The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We are proposing a layered and scalable WAVE (Wireless Access for Vehicular Environments) security structure for VANET (Vehicular Ad hoc Network) network. The scalability and variable message delivery are provided by using both asymmetric and symmetric encryption algorithm. The whole region is divided into different security domains and the security related load of each domain is distributed evenly...
Recently, hard magnetic materials with strong coercivity force and large squareness ratio have been developed and widely exhausted in the various application fields. Also, soft magnetic materials which used for generating high magnetic flux have been developed in electron and telecommunication engineering area. In order to apply these ferromagnetic materials to electronic and electrical machines,...
In CCN (Content-Centric Networking), one request retrieves at most one data packet. Although the design intent of such rule is to maintain flow balance across the network, it may cause significant underutilization of Data downlink, especially in networks with asymmetric up/down link speed such as cellular networks. This paper describes an adaptive flow control mechanism where multiple Data messages...
In distributed transactional database systems deployed over cloud servers, entities cooperate to form proofs of authorizations that are justified by collections of certified credentials. These proofs and credentials may be evaluated and collected over extended time periods under the risk of having the underlying authorization policies or the user credentials being in inconsistent states. It therefore...
As sensors become ever more prevalent, more and more information will be collected about each of us. A long-term research question is how best to support beneficial uses while preserving individual privacy. Presence systems are an emerging class of applications that support collaboration. These systems leverage pervasive sensors to estimate end-user location, activities, and available communication...
In recent years, there have been significant research efforts related to vehicle-to-vehicle (V2V) communication. The major demand of the V2V communication is originally from safety-related applications; other possible application areas including communication support for traffic management have increased. In this paper, we propose an architectural framework for achieving a vehicle network that employs...
This paper addresses the use of Resource ReSerVation Protocol-Aggregate (RSVP-AGG) at the tactical edge of the Air Force's Airborne Network (AN). Since the AN tactical edge can have different types of stub-networks accessing the AN (i.e., non-IP based legacy networks like Link 16, DiffServ based networks and IntServ based net-works), RSVP-AGG offers a common access approach regardless of the differences...
Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that can imitate a tactical MANET to the highest feasible level of fidelity. For applications, this is achieved by executing unmodified software under...
Testing of applications for ad hoc networks poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that can imitate an ad hoc network. This requires the development of technologies that enable multiple instances of unmodified application software on...
In this paper, we propose a resource management model that extends the contract net protocol by integrating the advantages of the matchmaking technique. Our model addresses the issues of matchmaker overload and the lack of up-to-date resource state information suffered by the original matchmaking model. It also enables resource requesters to obtain a list of qualified resources with which they can...
Layer 2 radio resource allocation schemes being used in mobile ad hoc networks (MANET) do not always take into account the quality of service (QoS) requirements of network traffic. As an example, the current USAP (unifying slot assignment protocol) slot allocation scheme is QoS-unaware. Consequently the scheme could grant available slots to lower priority traffic instead of higher priority traffic...
As open multi-agents systems are getting increasing attentions in building large-scale software systems, the study on agent organizations - a building block of multi-agents systems, becomes a promising research track. Roles as a first class citizen in agent organizations impose an imperious demand for dealing with the major challenge: how agents bind roles in the formation of agent organizations in...
In this paper, we survey recent results in VANET data dissemination. We structure the survey into three broad categories: geocast/broadcast, multicast, and unicast approaches; and describe key ideas of representative technologies in each category. In addition, we consider location service and security issues that are crucial for data dissemination in VANET. We conclude by sharing our thoughts on further...
Congestion control for streaming real-time applications, which need smoothness of the transmission rate, should be transmission control protocol (TCP)-friendly. Moreover, in wireless networks, TCP-friendly congestion control should be based on differentiation of packet losses due to congestion and wireless link error to improve network utilisation. The authors propose a TCP-friendly congestion control...
As the number of agents increases rapidly on the Internet, discovering appropriate service agents with required capabilities for request agents becomes a crucial issue in multi-agent systems. Two major discovering approaches have been developed: centralized matchmaking approaches and distributed bidding approaches. However, the former approaches may suffer the problem of middle agent overload and...
Recently, IEEE 802.11 wireless LAN (WLAN) has emerged as a widely accepted technology for broadband wireless networking. A WLAN handoff operation, which occurs when a wireless station (STA) changes its association from one access point (AP) to another, has not been well understood so far since the mobility has not been a major concern for typical WLAN environments. However, the mobility within WLAN...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.