The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this paper, we propose an optimization strategy to be applied to a well-known DTN routing algorithm as PRoPHET and SimBetTS which, by default, don't regard to the issue of energy constraint. Our proposed strategy is based on modeling of the message forwarding as a Bayesian game that aims specifically to capture the dynamic nature of the multi-copy replication decisions, the energy constraint of...
We propose a new algorithm for building ad-hoc networks among mobile devices tailored for small and dynamic environments using the Bluetooth interface. The target application is network formation among passengers on urban buses. The proposed algorithm assigns roles to the network participants for reducing the effect of nodes leaving the network upon alighting. Based on estimates of node permanence...
In the Internet of Things (IoT) vision, any physical or virtual object can be identified, addressable, controlled, and monitored via Internet. In the e-health scenario, these smart objects can be body sensors allowing the continuous monitoring of vital signs of patients. Due to the inherent heterogeneity of such devices, it is necessary to enable interoperability among them and to facilitate the development...
This paper presents and evaluates a platform for monitoring service-level metrics in OpenFlow Software Defined Networks (SDN), named SDNMon. The platform supports frequent network observation, at different granularity levels, including per-flow observation, being able to present accurate on-the-fly statistics regarding throughput and delay. The evaluation considered two statistical data gathering...
Real-time video dissemination over Vehicular Ad-hoc NETworks (VANETs) is challenging due to its strict quality requirements, dynamic network topology, and broadcast environment. Although Statistical Routing Protocols (SRPs) have been applied by using positioning and Quality of Service (QoS) parameters, they are not enough to obtain satisfactory Quality of Experience (QoE) levels in multi-hop video...
Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing, and to network administrators, e.g., who provision and pay for the traffic. Recent proposals aim to identify and filter spam messages at the origin, restraining message propagation and reducing wasted bandwidth on the route from the spammer...
The popularization of PaaS environments presents challenges to traditional authorization models for controlling resource usage. This article describes a hybrid authorization model suitable for PaaS environments, using rule templates, authorization credentials and local derivation of individual policies. In addition, we present the usage control mechanisms that eliminate the main disadvantages of policy...
The overlay of several wireless technologies, such as Wi-Fi and LTE, in a geographic region has increased with the popularity of portable devices equipped with two or more communication interfaces. In this new scenario, a key challenge is the choice of network access and technology that best meets the users requirements. Nowadays, the network selection is based on performance criteria, as the strength...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.