Search results for " computing"

showing 10 items of 2075 documents

Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling

2014

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …

resource allocation; multi hop neworksSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingMulti-frequency time division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessresource allocationComputer Science Applications1707 Computer Vision and Pattern Recognitionmulti hop neworksHop (networking)Carrier-sense multiple accessScheduling (computing)resource allocation multi hop neworksComputer Networks and CommunicationSettore ING-INF/04 - AutomaticaControl and Systems EngineeringChannel access methodbusinessInformation SystemsComputer network
researchProduct

Robots, privacy and data protection

2015

A research on robots, drones and privacy/data protection, with focus on cloud robotics, Internet of Things, contracts and the use cases of telepresence, courier robots and smart cities quadricopters.

robot drones unmanned aerial vehicles internet of things cloud computing cloud robotics privacy data protection security remotely piloted aerial systems RPAS UAVSettore IUS/01 - Diritto Privato
researchProduct

Compact Quantum Circuit Design of PUFFIN and PRINT Lightweight Ciphers for Quantum Key Recovery Attack

2023

Quantum computing plays a vital role in the next generation computing platforms as researchers have achieved quantum supremacy by proving that quantum computers can outperform classical computers. These high performance computers will pose a serious threat to the security of the conventional cryptographic algorithms. The secret key of the conventional cryptographic algorithms when implemented by quantum circuits can easily be recovered with the help of Grover key search algorithm. The Grover’s algorithm requires low cost quantum implementation of cryptographic algorithms in order to mount the quantum key recovery attack successfully. Hence the low cost quantum implementation of conventional…

salauslogic gatesalgoritmitcostskvanttilaskentatietoturvaquantum circuitciphersqubitquantum computingencryption
researchProduct

Cognitive Linguistics as the Underlying Framework for Semantic Annotation

2012

In recent years many attempts have been made to design suitable sets of rules aimed at extracting the semantic meaning from plain text, and to achieve annotation, but very few approaches make extensive use of grammars. Current systems are mainly focused on extracting the semantic role of the entities described in the text. This approach has limitations: in such applications the semantic role is conceived merely as the meaning of the involved entities without considering their context. As an example, current semantic annotators often specify a date entity without any annotation regarding the kind of the date itself i.e. a birth date, a book publication date, and so on. Moreover, these system…

semantic annotation cognitive linguistics construction grammarSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalComputer sciencebusiness.industrycomputer.software_genreSemantic role labelingSemantic similaritySemantic equivalenceExplicit semantic analysisSemantic computingSemantic analyticsSemantic technologyArtificial intelligenceSemantic Web StackbusinesscomputerNatural language processing2012 IEEE Sixth International Conference on Semantic Computing
researchProduct

Cognitive Computing supported Medical Decision Support System for Patient’s Driving Assessment

2018

To smartly utilize a huge and constantly growing volume of data, improve productivity and increase competitiveness in various fields of life; human requires decision making support systems that efficiently process and analyze the data, and, as a result, significantly speed up the process. Similarly to all other areas of human life, healthcare domain also is lacking Artificial Intelligence (AI) based solution. A number of supervised and unsupervised Machine Learning and Data Mining techniques exist to help us to deal with structured data. However, in a real life, we pretty much deal with unstructured data that hides useful knowledge and valuable information inside human-readable plain texts,…

semantic similaritylääkärintarkastuksetcognitive computingdecision support systempäätöksentukijärjestelmätnatural language processingIBM Watsontekoälytietämysjärjestelmätmedical record processingdriving assessmentmedical ontology
researchProduct

On the use of composite indicators for mobile communications network management in smart sustainable cities

2020

Beyond 5G networks will be fundamental towards enabling sustainable mobile communication networks. One of the most challenging scenarios will be met in ultra-dense networks that are deployed in densely populated areas. In this particular case, mobile network operators should benefit from new assessment metrics and data science tools to ensure an effective management of their networks. In fact, incorporating architectures allowing a cognitive network management framework could simplify processes and enhance the network&rsquo

smart citiesComputer scienceDistributed computing02 engineering and technologylcsh:Technologylcsh:Chemistrycognitive management0202 electrical engineering electronic engineering information engineeringDesenvolupament sostenibleGeneral Materials ScienceUMTSInstrumentationlcsh:QH301-705.5Comunicació i tecnologiaFluid Flow and Transfer Processesbusiness.industrylcsh:TProcess Chemistry and TechnologyGeneral Engineering020206 networking & telecommunicationsCognitive networksustainable development goalslcsh:QC1-999Computer Science ApplicationsLTENetwork managementlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040HSPACellular network020201 artificial intelligence & image processingMobile telephonyMetric (unit)Performance indicatorbusinesslcsh:Engineering (General). Civil engineering (General)composite indicators5GUMTS frequency bandslcsh:Physics
researchProduct

An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach

2016

The Internet of Things (IoT) is widely used in advanced logistic systems. Safety and security of such systems are utmost important to guarantee the quality of their services. However, such systems are vulnerable to cyber-attacks. Development of lightweight anomaly based intrusion detection systems (IDS) is one of the key measures to tackle this problem. In this paper, we present a new distributed and lightweight IDS based on an Artificial Immune System (AIS). The IDS is distributed in a three-layered IoT structure including the cloud, fog and edge layers. In the cloud layer, the IDS clusters primary network traffic and trains its detectors. In the fog layer, we take advantage of a smart dat…

smart dataintrusion detection systemsesineiden internetfog computing
researchProduct

Towards Seamless IoT Device-Edge-Cloud Continuum:

2021

In this paper we revisit a taxonomy of client-side IoT software architectures that we presented a few years ago. We note that the emergence of inexpensive AI/ML hardware and new communication technologies are broadening the architectural options for IoT devices even further. These options can have a significant impact on the overall end-to-end architecture and topology of IoT systems, e.g., in determining how much computation can be performed on the edge of the network. We study the implications of the IoT device architecture choices in light of the new observations, as well as make some new predictions about future directions. Additionally, we make a case for isomorphic IoT systems in whic…

software architectureIoTsulautettu tietotekniikkaprogrammable worldembedded devicesohjelmistotuotantointernet of thingsliquid softwarepilvipalvelutedge computingisomorphismreunalaskentaohjelmistoarkkitehtuuriisomorphic softwareesineiden internetsoftware engineering
researchProduct

Software architectures for mobile computing

1999

software architecturenetworking infrastructurehybrid communicatorglobal connectivitymobile computingubiquitous computingminiaturisationbluetoothWAP architecture
researchProduct

Computational Rationality as a Theory of Interaction

2022

Funding Information: This work was funded by the Finnish Center for AI and Academy of Finland (“BAD” and “Human Automata”). We thank our reviewers, Xiuli Chen, Joerg Mueller, Christian Guckelsberger, Sebastiaan de Peuter, Samuel Kaski, Pierre-Alexandre Murena, Antti Keuru-lainen, Suyog Chandramouli, and Roderick Murray-Smith for their comments. Publisher Copyright: © 2022 ACM. How do people interact with computers? This fundamental question was asked by Card, Moran, and Newell in 1983 with a proposition to frame it as a question about human cognition - in other words, as a matter of how information is processed in the mind. Recently, the question has been reframed as one of adaptation: how …

sopeutuminenmallintaminenatk-laitteetreinforcement learninguser modelscognitive scienceihmisen ja tietokoneen vuorovaikutushuman-centered computinginteractionadaptationHCI theory concepts and modelstekoälyartificial intelligencekognitiotiedephilosophical/ theoretical foundations of artificial intelligenceteoriatCognitive modelingtietokoneetcomputing methodologiesindividual differencescomputational rationality
researchProduct