Search results for " Computer science"

showing 10 items of 3983 documents

IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

2017

International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]mobility management protocolshandover latency[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSeamless vertical handover[INFO]Computer Science [cs][INFO] Computer Science [cs]IEEE 802.21 MIH
researchProduct

HQMR: Hybrid QoS based Routing Protocol for Wireless Mesh Environment

2015

International audience; Wireless Mesh Networks (WMNs) have been attracting more and more interest from both academic and industrial environments for their seamless broadband connectivity to Internet networks. Besides, providing QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD) is a challenging issue in such environment. Thus, we propose a novel QoS based routing protocol for wireless mesh infrastructure, called Hybrid QoS Mesh Routing (HQMR). Moreover, a clustering algorithm is developed to enhance scalability issues within the mesh infrastructure. HQMR is composed of two routing sub-protocols: a reactive routing protocol for intr…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]ns-3[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]HQMRQoS routingNetwork Simulator[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Mesh Network
researchProduct

TourismKM: a new Web Semantic based approach for E-Tourism

2010

International audience; Since 1970, technology innovations transformed radically the tourism processes and strategies, essentially with the Internet apparition. Nowadays, E-Tourism systems are well implanted into the Internet, with a lot of offers and online possibilities (reservations, virtual visit, etc.). Nevertheless, with the great evolution of the Internet, users' needs and attends changed too, they are now looking for more personalized and adapted contents. Here is the lack of the most E-Tourism systems, they are not, or a little, user centered. Based both on techniques of the Semantic Web and Adaptive Hypermedia Systems, this paper presents a solution for dynamic adaptation of the o…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Adaptive web systeme-tourism[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]domain ontology[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]adaptive hypermedia system
researchProduct

Authentication and authorization security solution for the internet of thing

2021

The Internet of Things (IoT) represents the interconnection between the Internet and physical objects, places and environments. However, this extensive connectivity of IoT can be hampered by malicious interventions from cyber attackers. Thus, ensuring security for users and IoT devices remains a challenge, especially authentication and authorization, which are essential building blocks of the security process. This is due to the unconventional IoT characteristics, including scalability, heterogeneity, interoperability, and dynamic changes, which make the existing security measures inadequate. Indeed, these characteristics bring up several security requirements to consider when defining a se…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]AuthenticationHôtel intelligent[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]SecurityAuthorizationSécuritéSmart HotelAuthentification
researchProduct

Compression embarquée temps réel pour caméras rapides

2005

Les caméras rapides sont de puissants outils pour étudier, par exemple, la dynamique des fluides ou le déplacement des pièces mécaniques lors d'un processus de fabrication. Nous décrivons dans ce papier, un nouveau type de caméra rapide possédant un fonctionnement original. En effet, outre le fait qu'elle utilise comme d'autres caméras, la grande flexibilité des capteurs CMOS en termes d'acquisition (ROI), elle est novatrice au niveau du transfert des données. Celles-ci pouvant être à la fois traitées et/ou compressées en temps réel au sein même de la caméra. Le transfert peut s'effectuer alors à l'aide d'une simple connection série de type USB 2.0. On réalise ainsi l'économie d'une mémoire…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Capteur CMOSCompression d'image[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]compression d'imagestemps réelFPGAVidéo rapide
researchProduct

A stochastic approach for extracting community-based backbones

2022

Large-scale dense networks are very parvasive in various fields such as communication, social analytics, architecture, bio-metrics, etc. Thus, the need to build a compact version of the networks allowing their analysis is a matter of great importance. One of the main solutions to reduce the size of the network while maintaining its characteristics is backbone extraction techniques. Two types of methods are distinguished in the literature: similar nodes are gathered and merged in coarse-graining techniques to compress the network, while filter-based methods discard edges and nodes according to some statistical properties. In this paper, we propose a filtering-based approach which is based on…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Community structure Weighted network BackboneBackboneWeighted networkCommunity structure
researchProduct

Une architecture générique de Systèmes de recommandation de combinaison d'items : application au domaine du tourisme

2011

This thesis gives a generalization of the recommendation principle of recommender systems. Instead of considering a recommendation as an item, it is considered as a combination of several items following a given pattern. A recommendation of a unique item is then a particular case of this type of recommendation. The proposed recommender system framework is based on an architecture derived from work in adaptive hypermedia systems. Three layers are defined: a semantic layer, a user layer and an intelligence layer. The semantic layer consists of two sub-layers, a sub-layer modeling the content according to the general knowledge of the domain and a sub-layer modeling the content according to the…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]E-tourismeSystème d'information[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Ingénierie ontologique[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Système hypermédia adaptatifNo english keywordsRecherche opérationnelleOptimisation combinatoireSystème de recommandation
researchProduct

L’amour aux temps d’Internet : raison et émotion dans la recherche de partenaire en ligne des Chiliens

2017

This study analyzes the pages of online dating, more specifically, the interpretation that Chilean surfers perform these virtual spaces; interactions that occur within these web portals; and the sense that national users associate with their interactions. To answer these objectives not only a number of methods of collection and analysis of information is used, but in turn, the data generated is inserted in a wide theoretical discussion about love and relationships. Thus, in the first part of this work, the imagery of love is analyzed from its main myths and stories. Subsequently the historical and sociological constitution of relationships is analyzed. Epistemological, methodological and et…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]EmotionEmotionsDigital interactions[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Les sites de rencontre en ligneAmour romantiqueDating websiteReasonInteractions numeriquesRaisonRomantic love
researchProduct

Topologies réseau pour la réduction des coûts et l'amélioration de la qualité du service dans les centres de données massives

2017

Data centers (DC) are being built around the world to provide various cloud computing services. One of the fundamental challenges of existing DC is to design a network that interconnects massive number of nodes (servers)1 while reducing DC' cost and energy consumption. Several solutions have been proposed (e.g. FatTree, DCell and BCube), but they either scale too fast (i.e., double exponentially) or too slow. Effcient DC topologies should incorporate high scalability, low latency, low Average Path Length (APL), high Aggregated Bottleneck Throughput (ABT) and low cost and energy consumption. Therefore, in this dissertation, different solutions have been proposed to overcome these problems. F…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]Energy consumptionInfrastructure costLe coût de l'infrastructureAverage path lengthCloud computing servicesCentre de donnéesTopologies[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Cloud computingData center networkConsommation d'énergie
researchProduct

Semantics knowledge management for the 3D architectural reconstruction of building objects

2010

International audience; This paper presents the framework of an ongoing semantics knowledge management practice. The practice combines geometrical analysis of point cloud and semantic rules to detect 3D building objects for the purpose of achieving computational correctness and efficiency. We assume that improvement in the form of well organized classification (CLA) and order (ORD) is a solution. Statically related knowledge is classified as definition, partial knowledge and ambiguous knowledge and formally revealed with transitions between CWA (closed world assumption) and OWA (open world assumption). To achieve the correctness, formalization is proposed for the validation of the rules thr…

[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]FormalizationCognitionOntologyLogicKnowledge management[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH][ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]BuildingReconstructionSemantics
researchProduct