The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Among all the Internet of Things (IoT) applications, the Smart City concept has received significant attention in the last few years. The main motivation behind this interest is attributable to population growth and urbanization trend. Cities need, indeed, to be ready to face new challenges - e.g., traffic congestion, wast management, etc. - caused by this new amount of citizens. To address those...
This paper addresses conformance testing of communication protocols. The Session Initiation Protocol (SIP) is often considered "the standard protocol" for deploying VoIP (Voice over IP) solutions. We implemented a popular SIP distributed scenario on an industrial test bed. Active testing of SIP maintains our attention, while we kept on experimenting with the test cases dependencies architecture...
The widespread use of the HTTP and hypertext makes it possible to freely publish new information and expose it in the context of its description. Unfortunately, this is a human-centric environment that cannot easily be adapted to an application-centric approach, which is required to provide distributed enterprise management and real-time process control. In this article new architecture is presented...
In traditional product companies, creating value meant identifying enduring customer needs and manufacturing well-engineered solutions. Two hundred and fifty years after the start of the Industrial Revolution, this pattern of activity plays out every day, especially in a connected world where products are no longer one-and-done. Making money is not anymore limited to physical product sales and other...
Robust Header Compression (ROHC) is a standardized option defined by the IETF to compress the various transport and communication protocol headers over wireless links. In the present day scenario, when the applications and services are evolving to become more bandwidth hungry, wireless networks are expected to be capable of letting them drive on wireless links and provide required quality of service...
The expected evolution of the IoT into a huge and growing number of sensors connected to the Internet and generating a huge amount of data, translates into new challenges in the analysis phase for the extraction of useful information to the final user. This scenario opens new opportunities for the introduction of context-awareness features, as it is possible to store context information linked to...
We propose a reusable and extensible hub architecture, Ubiquitous Box Architecture (UBA), which can be used in scenarios where various devices and sensors need to communicate with each other. It includes four main components, namely (1) Ubiquitous Box, (2) Plug in Server, (3) Authorization Server and (4) client applications. To show the robustness of the architecture, we present how UBA can be applied...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
When a user accesses a resource, the accounting process at the server side does the job of keeping track of the resource usage so as to charge the user. In cloud computing, a user may use more than one service provider and need two independent service providers to work together. In this user-centric context, the user is the owner of the information and has the right to authorize to a third party application...
After the vision of Mark Wieser, and the advent of 3G connection with a large number of mobile computing devices(PDAs, Smartphones, Tablet, etc.) that have democratized access to information anywhere, we live in a new era of ubiquity where a set of services are offered in our environments. In this work we try to review the conception, discovery and composition of these services called pervasive in...
WebRTC, browser-to-browser communication technology, has on short term a desktop strategy, which will unleash its potential in 2013/2014. It is a great opportunity for Telco's to achieve a promise of service continuity for the RCS standard. But general disintermediation patterns and WebRTC going mobile and being an API of its own, are a serious mid-term challenge for operators.
This paper introduces reference metrics for performance assessment of context-based charging, based on a novel model in which the charging process is capable of adapting to the user context by handling context-change driven events. The proposed metrics correspond to the response time in the relevant signalling scenarios, derived from the Third Generation Partnership Project (3GPP) network standards,...
Collective communication operations in the Message Passing Interface (MPI) consume a significant amount of time at scale, degrading the performance of scientific applications. Optimizing collectives is key to application performance and scalability. This paper focuses on hiding the latency of the all gather collective by efficiently offloading it to the networking hardware. We have investigated the...
Smart devices have deeply modified the user consumption expectations getting used to rich interactive experiences around new media services. In this emerging landscape, TV rises as the central media device integrating the home network ecosystem. In the race to create more dynamic and customizable content, computer generated 3D graphics get a prominent position combined with video and audio to provide...
With the convergence between phone and data networks in LTE and 4G, cellular signaling traffic is increasingly carried over IP. Control plane functions, once performed by dedicated machinery, are evolving into large-scale network applications with strict requirements on delay, availability, and processing throughput as mandated by 3GPP standards. In this paper we present dMME, a distributed architecture...
The IEEE Wireless Access in Vehicular Environments (WAVE) family of standards is the leading worldwide standardisation effort in terms of Dedicated Short Range Communications (DSRC). WAVE aims at defining a common set of requirements and functionalities, in order to enable intercommunication and interoperability between nodes in a Vehicular Ad hoc Network (VANET). Despite the concept of service as...
Digital Identity is the representation of the overall known information about a user across online applications. Digital identity management is the collection of processes, policies and technologies to manage the complete life cycle of users' identities, such as creation, management, and destruction. Most web applications request users to have a registered digital identity in their system to allow...
Presence management, i.e., the ability to automatically identify the status and availability of communication partners, is becoming an invaluable tool for collaboration in enterprise contexts. In this paper, we argue for efficient presence management by means of a holistic view of both physical context and virtual presence in online communication channels. We sketch the components for enabling presence...
The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA) approaches traditionally used to couple functionality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.