The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this work we propose to design and implement a secure one-time password (OTP) system to provide a better method of enforcing a stricter set of policies, that bypass natural human habits of choosing passwords that do not abide by the policies of an organization, leaving systems vulnerable to security threats. We would then perform static and dynamic analysis of our OTP system to ensure it is not...
The use of compensatory motion strategies amongst stroke sufferers has been well documented in the literature. While these modified movement patterns allow individuals to address functional deficits, research suggests that employing such techniques may inhibit motor skill recovery. Although detection of these movements using either wearable sensors or gaming technologies within home-based rehabilitation...
Due to the open and shared nature, wireless communication systems are vulnerable to jamming attacks. Beamforming is a promising technique to counteract the impact of jamming attacks. However, when the location of the desired signal is close to that of the jamming signal, the performance of the traditional anti-jamming beamformer that uses isotropic antenna elements is significantly degraded due to...
Predicting performance of an application running on parallel computing platforms is increasingly becoming important due to the long development time of an application and the high resource management cost of parallel computing platforms. However, predicting overall performance is complex and must take into account both parallel calculation time and communication time. Difficulty in accurate performance...
Digital infrastructure is becoming more distributed and requiring more power for operation. At the same time, many countries are working to de-carbonise their energy, which will require electrical generation of heat for populated areas. What if this heat generation was combined with digital processing?
This article presents a user behavior aware channel allocation scheme for mobile ad hoc networks. The proposed scheme uses a distributed approach to dynamically allocate the IEEE 802.11b/g spectrum. Our main contribution is to consider the user behavior, represented by the mobility, traffic, and node degree to guide the channel allocation process. In addition, we use a mobility model based on the...
Magnetic disk capacities have grown over the last decades by a factor of at least ten thousand. While the minicomputer disk drives of the late eighties could only store 600 MB of data [5], 8TB or 10TB disk drives are common today. The same is not true for disk transfer rates: they are just one hundred times higher than those of the late eighties. As a result, copying the entire contents of a disk...
We propose estimators for popular clustering coefficient measures 1) network average clustering coefficient and 2) global clustering coefficient (aka transitivity). Unlike most of previous studies estimating clustering coefficients, we do not use independent vertex sampling as it is either unavailable or inefficient to implement in most Online Social Networks (OSNs). Instead, we propose estimators...
Many computing systems today are heterogeneous in that they consist of a mix of different types of processing units (e.g., CPUs, GPUs). Each of these processing units has different performance capabilities and energy consumption characteristics. Job mapping and scheduling play a crucial role in such systems as they strongly affect the overall system performance, energy consumption, peak power and...
This paper addresses mainly the problem of private data protection in network communication against eavesdropping attacks. As this kind of attacks is stealthy and untraceable, it is barely detectable for those feature detection or static configuration based passive defense approaches. We propose a Moving Target Defense(MTD) method by utilizing the protocol customization ability of Protocol-Oblivious...
Virtualisation encourages users to procure, relin-quish and scale resources frequently. Such fluid deployments require continuous performance assessment to inform resource allocation. In current systems Tick Accounting, Load Average, and Memory Usage are used to judge system performance and to trigger resource scaling. We argue that the readily available Context Switch (CS) counter is also an effective...
Most wireless sensor networks that are currently deployed use a technology based on the IEEE 802.15.4 standard. However, this standard does not meet all requirements of industrial applications in terms of latency, throughput and robustness. That is why the IEEE 802.15.4e amendment has been designed, including the Time Slotted Channel Hopping (TSCH) mode. In this paper, we focus on how to build a TSCH...
Cellular wireless or mobile communications have seen four generations of technological developments. Starting with analog voice with the first, and then moving on to digital voice with the second generation, these generations were each marked with a clear technological advancement. For the third generation, the advancement was in incorporating data on top of a voice-based infrastructure. With the...
The time spent by an application can broadly be classified into two main categories — user mode and kernel mode. In order to optimize applications from a performance perspective, it is critical to know the code regions where they spend the bulk of their time. With datacenter applications becoming more I/O intensive and storage devices attaining higher performance with each generation, the contribution...
Middleware can provide novel and practical approaches for enhancing Cyber-Physical Systems (CPS) application development processes and operations. This paper discusses the roles and advantages of using middleware to build CPS. In addition, the paper studies the required features needed in such middleware for development and operation of CPS.
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
Many large-scale applications in science and business domains require the transfer of big data over high-performance networks for remote operations. Such big data transfer is increasingly supported by bandwidth reservation services that discover feasible and efficient routing options in dynamic network environments with time-varying resources. By exploring the flexility and capacity of variable paths,...
The performance of IEEE 802.11e enhanced distributed channel access (EDCA) mechanism effects by the network loads. It is observed that when the number of users increases in each access category, the delay significantly increased in EDCA algorithm. The performance improvement in EDCA algorithm in fluctuating network load is a challenging task. To improve the performance of EDCA algorithm for delay...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.