The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In multi-channel WLANs, MAC protocol allocates each transmission pair a channel selected for avoiding interference from each other. In the channel allocation phase, if the MAC protocol allocates the one channel iteratively to the multiple transmission pairs in narrowly-spaced, both channel utilization and network throughput can be improved. However, on such overloaded schedules, if any transmission...
A group of wireless devices with the ability to sense physical events (sensors) or to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In WSANs, sensors gather information about the physical events, while actors perform appropriate actions upon the environment, based on the sensed data shared by sensors. In order to provide effective sensing...
Rechargeable sensor networks have been studied as candidates for next-generation wireless sensor networks. However, rechargeable sensor nodes cannot always communicate with other nodes, because they typically do not receive a stable supply of power. To cope with this problem, we propose a dynamic synchronization protocol that allows the synchronization of transmission and reception in rechargeable...
In this paper, we propose two extensions of SDPL (Speed and Direction Prediction-based Localization) method. The first is called MA-SDPL (Multiple Anchors SDPL) which uses multiple mobile anchors instead of only one. Each anchor has its own trajectory and its own departure point. The goal is to ensure a total coverage of the sensor field and to multiply the chance of receiving anchor beacons. Anchor...
Access control ensures that only the authorized users of a system are allowed to access certain resources or tasks. Usually, according to their powers and responsibilities, users are organized in hierarchies formed by a certain number of disjoint classes. Such hierarchies are implemented by assigning a key to each class, so that the keys for descendant classes can be derived efficiently from classes...
The Internet threat monitoring systems are developed to grasp malicious activities on the Internet. Those systems consist of a data center and sensors deployed on the Internet. Sensors capture malicious packets and report to the data center. The data center investigates the latest trend of attacks by analyzing those packets and the result is open to the public. To publish precise monitored results,...
This paper aims to give a contribute to the experimental evaluation of tampered image detection algorithms (i.e. Image Integrity algorithms), by describing a possible way to improve these experimentations with respect to the traditional approaches followed in this area. In particular, the paper focuses on the problem of choosing a proper test dataset allowing to keep low the bias on the experimental...
Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strong ness property that anyone except the designated verifier cannot check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of...
Querying Linked Data Sources is a hard process for users who are not aware of data sources contents and thus cannot formulate their queries on these sources. In this context, our goal is to present a flexible approach to query linked data sources giving users the feeling that they manipulate a single data source with the possibility (i) to add or discard data sources more easily than existing approaches...
Data replication means storing copies of the same data at multiple peers thus improving availability and scalability. Replication can be seen as a family of techniques. Full documents or just chunks can be replicated. Since the same data can be found at multiple peers, availability is assured in case of peer failure. Consistency is a challenge in replication systems that allow dynamic updates of replicas...
During the last decade, a lot of progress has happened in the field of autonomous embedded devices (also known as motes) and wireless sensor networks. In this context, we envision next-generation systems to have autonomous database management functionalities on each mote, for supporting easy management of data on flash disks, adequate querying capabilities, and ubiquitous computing with no-effort...
Graph is a general data model which is applicable to complex data structures. Hence, there are lots of data which can be expressed using graph data models. For example, Web, social networking services, bibliographic database, and Linked Open Data. Since such graph data can be heterogeneous, users are imposed a huge burden on searching over the graph data to find desired sub graphs. Faceted search...
The spread of social networks allows sharing opinions on different aspects of life and daily millions of messages appear on the web. This textual information can be divided in facts and opinions. Opinions reflect people's sentiments about products, personalities and events. Therefore this information is a rich source of data for opinion mining and sentiment analysis: the computational study of opinions,...
This paper presents application software named NeighborNote which extends Ever note to include the capability of suggesting related notes based on the user operation history. NeighborNote calculates the relative ness between the notes based on the idea that the notes, which the user opened at the same time or copied & pasted across, may be related to one another. NeighborNote helps users find...
Data is a piece of information that is needed to form useful information. Obtaining data is needed by individuals such as researchers. From this perspective, data collection is an important step when doing any research or experiment. Data collection can be defined as the process of gathering and processing the information to evaluate the outcomes and use them for the researches. Online Social Networking...
Service engineering is starting to cope with the increasing needs of facilitating socially empowered services. In order to implement socially-empowered services, it requires design methodologies that deal with social experience beyond just a collection of user experience. Social experience design is promising methodology, however, the concrete building blocks of social experience design are still...
Sampling is a process of choosing a suitable representative subset from a population and uniformity is a basic requirement of representative ness. A sampling process produces a uniform random sample when all possible samples of the same size have the same probability. Uniform sampling from large graphs is a challenging task due to the lack of a sample frame, i.e., a list of all elements to be sampled...
While Web browsers are fundamental components in the Internet nowadays, the widespread availability of several techniques that can be used to detect the individual browser connected to a server raises privacy issues that need to be adequately addressed. Browser fingerprinting uses a combination of attributes, whose values are silently obtained during normal navigation, to identify, with high likelihood,...
Trust plays a very important role in people's real lives. As online social networking becomes more and more popular nowadays, it is urgent to use trust in online communities, like Amazon.com, Epinions.com, Facebook, Twitter and so on. Unfortunately, trust links in online communities are sparse compared with the number of pairs of users. To address this problem, computer scientists are now using trust...
Call Admission Control (CAC) is one of the resource management functions, which regulates network access to ensure QoS provisioning. However, the decision for CAC is very challenging issue due to user mobility, limited radio spectrum, and multimedia traffic characteristics. In this paper, we propose a new CAC scheme which considers for acceptance decision except other parameters also the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.