The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the multi-objective shortest path problem in the context of time-dependent transportation networks. We all know that there is rarely a unique global solution that is efficient when optimizing several objectives simultaneously. But rather, it exists a set of optimums of equivalent solutions known as pareto-optimal front. Thus, the goal of multi-objective strategies is to generate...
This paper deals with the Time Dependent Multimodal Transport Problem (TDMTP). The main contribution of this work is to propose a parallel algorithm for solving the TDMTP in very large transport networks. This new ad-hoc parallel approach takes advantage of the possible decomposition of real transport networks according to transport modes and regions. We implemented our algorithm using a parallel...
In this paper we present an hybrid approach for solving the time-dependent multimodal transport problem. This approach has been tested on realistic instances of the problem providing an adequate balance between computation time and memory space. This solution can be applied to real transport networks in order to reduce the impact of traffic congestion on pollution, economy, and citizen’s welfare....
Banking and financial system constitute a critical service for our economy. Being able to foreseen real time attacks and failures on financial institutions network is a crucial challenge. In order to face those problems, research tends to elaborate alert mechanisms in order to support risk assessment, analysis and mitigation solution for real time decision-making processes. Our previous works had...
The paper provides a global architectural and decision support solution for a reaction after alert detection mechanisms in the frame of information systems security applied to telecom infrastructures. Therefore, the architecture is developed in a distributed perspective and is composed of three basic layers: the low level that constitutes the interface between the architecture and the infrastructure...
This paper illustrates the activities under development within the FP7 EU MICIE project. The project is devoted to design and implement an on-line alerting system, able to evaluate, in real time, the level of risk of interdependent Critical Infrastructures (CIs). Such a risk is generated by undesired events and by the high level of interconnection of the different infrastructures. Heterogeneous models...
The main objective of this paper is to provide a global decision-reaction architectural built on the requirements for a reaction after alert detection mechanisms in the frame of information systems security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the architecture is elaborated using the multi-agents system that provides...
In today's world, where most of the critical infrastructures (CI) are based on distributed systems, security failures have become very common, even within large corporations. The critical infrastructures are tightly interconnected, mutually dependent, and are exposed everyday to new risks.These (inter)dependencies generate potential cascading effects that may spread a malfunction or an attack from...
This paper proposes an algorithm based on a transfer graph model to compute a multimodal shortest path (MSP) between a given source node s and a destination node d. The first step of this algorithm consists of computing a database saving a large part of necessary data to provide a response to a user itinerary request. Whe show in this paper that using ant colony optimization metaheuristic (ACO) to...
Rapidly changing weather conditions, especially in winter, have caused numerous disastrous traffic accidents in Northern Europe and in the Alpine region during recent years. Information about hazardous weather and road conditions is often potentially available but difficult or sometimes even impossible to deliver to drivers. This paper presents the international CARLINK (wireless platform for linking...
This paper presents the results of the LINKALL project mainly regarding the platform design and specification. The LINKALL platform includes tailored and integrated state-of-the-art IT tools to provide a range of key e-inclusion facilities strengthening the integration of local development activities. The strategic objective behind is to help remote communities in Latin America to secure sustainable...
The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of information systems security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the targeted architecture is developed in a distributed perspective and is composed...
This paper presents an approach to the shortest path problem in time-dependent multimodal networks. The approach derives, from the initial graph, a more simplified and non-time-dependent structure, called abstract graph, by using ant colony optimization. Then, a time-dependent Dijkstra's algorithm is used to compute the shortest path on the new structure. This approach improves two previous solutions...
Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. Building on our close examination of the existing approaches for IT Information assurance, this paper proposes a risk-based security assurance metrics and aggregation techniques to be incorporated in a methodology for the...
Research literature has argued the need for a methodology to measure security assurance levels of a system as vital in order to maintain and improve the overall system security. This paper proposes a risk-based security assurance metric and aggregation techniques to be incorporated in a methodology for the evaluation of IT systems security assurance.
In today's world, where most of the critical infrastructures are based on distributed systems, security failures have become very common, even within large corporations. A system with security loopholes can be damaging for companies, both in terms of reputation and finances, while customers are reluctant to use such systems. In that respect, providing stakeholders with quantifiable evidences that...
This paper deals with interactive multimedia applications design whose main function is growing due to the users' needs that expect increasingly complex scenarios under a high level of interactivity. Digital media technology is becoming an integral part of our daily activities.Using multimedia objects in building rich and interactive content for iDTV (Interactive TV) is a complex task. In order to...
The object-oriented modelling of interactive multimedia applications in the SMO-ITV approach is designed to suggest a methodology of using a multimedia objects within a framework for configuration and management of a smart multimedia object (SMO). It also enables multimedia software developers to create comprehensive analysis and design models of multimedia software. The main purpose of this paper...
Nowadays, the world of interactive applications is growing due to the users' needs that expect increasingly complex scenarios under a high level of interactivity. The explosive growth of interactive multimedia applications creates the need for advanced methods of content management and the reusability aspects of interactive multimedia content. Digital media technology is becoming an integral part...
This paper focuses on the application of the secure multiparty problem for the electronic contracts management use case. In this context, each of the participants involved in the execution of an electronic contract in a cooperative way, for a given business activity has to provide his own private data that is not shared to the other participants. This is known in the literature as a privacy-preserving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.