The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An electrical readout system of protein microarrays comprising arrays of gold interdigitated electrode pairs, which enabled impedance multiplexed detection of up to 36 biological events on the same substrate, and of polydimethylsiloxane (PDMS) microwells, is reported. Similarly to fluorescent readout counterparts, regular glass slides were applied for carrying out the microarray. However, unlike them,...
The estimation of thermal parameters belonging to active fires, such as fire radiative power (FRP), is a recommended method to determine fire severity. A review of the state of the art provides several semiempirical methods to estimate the FRP. On the other hand, the Sentinel-3/SLSTR instrument has two spectral channels dedicated to active-fire observation, which allows fire monitoring in a wide variety...
An ultra-low-energy, high-dose, B-based implant was inserted after source/drain formation and before metal silicide contact deposition for PMOS devices. B beam-line implant and plasma doping (PLAD) using either B2H6 or BF3 gases were utilized for this implant process. The resulting PMOS device performance showed significant improvements, including ∼70 percent lower contact resistances, similar threshold...
P2P-TV systems will certainly contribute to revolution the broadcast TV paradigm allowing ubiquitous access to a practically unlimited number of channels, representing an important step forward in the direction of the Anything/Anyone/Anywhere/Anytime communication paradigm of future Internet applications. Since its deployment, P2P-TV has already attracted millions of users and it is expected that...
Future networks are expected to become more complex and dynamic than today's networks. A centralized approach for network management is not able to deal with such complexity and dynamics, and will then introduce scalability problems. The concept of In Network Management (INM), where each INM entity (a network node) has the autonomy to self-govern its behavior, is being researched as an alternative...
In the last few years, several new IP applications and protocols emerged as the capability of the networks to provide new services increased. The rapid increase in the number of users of peer-to-peer (P2P) network applications, due to the fact that users are easily able to use network resources over these overlay networks, also lead to a drastic increase in the overall Internet traffic volume. An...
Medical monitoring is a very important wireless sensor network (WSN) application, because collecting vital information (such as heart rate, temperature, blood oxygen saturation level, electrocardiogram (ECG) and electroencephalogram (EEG) signals) using wireless sensors and making it available on time can improve the safety of the patient's care and save lives. Medical support networking has very...
One of the most important threats to personal and corporate Internet security is the proliferation of zombie PCs operating as an organized network. Zombie detection is currently performed at the host level and/or network level, but these options have some important drawbacks: antivirus, anti-spyware and personal firewalls are ineffective in the detection of hosts that are compromised via new or target-specific...
Recent years have witnessed a huge increase in the number and variety of Internet applications, as well as on the number and diversity of security attacks to network users and systems. Consequently, the need for an accurate mapping of traffic to its corresponding applications has also raised in order to allow ISPs to provide better Quality-of-Service (QoS) standards, implement traffic engineering...
An accurate mapping between traffic and their corresponding applications can be very important for a wide range of network management and measurement tasks including traffic engineering, service differentiation, performance/failure monitoring, and security. Having the ability to identify the differentiating characteristics of IP applications is a crucial issue that can form the basis for the development...
Peer-to-peer file-sharing systems have gained tremendous popularity in the past few years. More users are continually joining such systems and more objects are being made available, seducing even more users to join. Today, the traffic generated by P2P systems accounts for a major fraction of the Internet traffic and is bound to increase. An accurate mapping of traffic to their applications can be...
Peer-to-Peer (P2P) file sharing systems are becoming part of the daily life of content consumers. The traffic generated by P2P systems, and particularly BitTorrent, represents the major portion of the global Internet traffic, largely overtaking the traffic share of the World Wide Web. Nowadays, we see P2P systems evolving towards a Video on Demand (VoD) platform. One of the main challenges of these...
This paper proposes a new approach to the modeling of packet switching networks that is based only on measurements (or simulations) and does not require any information on the network structure. Network managers usually need to assess network behavior for varying number of users or evolving traffic profiles, even without a complete knowledge of the network topology or resources. In these cases, it...
Mobile Ad-hoc Networks (MANETs) are particularly difficult to manage due to the highly dynamic nature of its traffic, caused by variations on the number of users, their locations and the type of applications they use. This paper proposes a new modeling framework for mobile ad-hoc networks that integrates all important functional characteristics of a MANET and is able to predict network Quality of...
Nowadays, wireless network traffic exhibits peculiar and unpredictable behaviors that can be attributed to the combination of different factors: the varying number of users, the capacity of the network access points, network traffic matrices, users' mobility, background traffic, diversity of applications, services and user behaviors. This scenario creates an increasing need for tools that can cope...
Recent years have witnessed a huge increase in the number and variety of applications running over IP networks. An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks including traffic engineering, service differentiation, performance/failure monitoring, and security. Traditional mapping approaches have become increasingly inaccurate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.