The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
Cloud computing is taking the technology world by storm because of the varieties of services offered by the cloud service providers (CSPs). Despite numerous benefits offered by CSPs, there are some security issues that may dissuade users from using it. In this service, different virtual machines (VMs) share the same physical resources, these VMs are known as co-resident VMs. The shared physical resources...
Network attack and defense game becomes more and more intense in present world. The length of the average recovery has become an important indicator to quantify the robustness of the network. In this way, this paper presents a network attack and defense game analysis method based on the mean time to repair as quantitative indicator. This method shows that the complexity of the network components,...
A network of drone cameras can be deployed to cover live events, such as high-action sports game played on a large field, but managing networked drone cameras in real-time is challenging. Distributed approaches yield suboptimal solutions from lack of coordination but coordination with a centralized controller incurs round-trip latencies of several hundreds of milliseconds over a wireless channel....
Topic-based pub/sub is a widely used communication mechanism in distributed systems for targeted information dissemination between loosely coupled entities. To scale dynamically depending on the current communication demands, pub/services can be conveniently deployed in the cloud. To provide fast dissemination, the service can be distributed across multiple cloud regions. The architectural design...
The paper is devoted to analyzing unsafe features of an Extended Finite State Machine such as the exceeding of the value of a context variable and/or an output parameter, the reachability of critical states, etc. As the ordinary simulation of an EFSM is very complex, the well known verifier Java Path Finder is used for this purpose. The EFSM is implemented as a template Java code that is checked for...
The main goal of our study is to find the optimal service rate and service price to retain customers in a 2-servers service system where customers may flow to the quicker server. In common queuing systems, the initial demand is divided into equal demands to each server. But, when customers are wait too long in a queue, they may turn to join another queue which have an impact on effective arriving...
Lag compensation is widely implemented in shooter games to mitigate the impact of network latency. “Shot around a corner” is an inconsistency introduced by lag compensation that still exists in many recent titles. In this paper, we investigate the influence of network latency and movement speeds on the rollback distances, and how they in turn affect the perceived “shot around a corner” frequencies...
The low performance and power limitations of mobile devices severely limit the complexity and the duration of playing sessions of mobile games. This article examines the possibility of using computation-offloading to mitigate these problems while keeping the game playable. We design Mirror, a framework for offloading computation targeted at the demanding performance requirements of sophisticated mobile...
The performance of GPUs on mobile devices is generally the bottleneck of multimedia mobile applications (e.g., 3D games and virtual reality). Previous attempts to tackle the issue mainly migrate GPU computation to servers residing in remote cloud centers. However, the costly network delay is especially undesirable for highly-interactive multimedia applications since a fast response time is critical...
DiveReal is a social virtual world: people get in primarily to meet and talk to others. But unlike its classical counterparts, it does not rely on servers to put people together. Instead, it uses an overlay that grows as more people get in. For the user, this means a different experience: the world is not anymore divided in “rooms”, “islands” or “realms” but accepts everyone, possibly millions, in...
Incentive-driven advanced attacks have become a major concern to cyber-security. Traditional defense techniques that adopt a passive and static approach by assuming a fixed attack type are insufficient in the face of highly adaptive and stealthy attacks. In particular, a passive defense approach often creates information asymmetry where the attacker knows more about the defender. To this end, moving...
This paper sought to understand the effectiveness of the traditional and cloud-based e-learning model. The growth of internet has been a game changer in the education sector. The internet has made it easy to for learners and educators to share information interactively, which is vital in enhancing education. Nonetheless, the storage of the content of learning has led to the adoption of cloud computing...
It has been previously determined that SYN packet inter arrival times are conformant with Benford's law, which predicts the frequency of the leading digits in naturally occurring collections of numbers, and suggested that conformity or non-conformity to Benford's law could be used to detect network anomalies. This paper expands upon that suggestion by making three contributions. First, we verify that...
We present the design, development, and deployment of an inexpensive, power-efficient, clustered, and scalable wireless sensor network (WSN) testbed. The testbed operates in a harsh environment in which neither GPS nor Internet connectivity are available. We use this testbed to collect real-time data during football games and other major events at Bobby Dodd stadium at Georgia Tech. The sensing devices...
Facing the increasing energy demands associated with the perspective of fifth generation (5G) wireless networks, the Mobile Network Operators (MNOs) are motivated to gradually convert their traditional Radio Access Network (RAN) infrastructure to more flexible and power efficient centralized architectures, i.e., Cloud-RAN (C-RAN). Apart from their promising benefits in terms of management and network...
The increasing number of smart vehicles and their resource hungry applications pose new challenges in terms of computation and processing for providing reliable and efficient vehicular services. Mobile Edge Computing (MEC) is a new paradigm with potential to improve vehicular services through computation offloading in close proximity to mobile vehicles. However, in the road with dense traffic flow,...
The public key encryption scheme with conjunctive keyword search (PECKS) is one of the most important techniques used for sensitive users' data outsourced to the third party, especially the cloud storage. However, most existing PECKS schemes need to construct a secure channel, which is usually costly. To solve this problem, some scholars have proposed several secure channel-free PECKS schemes, however,...
The relevance of data created in or about the IoT has a strong reliance on the context, especially spatiotemporal context, of the device and application perceiving it. To ensure that applications perceive data items that are relevant to the current context, it is necessary to restrict when each item is available. To control an application's perceptions of data availability, data items are often put...
A distributed virtual environment (DVE) consists of multiple network nodes (servers), each of which can host many users that consume CPU resources on that node and communicate with users on other nodes. Users can be dynamically migrated between the nodes, and the ultimate goal for the migration policy is to minimize the average system response time perceived by the users. In order to achieve this,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.