The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Some public and private services are called part of the Critical Infrastructure (CI), which are considered as the most important services to protect the functioning of a society and the economy. Many CIs provide services via the Internet and thus cyber-attacks can be performed remotely. It is now very simple and free to find and download software, which automates performing cyber-attacks. A recent...
We analyze the design space for implementing the Constrained Application Protocol (CoAP) within Content-Centric Networks (CCN), identifying several CoAP specific scenarios and seeing how they map to CCNs. We present an evaluation, recommendations for implementations and extensions, and directions for future work. Our key result is that while several protocol features and flows map naturally, some...
Our research group has proposed a VNT control method based on attractor selection. Since the number of attractors composing an attractor set is limited, it is important to decide what kind of attractors should be prepared. The existing method prepares attractors such that their topological characteristics are different from each other. However, since the existing method does not incorporate current...
Mobile Cloud Computing enables resource limited mobile devices to support rich application services. Among three types of cloud services, Infrastructure-as-a-Service (IaaS) clouds provides compute infrastructure for mobile applications on demand. In IaaS-based mobile clouds, latency and bandwidth requirements can considered as critical factors impacting Quality of Service (QoS). Opposed to centralized...
In this paper, an asymptotic analysis of the inversely proportional setting (IPS) of carrier sense threshold (CST) and transmission power in densely deployed wireless local area networks (WLANs) is presented. In densely deployed WLANs, CST adjustment is a crucial technology to enhance spatial channel reuse, but it can starve surrounding transmitters due to an asymmetric carrier sensing relationship...
We analyze the conditions in which offloading computation reduces completion time. We extend the existing literature by deriving an inequality that relates computation offloading system parameters to the bits per instruction ratio of a computational job. This ratio is the inverse of the arithmetic intensity. We then discuss how this inequality can be used to determine the computations that can benefit...
In recent years, the use of big data as a profitable business strategy has attracted considerable attention, and is expected to drastically increase in the future. We advocate a distributed and parallel computation environment for big data analysis aiming at fine-grained cloud computing, which includes so-called edge computing. This approach differs from the way that data analysis was performed in...
This work presents a video surveillance platform for smart cities designed to exploit the facilities offered by SDN/NFV networks to achieve gain in terms of scalability, flexibility, OpEx and CapEx reduction. The main elements of this platform are the Smart Access Nodes (SAN) and the Network Access Nodes (NAN). SAN devices are distributed on the territory to cover small/medium areas and provide connectivity...
The rapid increase of Internet of Things (IoT) devices will have a significant impact on people's daily life, providing a wide range of services, such as smart lights, door locks, and cameras remotely controlled by smartphones. Remote access within the same environment or via the Internet requires effective authentication and authorization mechanisms beyond those provided by static authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.