interoperability has always been an active research issue. In recent years, many approaches have been proposed. However, how to achieve fast composition and guarantee correct and executable composite service remains an open issue. For this problem, this paper presents a three-phase framework for accurate and efficient service interoperability. Since service...
In the Internet of Things paradigm, the total number of interconnected smart objects tends to increase in elevate rates in the next years, creating an overload of objects to be controlled and configured by the users themselves. Alternatively, context-aware discovery services have potential to minimize this problem by applying rules to determine which smart objects are more suitable for users, at a...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
Most of latency-sensitive mobile applications require computational resources provided through a cloud computing service. The problem of relying on cloud computing is that, sometimes, the physical locations of cloud servers are distant from mobile users and the communication latency is long. As a result, the concept of distributed cloud service, called mobile edge computing (MEC), is being introduced...
Location-based social networks (LBSNs) are attracting significant attentions, which make location-aware applications prosperous. We proposed the Multiple User-defined Spatial Query (MUSQ) in [1]. However, it is impractical that non-expert users provide exact vectors to denote their preferences in MUSQ. In this paper, we design a group users weight matrix generation algorithm to represent users' preferences...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.