Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
GB/T 28925-2012 is a standard of P. R. China for active radio frequency identification (RFID). It defines wireless communications between reader and tag at 2.45GHz. Framed Slotted Binary Tree (FSBT) anti-collision protocol is adapted in it. However, performance of FSBT is not evaluated and parameters of FSBT are not estimated. A metrics for evaluating time performance and another metrics for evaluating...
We present the first comprehensive link-level measurements in an operational large-scale urban sensor network. By carefully analyzing the performance metrics, we seek to answer several fundamental questions: what are the characteristics of links in a real large-scale network, and what causes link performance degradation? The key findings of this study are that (1) the performance of intermediate links...
Application Performance Monitoring (APM) is crucial to any enterprise to ensure that the performance of its application or service is meeting the service level agreements. There is an inherent need for the APM of traditional networks to evolve, with the advances in the internet technologies. In this paper, we present a novel approach and framework for realizing a futuristic APM for Software Defined...
Improvements to sensor devices including micro-electro mechanical devices that are used for information collection and dissemination has led to the introduction of Wireless Sensor Networks (WSN). Sensor nodes in a WSN are deployed over an area to collect data from the surroundings and to perform additional actions including data aggregation and storage, computations and data transmission to gateway...
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many security functionalities, but it is hard...
Recently, there have been growing interests in solving distributed consensus optimization problems over directed networks that consist of multiple agents. In this paper, we develop a first-order (gradient-based) algorithm, referred to as Push-DIGing, for this class of problems. To run Push-DIGing, each agent in the network only needs to know its own out-degree and employs a fixed step-size. Under...
This paper describes the AcTiVComp: detection and recognition of Arabic Text in Video competition in conjunction with the 23rd International Conference on Pattern Recognition (ICPR). The main objective of this competition is to evaluate the performance of participants' algorithms to automatically locate and/or recognize overlay text lines in Arabic video frames using the freely available AcTiV dataset...
Wireless sensor networks are valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In most applications, the sensors act as data sources and forward information generated by event triggers to a central sink or base station (BS). The unique role of the BS makes it a natural target for...
Content distribution in vehicular networks is greatly impaired by high mobility and intermittent connectivity. Social-aware content distribution schemes based on typical centrality metrics address the challenge, however they suffer due to their network-centric nature instead of information centric. We suggest to exploit the recently proposed information-centric networking architecture which cater...
The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion...
In this paper, we propose a policy-based model to achieve end-to-end (E2E) service negotiation among multiple domains that constitute E2E path. The model relies on a centralized approach, realized via the third party (3P) agent, which acts as a proxy server for local (per-domain) management entities. We demonstrate the proposed model on the implementation of policies for allocation of performance...
With the growing of available large datasets for evaluation, face detection in recent literature has progressed rapidly. However, little research has been dedicated to develop a face detector robust to all possible variations. To address this problem, novel unconstrained datasets containing faces with more challenging variations are proposed. We notice that some recent face detectors have not been...
The relay node placement problem in the wireless sensor network have been studied extensively in the last few years. The goal of most of these problems is to place the fewest number of relay nodes in the deployment area so that the network formed by the sensors nodes and the relay nodes is connected. Most of these studies are conducted for the unconstrained budget scenario, in the sense that there...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
In current Enterprise WLANs (EWLANs), traffic load on access points (APs) is often unevenly distributed as wireless stations (WS) independently select the AP with best signal strength to associate with, which leads to issues such as sub-optimal network throughput and degradation of user quality of experience (QoE). Existing load balancing solutions based on the received signal strength indicator (RSSI)...
The Locator/Identifier Separation Protocol (LISP) was specified a few years ago by the Internet Engineering Task Force (IETF) to enhance the Internet architecture with novel inbound control capabilities. Such capabilities are particularly needed for multihomed networks that dispose of multiple public IP routing locators for their IP networks, and that are willing to exploit them in a better way than...
In this paper, we present EMaaS, for Event Management as a Service, a multi-tenant cloud service to outsource the management of monitoring events in the cloud. Furthermore, we provide a secure multi-party computation (SMC) protocol for complex monitoring event processing. The protocol is integrated to EMaaS and uses some properties of encryption schemes. Finally, we evaluate the protocol security,...
Recent years, Vehicular ad hoc Network (VANET) attracts tremendous attention due to its broad application prospects. However, channel fading, frangible link, unstable network topology caused by vehicles' high mobility and strict requirements to the quality of service (QoS) have become major challenges of VANET. Many algorithms have been proposed to ensure a stable network topology and it has been...
Wireless Sensor Networks (WSNs) are generally deployed in remote sites in order to sense the environment and acquire a set of data useful for analysis, monitoring and optimization algorithms. The use of the WSNs in remote and rugged areas, where battery replacement is not practical, requires extending the network lifetime. The proposed solution in this work, is using low-power Raspberry Pi platform...
Open Source Software (OSS) is distributed and maintained collaboratively by developers all over the world. However, frequent personnel turnover and lack of organizational management makes it difficult to capture the actual development effort. Various OSS maintenance effort estimation approaches have been developed to provide a way to understand and estimate development effort. The goal of this study...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.