The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In wireless sensor networks, the connectivity-based localization protocols are widely studied due to low cost and no requirement for special hardware. Many connectivity-based algorithms rely on distance estimation between nodes according to their hop count, which often yields large errors in anisotropic sensor network. In this paper, we propose a virtual potential field algorithm, in which the estimated...
In this paper we focus on the problem of self-tuning distributed transactional cloud data stores by presenting an overview of the autonomic mechanisms integrated in the Cloud-TM platform, a transactional cloud data store developed in the context of a recent European project. Cloud-TM takes a holistic approach to self-tuning and elastic scaling, treating them as strongly intertwined problems with the...
Solid State Drives (SSDs) are gaining particular momentum in various frameworks such as multimedia, large data centers and cloud environments. Unfortunately, efficient CAD tools for SSD design space exploration able to assess the optimization of the device microarchitecture w.r.t. the target performance are still missing. This paper tries to close this gap by proposing SSDExplorer, a tool for fine-grained...
Detecting and identification the network traffic attracts many attentions in recent years. Statistical approach using the machining learning algorithm can classify the network traffic efficiently without detecting the payload of every packet. At the same time, the accuracy depends on the statistical features of the training set. However, the traditional process without pre-treatment of the statistical...
Recently, various consensus-based protocols have been developed for time synchronization in wireless sensor networks. However, due to the uncertainties lying in both the hardware fabrication and network communication process, it is not clear how most of the protocols will perform in real implementations. In order to reduce such gap, this paper investigates whether and how the typical consensus-based...
Software Defined Network (SDN) provides better network management and higher utilization for data center network, which decouples control plane from data plane. The centralized control of entire network may result in large overhead and limit the scalability of control plane. Previously, some researches [6] [7] proposed an approach for reducing work load on controller with elephant flow detection....
Traffic identification is an important issue in the Internet, especially where QoS and Service Level Agreements are enforced. Due to the enormous number of applications and protocols that run on non-standard port numbers, using metadata such as port numbers to identify Internet traffic is no longer practical. As an open-source effort, OpenDPI is a software package that identifies network flows based...
Visual tracking has attracted a significant attention in the last few decades. The recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted annotated data-sets and standardized evaluation protocols that would allow objective comparison of different...
Localization in underwater is challenging due to harsh communication channel. Although a number of researches have proposed localization for underwater environment, they did not fully consider practical issues affecting the localization accuracy. In particular, our research focus on the unreliable reference location caused by mobility of underwater sensor nodes and unpredicted time measurement error...
Network coding not only improves TCP performance in lossy wireless multi-hop networks, but also changes other features of the TCP protocol such as the evolutionary process of the congestion window, which raises new issues about rate control, fairness etc. This paper analyzes the evolutionary process of network coded TCP against lossy links and error correcting coding. Ignoring the slow start phase,...
The presented study explores the extent to which tactile-force stimulus delivered to a hand holding a force-feedback joystick can serve as a platform for a brain-computer interface (BCI). The four pressure directions are used to evoke tactile brain potential responses, thus defining a tactile-force brain computer interface (tfBCI). We present brain signal processing and classification procedures leading...
The symmetry of packet delay is one of basic assumption of PTP (Precision Time Protocol). But most existing networks could not meet this assumption to achieve high accuracy PTP synchronization. The FIFO block is one of main reasons that lead packet delay asymmetry according to the research. So the packet delay estimation with minimum FIFO block is put forward to try to select those “lucky packets”...
Gossip and tree-based aggregation algorithms are two popular solutions for distributed averaging in wireless networks. The former uses only local message exchanges and requires no routing structures whereas the latter requires building a spanning tree. In this paper we provide a detailed comparison of their performance in terms of communication overhead, accuracy, latency and energy consumption using...
Time synchronization is a fundamental problem in any distributed system. In particular, wireless sensor networks require scalable time synchronization for implementing distributed tasks on multiple sensor nodes. This paper proposes an energy efficient Coefficient Exchange Synchronization Protocol (CESP) based on a receiver-receiver synchronization scheme that minimizes the impact of access-time delays...
Accurate traffic classification is an essential element of emergent cloud and datacenter architectures. Increasingly, however, different types of application traffic from the cloud are tunnelled over HTTP, thereby making accurate classification a challenge. Applications tunnelled over HTTP are wide in scope and diverse in nature, and include mapping, email, video, image, audio and file. This paper...
Open-source payload-based traffic classifiers are frequently used as a source of ground truth in the traffic classification research field. However, there have been no comprehensive studies that provide evidence that the classifications produced by these software tools are sufficiently accurate for this purpose. In this paper, we present the results of an investigation into the accuracy of four open-source...
Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in their network design. WSNs are vulnerable to various types of attacks, and as such, they require mechanisms to defend against them. Several anomaly detection algorithms have...
Nowadays, the growing presence of distributed energy resources (DER) makes the management of the distribution grid more complex, thus requiring distributed monitoring and controlling capabilities. The deployment of locally distributed intelligent devices over a large area involves a high performance network infrastructure (typically based on heterogeneous communication technologies) in order to provide...
The evolution of industrial communication inexorably moves towards Ethernet based networks. One important reason for using Ethernet at the shop floor is to participate on the continuous advancements of standard Ethernet. In contradistinction to the star topology, used commonly in home and office networks, in the industrial automation most common network structure is line. It is due to the fact that...
Face recognition in video is becoming increasingly important due to the abundance of video data captured by surveillance cameras, mobile devices, Internet uploads, and other sources. Given the aggregate of facial information contained in a video (i.e., a sequence of face images or frames), video-based face recognition solutions can potentially alleviate classic challenges caused by variations in pose,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.