The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the 5G technology, data traffic is going to grow by a factor of 1000, while the number of connected devices is likely going to be two orders of magnitude higher. With smartphones being cornerstone in our daily lives, understanding mobile network performance is critical for providing a superior user experience and, consequently, determining the success of an application. This paper presents a...
In this paper we give the first blind signature protocol for code-based cryptography. Our approach is different from the classical original RSA based blind signature scheme, it is done in the spirit of the Fischlin approach [9] which is based on proofs of knowledge. To achieve our goal we consider a new tool for zero-knowledge (ZK) proofs, the Concatenated Stern ZK protocol, which permits to obtain...
Doing early design space exploration for manycore architectures is a challenge, all the more when the focus is on complex coherence protocols. Implementing such protocols in realistic simulation models is costly both in modelling effort and execution time. We propose a trace-driven method to accurately compare cache coherence protocols while keeping cache modelling at a high level of abstraction....
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Replicating redundant requests has been shown to be an effective mechanism to defend application performance from high capacity variability — the common pitfall in the cloud. While the prior art centers on single-tier systems, it still remains an open question how to design replication strategies for distributed multi-tier systems, where interference from neighboring workloads is entangled with complex...
This work describes a clean-slate inter-domain routing protocol designed to meet the needs of the future mobile Internet. In particular, we describe the edge-aware inter-domain routing (EIR) protocol which provides new abstractions of aggregated-nodes (aNodes) and virtual-links (vLinks) for expressing network topologies and edge network properties necessary to address next-generation mobility related...
Video on Demand (VoD) streaming makes up an increasing portion of global IP traffic. Traditionally, data is served by content providers directly, putting a huge network load on the servers. We propose using our WebRTC-based protocols WebPeer and CodedWebPeer to create a P2P-assisted VoD streaming system with network coding. We introduce two metrics: network health to measure overall data saturation...
A novel approach of a testbed for embedded networking nodes has been conceptualized and implemented. It is based on the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes are running in parallel and are connected via so-called virtual interfaces. The presented approach is very efficient and allows a simple description of test cases without...
Software-defined networking (SDN) is an emerging and disruptive networking paradigm that emerged on campus networks but was soon recognized as having potential applicability in several other application areas, including Internet of Things (IoT) and Industrial IoT. Industrial IoT applications have requirements remarkably distinct from the ones of campus networks, particularly in what concerns timeliness...
Improve of the overall network efficiency between source and destination relay selection and interference free communication is important criteria in WSN. In this paper we are proposing SON based algorithm capable of simultaneous Scheduling and Routing in WSN. The proposes scheme contains the three stages, in first stage the sensor nodes are classified into different clusters and each nodes having...
Today, REST APIs have established as a means for realizing distributed systems and are supposed to gain even more importance in the context of Cloud Computing, Internet of Things, and Microservices. Nevertheless, many existing REST APIs are known to be not well-designed, resulting in the absence of desirable quality attributes that truly RESTful systems entail. Although existing analysis show, that...
This paper presents a design and implementation techniques to construct a universal microcontroller board based on realtime measurement and control applications. It is not only designed for realtime applications, but is also designed for supporting many modern WiFi devices that utilize TCP/IP protocol over internet networks. It means the proposed system fully supports many Internet-of-Things (IoT)...
Hashing produces compact representations for documents, to perform tasks like classification or retrieval based on these short codes. When hashing is supervised, the codes are trained using labels on the training data. This paper first shows that the evaluation protocols used in the literature for supervised hashing are not satisfactory: we show that a trivial solution that encodes the output of a...
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications...
Community networks establish a wireless mesh network among citizens, providing a network that is independent, free, and (in some cases) available where regular Internet access is not. Following initial disappointments with their performance and availability, they are currently experiencing a second spring. Many of these networks are growing fast, but with little planning and limited oversight. Problems...
Routing is the soul of wireless communication. It is the process through which best available path between the source and the destination nodes is identified. This selection procedure is carried out with the help of measurements that address various issues of the network. Such measurements are called as routing metrics. Routing metrics are in the course of evolution addressing the issues such as path...
The Routing Protocol for Low Power and Lossy Networks (RPL) has become the standard routing protocol for the Internet of Things (IoT). This paper investigates the use of RPL in dynamic networks and presents an enhanced RPL for different applications with dynamic mobility and diverse network requirements. This implementation of RPL is designed with a new dynamic Objective-Function (D-OF) to improve...
It is critical to provide sustained data throughput in edge computing, where several sensor devices generate information that needs to be fused and used for decision making in e.g., disaster incident scenes. To this end, we compare the effectiveness of two protocols, Hybrid Wireless Mesh Protocol (HWMP) and Greedy Perimeter Stateless Routing (GPSR), based upon their ability to stream data in a mesh...
Software-Defined Networking (SDN) is a new paradigm that is attracting significant attention from both academy and industry. In recent years, increasing research efforts have addressed the conception of programming interfaces—northbound APIs—which allow business-applications to properly communicate with SDN controllers and program the network. However, most of current SDN controllers still offer low-level...
Electrocardiogram (ECG) signals are one of the most common and important physiological signals for assessing cardiovascular health. The rapid advancement in wearable technology has opened new avenues for continuous monitoring of various cardiovascular diseases (CVDs) in non-clinical settings. At the same time, the amount of data available for analysis due to these unobtrusive sensors has increased...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.