Search results for " computing"
showing 10 items of 2075 documents
A Survey on Technologies Which Make Bitcoin Greener or More Justified
2022
According to recent estimates, one bitcoin transaction consumes as much energy as 1.5 million Visa transactions. Why is bitcoin using so much energy? Most of the energy is used during the bitcoin mining process, which serves at least two significant purposes: a) distributing new cryptocurrency coins to the cryptoeconomy and b) securing the Bitcoin blockchain ledger. In reality, the comparison of bitcoin transactions to Visa transactions is not that simple. The amount of transactions in the Bitcoin network is not directly connected to the amount of bitcoin mining power nor the energy consumption of those mining devices; for example, it is possible to multiply the number of bitcoin transactio…
A portable system for multiple parameters monitoring: towards assessment of health conditions and stress level in the automotive field
2019
In this work, an electronic portable combo system able to synchronously acquire multiple signals, e.g. electrocardiographic (ECG), photoplethysmographic (PPG) and breathing waveforms, is presented. The realized system is also capable of showing in real time some physiological parameters which can be used for assessing health/stress status of the volunteer, such as heart rate and breathing frequency and their trends over time. Thanks to the use of non-invasive PPG probes, of batteries as power supply, and to the possibility to add in the future additional sensors to acquire other signals, the system could also be employed inside vehicles for assessing the status of the driver. Finally, the r…
Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding
2009
Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…
Lau Effect And Binary Logic
1989
The Lau effect is applied to implement the whole set of binary logic operations optically. Our technique works with spatially incoherent light and does not require lenses or any other optical accessory.
Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
2021
International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…
Integration of cloud computing tools and knowledge bodies for the management of programming projects
2018
A Body of Knowledge (BOK) is a set of concepts and skills that represent the knowledge of a specific area of engineering or scientific discipline and ensure their common understanding [1]. A BOK can include technical terms and theoretical concepts as well as best practices [2] so in this document we will focus on the context of software engineering specifically in Software Project Management. In addition, Cloud Computing will is becoming the best way to deliver solutions that meet the current need for greater collaboration between companies, education and society. In this context, the learning of Software Project Management is important during the professional life of Informatica since it e…
Multi-Authored Manuscripts and Speedup in Academic Publishing
2014
It is unfair to count a n-authored paper as one paper for each coauthor, i.e., as n papers: this is “feeding the multitude”. Sharing the credit among coauthors by percentages or by simply dividing by n is fairer but somewhat harsh. So, we propose to take into account the productivity gains of parallelization by introducing a team bonus function that multiplies the allocation thereby increasing the credit allocated to each coauthor.The degree of parallelization cannot be determined exogenously discipline by discipline. So, one may propose that each team of coauthors indicates how the labor was organized to produce the paper. Unfortunately, the coauthors may systematically bias their answers …
Trusted Computing and DRM
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …
Experimental BIM applications in Archaeology: a work-flow
2014
In the last few decades various conceptual models, methods and techniques have been studied to allow 3D digital access to Cultural Heritage (CH). Among these is BIM (Building Information Modeling): originally built up for construction projects, it has been already experimented in the CH domain, but not enough in the archaeological field. This paper illustrates a framework to create 3D archaeological models integrated with databases using BIM. The models implemented are queryable by the connection with a Relational Database Management System and sharable on the web. Parametric solid and semantic models are integrated with 3D standardized database models that are finally manageable in the pub…
Towards a SDN-based architecture for analyzing network traffic in cloud computing infrastructures
2015
Currently, network traffic monitoring tools do not fit well in the monitoring of cloud computing infrastructures. These tools are not integrated with the control plane of the cloud computing stack. This lack of integration causes a deficiency in the handling of the re-usage of IP addresses along virtual machines, a lack of adaption and reaction on highly frequent topology changes, and a lack of accuracy in the metrics gathered for the networking traffic flowing along the cloud infrastructure. The main contribution of this paper is to provide a novel SDN-based architecture to carry out the monitoring of network traffic in cloud infrastructures. The architecture in based on the integration be…