The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security plays an important role in today's information technology, particularly in wireless and mobile environments due to the lack of pre-deployed infrastructure and the unsuitability of centralized management. Since the encryption technique has been introduced to provide secure communications, it is critical to manage all kinds of keys efficiently when the network size is large or the topology...
Wireless mesh networks constitute an emerging technology that is quickly gaining popularity due to its countless advantages in terms of coverage area and low implementation cost. Wireless mesh networks are also capable of self- organization. The eminent advantage of a self-organized network is its ability to perform network control and management, which reduces both the developmental complexity and...
Recently, Knowledge Discovery Process has proven to be a promising tool for extracting behavioral patterns regarding sensor nodes from wireless vehicular ad hoc and sensor networks. In this paper, we propose a new type of behavioral patterns, which we refer to as Coverage-based Rules, to discovers the correlation among the set of locations monitored by the network. Coverage- base Rules is an extension...
The security of wireless and mobile networks has an important influence on the performance of these networks. As a result, many approaches have been developed to enhance their security. Recently, the technique of trust and reputation evaluation has attracted much interest, since it can evaluate the trustworthiness of nodes in a centralized way. This paper addresses the issue of efficient reputation...
Wireless video sensor networks (WVSN) can retrieve video/images from environment of interest, which can greatly enhance our knowledge of the physical world and pave the way for new applications. Since video signal is sensitive to temporal differences between sensor nodes and sink nodes, time synchronization is a critical service for WVSN. However, the existing wireless sensor network (WSN) time synchronization...
Coverage is one of the fundamental measurements of quality in wireless sensor networks. In order to prolong the network lifetime while maintaining coverage, many node partition algorithms have been developed. In this article, we model coverage problem by a set coverage problem. Based on the density of information, the optimal node partitions are investigated by solving an ILP problem. An intersection...
Dynamic load balancing is a key factor in achieving high performance for large scale distributed simulations on grid infrastructures. In a grid environment, the available resources and the simulationpsilas computation and communication behavior may experience run-time critical imbalances. Consequently, an initial static partitioning should be combined with a dynamic load balancing scheme to ensure...
QoS-aware service management and composition has become an interesting research topic with the rapid development of service oriented architecture (SOA). Differently with Web-services based systems, the emergence of peer-to-peer (P2P) based distributed network technology brings more challenge to the QoS-aware service management and composition. In this paper, we propose our design of a QoS-aware hierarchical...
Dynamic data driven application systems (DDDAS), systems with online simulations models fed with sensorial data from the environment, are increasingly being used for emergency management strategic planning. This paper describes an approach to establish the communication and exchange information among the many subsystems composing a DDDAS using the high level architecture (HLA) infrastructure's services...
As an emergence technology, P2P is spreading to distributed simulation area, and many distributed simulation frameworks have used P2P as the middleware to interconnect their existing single processor's simulators to form distributed environments for simulation execution. In terms of simulation time management, most existing tools use a middleware layer to implement and support time management in a...
Federate migration is a fundamental mechanism for large-scale distributed simulations. It provides the means for simulation load-balancing and thus improves the simulation's overall performance. Given its importance for simulations, several federate migration approaches have been proposed in the literature. Some approaches freeze the entire simulation, others use third-party mechanisms to transport...
Wireless Sensor Networks (WSNs) have proven their success in a variety of applications for monitoring physical and critical environments. However, the streaming nature, limited resources, and the unreliability of wireless communication are among the factors that affect the Quality of Service (QoS) of WSNs. In this paper, we propose a data mining technique to extract behavioral patterns about the sensor...
The development of low-cost image/video sensors has enabled wireless multimedia sensor networks (WMSN). Equipped with the ability to collect images/video streams from surrounding environments, many interesting applications will emerge through the use of WMSN. One of the key targets of a WMSN application is reconstructing the Plenoptic function by using collected images. However, due to the characteristics...
Key management is an important service for providing secure communications when the network size is large or the topology is undergoing frequent changes. In most existing key management schemes, a centralized key certification authority is used; however, it is not suitable for wireless environments due to the networkspsila scalability and the insufficient computation ability of mobile nodes. In this...
With the emergence of massive multiplayer online games (MMOG) and distributed distant learning/e-learning applications, distributed virtual environments (DVE) have received a good deal of attention. As a highly human-computer interacting environment, DVE provides an ideal platform for real-time message exchanges among virtual objects, human-beings. However, consistency and scalability are becoming...
Real Time Strategy Games (RTSG) are a strong test bed for AI research, particularly on the subject of unsupervised learning. They offer a challenging, dynamic environment with complex problems that often have no perfect solutions. Learning classifier systems are rule-based machine learning techniques that rely on a genetic algorithm to discover a knowledge map used to classify an input space into...
Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the entities involved in the communication process do not need to be online at the same time or know each otherpsilas addresses. In order to develop properly a Pub/Sub based Architecture for MANETs, it is essential that designers understand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.