The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
The spread of antibiotic resistance is a growing problem known to be caused by antibiotic usage itself. This problem can be analyzed at different levels. Antibiotic administration policies and practices affect the societal system, which is made by human individuals and by their relations. Individuals developing resistance interact with each other and with the environment while receiving antibiotic...
Today, workflows are executed in heterogeneous environments, such as the Internet, to automate interactions with services of business partners and other third parties. In such heterogeneous environments, device and communication failures occur frequently. These failures might delay or even stop the workflow executions rendering the workflow unavailable. For ensuring availability, workflow executions...
We examine the power of statistical zero knowledge proofs (captured by the complexity class SZK) and their variants. First, we give the strongest known relativized evidence that SZK contains hard problems, by exhibiting an oracle relative to which SZK (indeed, even NISZK) is not contained in the class UPP, containing those problems solvable by randomized algorithms with unbounded error. This answers...
Interactive coding, pioneered by Schulman (FOCS 92, STOC 93), is concerned with making communication protocols resilient to adversarial noise. The canonical model allows the adversary to alter a small constant fraction of symbols, chosen at the adversarys discretion, as they pass through the communication channel. Braverman, Gelles, Mao, and Ostrovsky (2015) proposed a far-reaching generalization...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
We consider a large system populated by n anonymous nodes that communicate through asynchronous and pair-wise interactions. The aim of these interactions is for each node to converge toward a global property of the system, that depends on the initial state of each node. In this paper we focus on both the counting and proportion problems. We show that for any δ ∊ (0, 1), the number of interactions...
The panic among medical control, information, and device administrators is due to surmounting number of high-profile attacks on healthcare facilities. This hostile situation is going to lead the health informatics industry to cloud-hoarding of medical data, control flows, and site governance. While different healthcare enterprises opt for cloud-based solutions, it is a matter of time when fog computing...
Taking advantage of computing capabilities offered by modern parallel and distributed architectures is fundamental to run large-scale simulation models based on the Parallel Discrete Event Simulation (PDES) paradigm. By relying on this computing organization, it is possible to effectively overcome both the power and the memory wall, which are core limiting aspects to deliver high-performance simulations...
As more and more Internet of Things (IoT) devices are connected to the cloud services, fog computing has emerged as a new computing model to provide analytic and intelligent services to the end users for fast response time. Among the application layer protocols used for IoT, MQTT and CoAP are two well-known lightweight protocols that run on top of TCP and UDP, respectively. MQTT supports publish/subscribe...
As more and more Internet of Things (IoT) devices are connected to the cloud services, fog computing has emerged as a new computing model to provide analytic and intelligent services to the end users for fast response time. Among the application layer protocols used for IoT, MQTT and CoAP are two well-known lightweight protocols that run on top of TCP and UDP, respectively. MQTT supports publish/subscribe...
Outsourcing computation to cloud server has recently become popular in cloud computing. Cloud computing technologies enable clients with limited computational resources to outsource their massive computations to powerful cloud servers. Outsourcing computation has some new concerns, such as outsourced data and result privacy, verifiability and efficiency. Matrix multiplication is one of the most basic...
Despite the considerable benefits of cloud computing as an emerging technology, there are some reliability and privacy concerns such as generating and managing access policies according to sensitivity of stored data in cloud storages. The most challenging issue in current information policy models is managing security levels, mapping between access requests and defined policies and considering the...
This paper presents a methodology for simulating the Internet of Things (IoT) using multi-level simulation models. With respect to conventional simulators, this approach allows us to tune the level of detail of different parts of the model without compromising the scalability of the simulation. As a use case, we have developed a two-level simulator to study the deployment of smart services over rural...
The age of information is a measure of the freshness of continually updated information, which has been studied theoretically for a variety of queueing models. We conduct an experimental evaluation of the age of information in various emulated network settings to see how well the queue models approximate a network for the purpose of age. We use CORE and EMANE to deploy a one-dimensional multi-hop...
While Blockchain network brings tremendous benefits, there are concerns whether their performance would match up with the mainstream IT systems. This paper aims to investigate whether the consensus process using Practical Byzantine Fault Tolerance (PBFT) could be a performance bottleneck for networks with a large number of peers. We model the PBFT consensus process using Stochastic Reward Nets (SRN)...
Recent research interest in cellular communication systems focuses on the design of the radio access networks (RAN) considering Transmission Control Protocol (TCP) behavior. However, less attention has been paid to the specific transmission method of TCP ACK. The authors have been studying methods including TCP ACK filtering that can well work with the link layer protocols in LTE-Advanced Pro (LTE-A...
The loT (Internet of things) is emerging as a wide variety of devices are attached to the Internet to support ubiquitous and pervasive sensing and computing, home automation, and the shift toward smart cities. As the IoT becomes a critical part of the Global Internet on which we increasingly rely, resilience is increasingly important. Of greatest concern is resilience to large-scale disasters that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.