The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The dependability analysis is crucial for a wide range of systems. It becomes even more difficult to assess when dealing with cyber-physical systems (CPSs), being resulting as an integration of physical and cyber parts, strongly interacting to provide a service or a function. In this context, the dependability analysis of a Deicing System (DS), which aims at preventing or decreasing the ice accretion...
The use of IT technology for the planning and implementation of illegal activities has been gaining ground in recent years. Nowadays, through the web and the social media, it is possible not only to divulge advertising for the disclosure of illicit activities, but also to take action that in the past needed to have people in place and at the moment the activity took place. In fact, this phenomenon...
The process of designing and evaluating distributed Cyber-Physical Systems (CPSs) is not a trivial task. There are many challenges to tackle such as managing distributed resources, enabling communication between components, and choosing performance metrics to evaluate the “goodness” of the system. Smart Grids (SGs) are prominent representatives of CPSs, a particular type of Critical Infrastructure...
Online web services have been constantly developed and offered through the Internet. These services rely on webpages that are hosted on remote servers and are transmitted to clients via HTTP upon requests. While HTTP has been updated to support more and more sophisticated services with increasing amount of multimedia content, the real-world adoption of those updates is still very slow. In this paper,...
Unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs) are promising assets to support rescue operations in natural or man-made disasters. Most UGVs and UAVs deployed in the field today depend on human operators and reliable network connections to the vehicles. However, network connections in challenged environments are often lost, thus control can no longer be exercised. In this paper,...
There are only a few visualisations targeting the communication of trust statements. Even though there are some advanced and scientifically founded visualisations—like, for example, the opinion triangle, the human trust interface, and T-Viz—the stars interface known from e-commerce platforms is by far the most common one. In this paper, we propose two trust visualisations based on T-Viz, which was...
Trust Management (TM) systems for authentication are vital to the security of online interactions, which are ubiquitous in our everyday lives. Various systems, like the Web PKI (X.509) and PGP's Web of Trust are used to manage trust in this setting. In recent years, blockchain technology has been introduced as a panacea to our security problems, including that of authentication, without sufficient...
In disaster situations, the coordination of rescue missions is a difficult task. The person in charge makes decisions under pressure, which could lead to inappropriate instructions to rescuers and could cost many lives. The aim of DisVis 2.0 approach is to release pressure from those responsible by providing decision support using predictive human-centric disaster simulations for infrastructure-less...
Reliable communications are crucial for the success of emergency response and management. However, today's technologies used by rescuers and civilians mainly rely on either centralized or specialized emergency approaches, which reveal individual issues especially in infrastructure- less emergency situations (e.g., blackout). In this paper, we present a customary home router upgraded as self- sustaining...
Mobile Cloud Computing (MCC) leverages resourceful data centers that are distant (aka the cloud) or closely located (aka edge servers) for computational offloading to overcome resource limitations of modern mobile systems like smartphones or IoT devices. Many research works investigate context-aware offloading decision algorithms aiming to find the best offloading system at runtime. However, all approaches...
Anticipatory mobile computing is an emerging research field in pervasive environments. However, building multiple anticipatory applications to proactively support a user on his behalf still involves a disproportionate effort through their interdisciplinary nature and individual complex development from scratch. In this paper, we present architectural concepts and a reference implementation of a distributed...
Modern energy grids introduce local energy producers into city networks. Whenever a city network is disconnected from the distribution grid, a blackout occurs and local producers are disabled. Micro grids circumvent blackouts by leveraging these local producers to power a fixed subset of consumers. In this paper, we evolve micro grids to Holons, which overcome the need for fixed subsets and power...
In-network processing pushes computational capabilities closer to the edge of the network, enabling new kinds of location-aware, real-time applications, while preserving bandwidth in the core network. This is done by offloading computations to more powerful or energy-efficient surrogates that are opportunistically available at the network edge. In mobile and heterogeneous usage contexts, the question...
As clouds move to the network edge to facilitate mobile applications, edge cloud providers are facing new challenges on resource allocation. As users may move and resource prices may vary arbitrarily, %and service delays are heterogeneous, resources in edge clouds must be allocated and adapted continuously in order to accommodate such dynamics. In this paper, we first formulate this problem with a...
Smart Grids (SGs) are electrical power grid infrastructures that aim at managing both cyber and physical resources and provide efficient energy routing. The cyber part of the system encompasses computing and networking resources, whereas the physical part faces with mechanical and electrical processes. Due to the strong integration and interaction among cyber modules and physical components, the complexity...
With the increase in the sophistication of cyberattacks, collaborative defensive approaches such as Collaborative IDSs (CIDSs) have emerged. CIDSs utilize a multitude of heterogeneous monitors to create a holistic picture of the monitored network. Nowadays, a number of research institutes and companies deploy CIDSs that publish their alert data publicly, over the Internet. Such systems are important...
Software-defined networking (SDN) changes the structure of core networks from statically planned to flexible and adaptable to the network conditions. The de facto standard for the interaction between the controller and the forwarding devices (e.g., SDN switches) is the OpenFlow protocol. With increasing interest in SDN technologies, researchers found solutions to extend these paradigms to end devices,...
In disaster situations or on emergency terrains, Internet and Cloud access may be restricted; it may still be important to process complex resource-intensive tasks and to acquire distributed information for emergency response, using ad-hoc networks among, e.g., first responder mobile devices. Corresponding approaches towards coordination, resource utilization, and interoperability are still challenging...
Online Social Networks (OSNs) are the core of many social interactions nowadays. Privacy is an important building block of free societies, and thus, for OSNs. Therefore, OSNs should support privacy-enabled communication between citizens that participate. OSNs function as group communication systems and can be build in centralized and distributed styles. Centralized, privacy is under the sole control...
Many networking applications implement topology adaptations to cope with network dynamics. Related work focuses on the specific application, lacking a general model for topology adaptations. In this paper, we analyze 14 topology adaptations from two different application domains. Based on the derived characteristics, we propose a general topology adaptation model. We present the Topology Adaptation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.