Search results for " computing"

showing 10 items of 2075 documents

Multipath extensions to the DYMO routing protocol

2007

Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.

Zone Routing ProtocolDynamic Source Routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer network2007 9th IFIP International Conference on Mobile Wireless Communications Networks
researchProduct

Simulation-based Evaluation of DMAMAC - A Dual-Mode Adaptive MAC Protocol for Process Control

2015

Control systems automation is widely used in many industrial domains and have strong requirements on delay, throughput, robustness, and reliability. In the domain of networked control systems, the medium of communication is increasingly involving wireless communication along-side conventional wired communication. Issues ranging from energy efficiency and reliability to low-bandwidth have to be addressed to enable the transition to increased use of wireless communication. In earlier work, we have proposed the Dual-Mode Adaptive MAC (DMAMAC) protocol relying on a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA). The DMAMAC protocol is able to dynami…

Zone Routing ProtocolTransient statebusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessEnergy consumptionWirelessSuperframeWired communicationbusinessEfficient energy useComputer networkProceedings of the Eighth EAI International Conference on Simulation Tools and Techniques
researchProduct

Resource Self-management under an SLA within a Cloud Networking Environment

2015

International audience; Today, cloud networking is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end-to-end SLA between a Cloud Service User (CSU) and several Cloud Service Providers (CSPs) in a cloud networking environment (inter-cloud Broker and Federation architecture). Then, we propose the self-management of cloud resources under the established SLA using specific autonomic cloud managers. We simulate our proposed fra…

[ INFO ] Computer Science [cs]Cloud NetworkingAutonomic ComputingSelf-managementService Level Agreement[INFO]Computer Science [cs][INFO] Computer Science [cs]Quality of Service.
researchProduct

PTNet: An efficient and green data center network

2017

International audience; In recent years, data centers have witnessed an exponential growth for hosting hundreds of thousands of servers as well as to accommodating a very large demand for resources. To fulfill the required level of demand, some approaches tackled network aspects so to host a huge number of servers while others focused on delivering rapid services to the clients by minimizing the path length between any two servers. In general, network devices are often designed to achieve 1:1 oversubscription. Alternatively, in a realistic data center environment, the average utilization of a network could vary between 5% and 25%, and thus the energy consumed by idle devices is wasted. This…

[ INFO ] Computer Science [cs]Computer Networks and CommunicationsComputer scienceDistributed computing02 engineering and technologyNetwork topology[ INFO.INFO-AO ] Computer Science [cs]/Computer ArithmeticTheoretical Computer Science03 medical and health sciences[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0302 clinical medicineArtificial IntelligenceRobustness (computer science)Energy savingServerArchitecture0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO][INFO]Computer Science [cs]ComputingMilieux_MISCELLANEOUSAverage path lengthInterconnectionNetwork topologyEnergy[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industry[INFO.INFO-AO]Computer Science [cs]/Computer ArithmeticScalability020206 networking & telecommunicationsData center networkAverage path lengthNetworking hardware[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]Hardware and Architecture030220 oncology & carcinogenesis[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]ScalabilityData center[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwareComputer network
researchProduct

New Optimization and Security Approaches to Enhance the Smart Grid Performance and Reliability

2016

International audience; Nowadays, the Smart Grid (SG) is becoming smarter thanks to the integration of different information and communication technologies to enhance the reliability and efficiency of the power grid. However, several issues should be met to ensure high SG performance. Among these issues, we cite the problem of electric vehicles (EVs) integration into the SG to avoid electricity intermittence due to the important load that EVs can create. Another issue is the SG communication network security that can be attempted by malicious intruders in order to create damages and make the power grid instable. In this context, we propose at a first level a Bayesian game-theory model that …

[ INFO ] Computer Science [cs]Computer scienceDistributed computing02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Bayesian gameGame TheoryRobustness (computer science)Bayesian Nash Equilibrium0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Smart GridChallengesIntrusion Detection System020203 distributed computingbusiness.industry020206 networking & telecommunicationsTelecommunications networkSmart gridInformation and Communications TechnologyElectricitybusinessGame theoryElectric VehiclesComputer network
researchProduct

Comparative Study of the Mobile Learning Architectures

2016

International audience; With the emergence of mobile devices (Smart Phone, PDA, UMPC, game consoles, etc.), learning is changing from electronic learning (e-Learning) to mobile learning (m-learning). In fact, due to the mobility feature, it seems that the m-learning have to be adapted with the change within the context. Several researches addressed this issue and implemented a mobile learning environment to prove its usefulness and feasibility in various domains. In this article, we conduct a comparative study between a list of mobile learning architectures and methods that are presented in the literature. The performance of these architectures is evaluated based on several criteria, such a…

[ INFO ] Computer Science [cs]Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mobile computingMobile TechnologyM-learning02 engineering and technology[INFO] Computer Science [cs]Context-change managementcomputer.software_genreRobot learning[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020204 information systems0202 electrical engineering electronic engineering information engineeringMobile searchMobile technology[INFO]Computer Science [cs]AdaptationLearning methodMultimediaLearning environmentEducational technologyContextSynchronous learningE-LearningM-learning020201 artificial intelligence & image processingcomputer
researchProduct

Extending CSG with projections: Towards formally certified geometric modeling

2015

We extend traditional Constructive Solid Geometry (CSG) trees to support the projection operator. Existing algorithms in the literature prove various topological properties of CSG sets. Our extension readily allows these algorithms to work on a greater variety of sets, in particular parametric sets, which are extensively used in CAD/CAM systems. Constructive Solid Geometry allows for algebraic representation which makes it easy for certification tools to apply. A geometric primitive may be defined in terms of a characteristic function, which can be seen as the zero-set of a corresponding system along with inequality constraints. To handle projections, we exploit the Disjunctive Normal Form,…

[ INFO ] Computer Science [cs]Disjoint setsDisjunctive normal formIndustrial and Manufacturing EngineeringProjection (linear algebra)Interval arithmeticConstructive solid geometryConstructive solid geometry[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]Homotopy equivalenceGeometric primitiveBinary expression tree[INFO]Computer Science [cs]ProjectionComputingMilieux_MISCELLANEOUSMathematicsDiscrete mathematics[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]HomotopyFormal methodsDisjunctive normal formComputer Graphics and Computer-Aided Design[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]Computer Science ApplicationsAlgebra[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct

Une approche Web sémantique et combinatoire pour un système de recommandation sensible au contexte appliqué à l'apprentissage mobile

2014

National audience; Au vu de l'émergence rapide des nouvelles technologies mobiles et la croissance des offres et besoins d'une société en mouvement en formation, les travaux se multiplient pour identifier de nouvelles plateformes d'apprentissage pertinentes afin d'améliorer et faciliter le processus d'apprentissage à distance. La prochaine étape de l'apprentissage à distance est naturellement le port de l'e-learning (apprentissage électronique) vers les nouveaux systèmes mobiles. On parle alors de m-learning (apprentissage mobile). La recherche d'informations dans le domaine du m-learning peut être définie comme une activité dont la fi-nalité est de localiser et de délivrer des contenus d'a…

[ INFO ] Computer Science [cs]Recommandation[INFO.INFO-WB] Computer Science [cs]/Weboptimisation[INFO.INFO-WB]Computer Science [cs]/Web[ INFO.INFO-WB ] Computer Science [cs]/Web[INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG][INFO] Computer Science [cs][ INFO.INFO-LG ] Computer Science [cs]/Machine Learning [cs.LG][INFO.INFO-MC]Computer Science [cs]/Mobile Computing[INFO.INFO-MC] Computer Science [cs]/Mobile Computing[INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG][ INFO.INFO-MC ] Computer Science [cs]/Mobile Computing[INFO]Computer Science [cs]m-learningAlgorithmes combinatoiresweb sémantiquecontexte
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

NoC based virtualized FPGA as cloud Services

2016

International audience; Web-based applications are increasingly demanding many computationally intensive services. On the other hand, FPGA-based hardware accelerators(HwAcc) provide good performance in accelerating computationally intensive applications. In addition, some FPGAs support a dynamic partial reconfig-uration (DPR) techniques to virtualize and share the FPGA underlying hardware resources in time multiplexing during run-time to save resource and power consumption. Integrating FPGA in a cloud environment is an indispensable way to improve efficiency and provide acceleration services to demanding users. More importantly, in recent years it was proved that FPGA resources deployed in …

[ INFO.INFO-DC ] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Virtualized FPGA[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systems[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Cloud ComputingNetwork-on-Chip[INFO.INFO-ES] Computer Science [cs]/Embedded SystemsHard- ware accelerators
researchProduct