The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large Unmanned Aerial Vehicle (UAV) swarms are a nascent technology promising useful military and civilian solutions to logistical problems. Securing data communications within the swarm is essential to accomplishing swarm objectives. The Naval Postgraduate School has successfully demonstrated the launch, flight and landing of 50 UAVs. The communications architecture to support a UAV swarm is unique...
Federated cloud networks are formed by federating virtual network segments from different clouds, e.g. in a hybrid cloud, into a single federated network. Such networks should be protected with a global federated cloud network security policy. The availability of network function virtualisation and service function chaining in cloud platforms offers an opportunity for implementing and enforcing global...
The paper presents MorphicLib, a new partial homomorphic cryptography library written in Java that can be used to implement a wide-range of applications. The paper shows the use of the library with the HomomorphicSpace coordination service. This service is a tuple space that stores encrypted tuples but still supports operations like returning tuples with values within a certain range.
The objective of this paper is to analyze the use of nonlinear models to predict the CPU frequency that reaches the lowest power consumption of a smartphone based on Android OS context variables. Artificial neural networks (ANNs) and k-nearest neighbors (k-NN) techniques are investigated, and their results are compared to those obtained by the linear method (LM). Experimental results indicate the...
An object type characterizes the domain space and the operations that can be invoked on an object of that type. In this paper we introduce a new property for concurrent objects, we call coverability, that aims to provide precise guarantees on the consistent evolution of the version (and thus value) of an object. This new property is suitable for a variety of distributed objects, including concurrent...
Energy efficient networking has gained momentum in past one decade due to the Internet's ever increasing share in world's total energy consumption. It is crucial to study and reduce the energy consumption of tasks that are very heavily used in the Internet. In this paper, we focus on one such task, file distribution, and study its energy efficiency. We prove lower bounds on energy consumption for...
The computational model of population protocols is a formalism that allows the analysis of properties emerging from simple and pairwise interactions among a very large number of anonymous finite-state agents. Significant work has been done so far to determine which problems are solvable in this model and at which cost in terms of states used by the agents and time needed to converge. The problem tackled...
We present VTTLS, a vulnerability-tolerant communication protocol. There are often concerns about the strength of some of the encryption mechanisms used in SSL/TLS channels, with some regarded as insecure at some point in time. VTTLS is our solution to mitigate the problem of secure communication channels being vulnerable to attacks due to unexpected vulnerabilities in encryption mechanisms. It is...
In recent times, the number of mobile Android devices has been growing exponentially not only in the expanding popularity of low-cost mobile devices but also for the great number of functionalities and applications. This new range of features has highlighted the need for greater capacity in mobile batteries to provide an extended time of use. Several studies have been done to minimize the impact on...
The Consensus Time Synchronization (CTS) overcomes the shortcoming of centralized time synchronization in terms of scalability and robustness to node failure. However, CTS leads to slow convergence rate, high communication traffic and the inability to provide synchronization to an external time source. This paper proposes a novel distributed time synchronization protocol for WSNs, the Consensus-based...
MapReduce is a popular programming model used to process large amounts of data by exploiting parallelism. Open-source implementations of MapReduce such as Hadoop are generally best suited for large, homogeneous clusters of commodity machines. However, many businesses cannot afford to invest in such infrastructure and others are reluctant to use cloud services due to data security and privacy concerns...
The most basic functions of any organism or organized unit requires understanding the environment. This is accomplished through sensing; for organisms, sensing is an evolved faculty. The same is true for military and first responder units such as squads, who are relying on more sophisticated sensing systems to gain greater situational awareness (SA) in order to more effectively and safely conduct...
It is with great pleasure that we welcome you to the 15th edition of IEEE NCA. Over the years, NCA has become a successful series of conferences that serves as a large international forum for presenting and sharing recent research results and technological developments in the fields of Network and Cloud Computing. This edition of NCA features a lively, interesting, and stimulating program with a lot...
Several Intelligent Transportation Systems (ITS) rely on localization to enable services ranging from comfort to safety applications. Following this same idea, the use of Dedicated Short Range Communications (DSRC) devices based on the IEEE 802.11p standard, and the Vehicular Ad Hoc Networks (VANETs) paradigm, have resulted in the deployment of several protocols, services and applications that need...
The proliferation of GPS-enabled devices leads to the massive generation of geotagged data sets recently known as Big Location Data. It allows users to explore and analyse data in space and time, and requires an architecture that scales with the insertions and location-temporal queries workload from thousands to millions of users. Most large scale key-value data storage solutions only provide a single...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.