The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we design and implement a scheme to build an optimal spanning tree over a hybrid network composed of SDN and legacy switches. SDN is an emerging network technology and gradually gaining adoption worldwide. However, during the technology transition period, which may last several years from now on, inevitably SDN switches and legacy switches will need to coexist in a network. In a legacy...
Privacy preservation in opportunistic networks, such as disruption and delay tolerant networks, constitutes a very challenging area of research. The wireless channel is vulnerable to malicious nodes that can eavesdrop data exchanges. Moreover, all nodes in an opportunistic network can act as routers and thus, gain access to sensitive information while forwarding data. Node anonymity and data protection...
Not far into the future, the power grid will be supported by response from the consumers, helping the grid operators in making more informed decisions about administrating electricity distribution. A critical enabler for a stable solution is the communication protocol between the consumer and the grid operator. Currently, there exist many evaluations of demand response strategies for shifting consumers'...
Web APIs provide interfaces for interaction among systems based on the existing infrastructure for hosting Web sites and applications. The REST architectural style is the most employed approach for building Web APIs. However, the flexibility provided by REST may result in implementations with low quality design, limited reuse and poor documentation. This paper describes a maturity model for classifying...
In this paper, we use the witness-functions to analyze cryptographic protocols for secrecy under nonempty equational theories. The witness-functions are safe metrics used to compute security. An analysis with a witness-function consists in making sure that the security of every atomic message does not decrease during its lifecycle in the protocol. The analysis gets more difficult under nonempty equational...
Computing k-nearest-neighbor graphs constitutes a fundamental operation in a variety of data-mining applications. As a prominent example, user-based collaborative-filtering provides recommendations by identifying the items appreciated by the closest neighbors of a target user. As this kind of applications evolve, they will require KNN algorithms to operate on more and more sensitive data. This has...
This work focuses on the quantification of node misbehavior in wireless sensor networks (WSNs). Misbehaving nodes are common within WSNs which are once detected, are penalized and in some cases eliminated from the network. However, node misbehavior might be relative i.e., a node may exhibit maliciousness or selfishness only to a specific set of nodes and may function normally for the rest. In these...
In this paper, we tackle the task of symbolic gesture recognition using inertial MicroElectroMechanicals Systems (MEMS) present in Smartphones. We propose to build a non-linear similarity metric based on a Siamese Neural Network (SNN), trained using a new error function that models the relations between pairs of similar and dissimilar samples in order to structure the network output space. Experiments...
This paper investigates the problem of fine-grained face verification under unconstrained conditions. For the conventional face verification task, the verification model is trained with some positive and negative face pairs, where each positive sample pair contains two face images of the same person while each negative sample pair usually consists of two face images from different subjects. However,...
The big changes in indoor illumination caused by the introduction of LED-based devices may have effects on the health and well-being of the persons that are still under study. From the point of view of flicker, these changes further highlight the inadequacy of the current international standard. With the aim of providing a contribution to a matter that involves several scientific disciplines, new...
The aim of the Kinship Verification in the Wild Evaluation (held in conjunction with the 2015 IEEE International Conference on Automatic Face and Gesture Recognition, Ljubljana, Slovenia) was to evaluate different kinship verification algorithms. For this task, two datasets were made available and three possible experimental protocols (unsupervised, image-restricted, and image-unrestricted) were designed...
In this paper we describe a behavioral state classifier employing a three-factor node reliability measure based upon inferred Ability, Integrity, and Benevolence (AIB) to assess node reliability. In contrast to typical scalar measures, this multi-metric index creates a reliability space that is more descriptive and in which distinctions can be drawn between node behaviors ranging from small deviations...
The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. In this paper, we propose a homogeneous and secure weighted clustering algorithm which is an extended version of our previous algorithm (ES-WCA) for mobile WSNs using a combination of five metrics. Among these metrics lie the behavioral...
In this paper, the author represents energy efficient data compression application based on LTC (Lightweight Temporal Compression) algorithm in wireless sensor networks (WSNs). WSNs are essentially constrained by motes' limited battery power and networks bandwidth. The author focuses on data compression algorithm which effectively supports data compression for data gathering in WSNs. Data reduction...
Measuring and comparing performance of an Internet multimedia signaling protocol across varying vendor implementations is a challenging task. Tests to measure the performance of the protocol as it is exhibited on a vendor device and conditions of the laboratory setup to run the tests have to be normalized such that no special favour is accorded to a particular vendor implementation. In this paper,...
A framework that aims to best utilize the mobile network resources for video applications is presented in this paper. The main contribution of the work proposed is the QoE-driven optimization method that can maintain a desired trade-off between fairness and efficiency in allocating resources in terms of data rates to video streaming users in LTE networks. This method is concerned with the control...
This paper presents a general framework for generating greedy algorithms for solving convex constraint satisfaction problems for sparse solutions by mapping the satisfaction problem into one of graph traversal on a rooted tree of unknown topology. For every pre-walk of the tree an initial set of generally dense feasible solutions is processed in such a way that the sparsity of each solution increases...
Traditional network monitoring involving packet capturing or flow sampling has many challenges such as scalability, accuracy and availability of processing resource when networks become large-scale, high-speed and heterogeneous. SDN is a promising approach to address these challenges, but each SDN switch has it's own capacity limitation, such as it's cache memory called TCAM, and thus it needs coordination...
In spite of their rapid growth, cloud applications still heavily rely on the network communication infrastructure, whose stability and latency directly affect the quality of experience. In fact, as mobile devices need to rapidly get real-time information and files from the cloud, it becomes an extremely important factor for cloud providers to deliver a better user experience. In this paper, we specify...
Pervasive computing devices frequently rely upon wireless ad hoc connections to exchange information with neighboring systems. The density of these types of wireless transactions will steadily increase as the Internet of Things (IoT) expands. To mitigate the growing demand for wireless bandwidth, the available frequency bands can be more effectively shared and reused through the use of transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.