Search results for " networking"

showing 10 items of 1264 documents

Improving RF Fingerprinting Methods by Means of D2D Communication Protocol

2019

Radio Frequency (RF) fingerprinting is widely applied for indoor positioning due to the existing Wi-Fi infrastructure present in most indoor spaces (home, work, leisure, among others) and the widespread usage of smartphones everywhere. It corresponds to a simple idea, the signal signature in a location tends to be stable over the time. Therefore, with the signals received from multiple APs, a unique fingerprint can be created. However, the Wi-Fi signal is affected by many factors which degrade the positioning error range to around a few meters. This paper introduces a collaborative method based on device-to-device (D2D) communication to improve the positioning accuracy using only fingerprin…

Indoor positioningComputer Networks and CommunicationsComputer scienceReal-time computinglcsh:TK7800-83605G-tekniikkaD2D02 engineering and technologyRF fingerprintingSignal0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringRFIDSIMPLE (military communications protocol)ta213etätunnistuslcsh:ElectronicsFingerprint (computing)indoor positioning020206 networking & telecommunicationsSignature (logic)RF FingerprintingHardware and ArchitectureControl and Systems EngineeringsisätilapaikannusSignal Processing020201 artificial intelligence & image processingRadio frequencyCommunications protocol5G5G
researchProduct

A formal model based on Game Theory for the analysis of cooperation in distributed service discovery

2016

New systems can be designed, developed, and managed as societies of agents that interact with each other by offering and providing services. These systems can be viewed as complex networks where nodes are bounded rational agents. In order to deal with complex goals, they require cooperation of the other agents to be able to locate the required services. The aim of this paper is formally and empirically analyze under which circumstances cooperation emerges in decentralized search of services. We propose a repeated game model that formalizes the interactions among agents in a search process where agents are free to choose between cooperate or not in the process. Agents make decisions based on…

Information Systems and ManagementComputer scienceProcess (engineering)BIBLIOTECONOMIA Y DOCUMENTACION02 engineering and technologyEconomiaNash equilibriumTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceOrder (exchange)Repeated games0202 electrical engineering electronic engineering information engineeringCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALDistributed service discoveryManagement science020206 networking & telecommunicationsRational agentComplex network16. Peace & justiceComputer Science ApplicationsRisk analysis (engineering)Control and Systems EngineeringNash equilibriumBounded functionsymbolsRepeated game020201 artificial intelligence & image processingNetworksGame theoryLENGUAJES Y SISTEMAS INFORMATICOSSoftwareInformation Sciences
researchProduct

Implications of Theories of Language for Information Systems

1985

This article demonstrates how language views can be adopted into an information systems context. We distinguish here between five language views: denotational, generative, cognitive, behavioristic, and interactionist. These views differ in their assumptions about he origin of linguistic behavior, the primary functions of language, elements of language, and the nature of linguistic knowledge. Information system development approaches can be characterized by their underlying language views. This explains great differences in development methods and research. Thus, language views have implications and should be chosen continency for a given information system context.

Information Systems and ManagementLanguage identificationModeling languageComputer scienceComprehension approachObject languagePicture languageLinguisticsComputer Science ApplicationsManagement Information SystemsPhilosophy of languageUniversal Networking LanguageNatural languageInformation SystemsMIS Quarterly
researchProduct

Identity and Access Management for Remote Maintenance Services in Business Networks

2007

Access to information systems across corporate boundaries with high demands to privacy and trust result into ambitious research and development targets. This study provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous ICT and security infrastructures. We aim at describing specifics of identity and access management in inter-organizational collaboration, and a vision and arguments for identity and access management in a business network. A case study with Metso Paper, Inc., the leading manufacturer of paper machinery and related services, validates the results, thus providing a motivating example of the…

Information managementKnowledge managementbusiness.industryData managementBusiness networkingSecurity managementBusinessDigital firmSecurity information and event managementIdentity managementBusiness relationship management
researchProduct

The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective

2019

Virtualization in the context of blockchain systems represents an essential phase in the development and migration of services from public chains to enterprise logic. Most of the ongoing blockchain uses-cases are using the existing public ledgers, but for business products and services, there is a need for custom tailored solutions to ensure flexibility and security. The Ethereum Virtual Machine has opened new ways to solve problems that require a public proof by executing logic on a decentralized ecosystem. In a natural evolutive process, virtualization logic was shaped by numerous architectures and business requirements. Beside performance and scalability, enterprise virtual machines are …

Information privacyBusiness requirementsbusiness.industryComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyVirtualizationcomputer.software_genreVirtual machineScalability0202 electrical engineering electronic engineering information engineeringBusiness logic020201 artificial intelligence & image processingSoftware engineeringbusinessFormal verificationcomputer
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Privacy and temporal aware allocation of data in decentralized online social networks

2017

Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…

Information privacyComputer sciencePrivacy policyControl (management)02 engineering and technologyInterval (mathematics)Computer securitycomputer.software_genreAvailability predictionTheoretical Computer ScienceSet (abstract data type)0202 electrical engineering electronic engineering information engineeringFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData availabilityOrder (business)Computer ScienceDecentralized online social networkDecentralized online social networks020201 artificial intelligence & image processingbusinesscomputerData privacyComputer network
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct