Search results for " networking"

showing 10 items of 1264 documents

The Urban Theory

2014

Il paradigma della rete è sempre più utilizzato per spiegare i processi dell’economia globalizzata e della cooperazione internazionale, e le dinamiche con cui i soggetti intercettano flussi materiali e immateriali e costruiscono relazioni. A seguito di una rassegna della letteratura internazionale sulle diverse teorie delle reti, la ricerca, da cui questo articolo è estratto, approfondisce la Urban Theory, che analizza la rete come quella forma relazionale che rilevando i flussi, reali o potenziali, connette i centri urbani. L’attenzione è posta sulle dinamiche urbane, in termini di competizione e coesione, che sono spiegate alla luce dei flussi e delle relazioni tra gli attori urbani, valu…

Settore ICAR/21 - Urbanisticareti di città flussi networking sistemi locali
researchProduct

Analysis of Users Behaviour from a Movie Preferences Perspective

2018

Despite their tremendous popularity, Online Social Networks (OSNs) have several issues related to the privacy of social users. These issues have motivated researchers to develop OSN services that take advantage of the decentralized platforms (such as P2P systems or opportunistic networks). Decentralized Online Social Networks (DOSNs) need specific approaches to manage the decentralization of social data. In particular, data availability is one of the main issues and current proposals exploit properties of the social relationships to manage it. At the best of our knowledge, there are no proposals which exploit similarity between users, expressed with the term homophily. Homophily has been we…

Settore INF/01 - InformaticaExploitComputer Networks and CommunicationsPerspective (graphical)020206 networking & telecommunications02 engineering and technologyHomophilyDecentralizationPopularityData scienceDecentralized Online Social NetworksData availabilityHomophilyTerm (time)Data availabilitySimilarity (psychology)0202 electrical engineering electronic engineering information engineeringDecentralized Online Social Network020201 artificial intelligence & image processingData availability; Decentralized Online Social Networks; Homophily; Computer Networks and Communications
researchProduct

Exploiting community detection to recommend privacy policies in decentralized online social networks

2018

The usage of Online Social Networks (OSNs) has become a daily activity for billions of people that share their contents and personal information with the other users. Regardless of the platform exploited to provide the OSNs’ services, these contents’ sharing could expose the OSNs’ users to a number of privacy risks if proper privacy-preserving mechanisms are not provided. Indeed, users must be able to define its own privacy policies that are exploited by the OSN to regulate access to the shared contents. To reduce such users’ privacy risks, we propose a Privacy Policies Recommended System (PPRS) that assists the users in defining their own privacy policies. Besides suggesting the most appro…

Settore INF/01 - InformaticaExploitbusiness.industryEnd userComputer sciencePrivacy policyInternet privacy020206 networking & telecommunications02 engineering and technologyPrivacy policiesRecommender systemTheoretical Computer ScienceRecommendation systemPrivacyComputer Science0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingDecentralized online social networksPrivacy policiebusinessSet (psychology)Personally identifiable informationDecentralized online social networks; Privacy; Privacy policies; Recommendation system; Security
researchProduct

Realizing airtime allocations in multi-hop Wi-Fi networks: A stability and convergence study with testbed evaluation

2019

Abstract REACT is a distributed resource allocation protocol used to negotiate a max–min allocation of airtime for multi-hop ad hoc wireless networks. Two approaches are proposed for a node to realize its REACT allocation in a contention-based MAC protocol. This is achieved by tuning its contention window to a value that corresponds to its allocation. Only a change in the allocation, due to a change in local traffic requirements or local network views, results in re-tuning. The approaches for tuning are implemented in commercial Wi-Fi devices and their stability and convergence are studied experimentally in the w-iLab.t wireless network testbed. These properties are also studied analyticall…

Settore ING-INF/03 - TelecomunicazioniComputer Networks and CommunicationsComputer sciencebusiness.industryWireless networkad-hoc networks.ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedLocal area network020206 networking & telecommunications02 engineering and technologyHop (networking)multi-hop network0202 electrical engineering electronic engineering information engineeringResource allocation020201 artificial intelligence & image processingbusinessWireless networkComputer networkComputer Communications
researchProduct

Coexistence between IEEE802.15.4 and IEEE802.11 through cross-technology signaling

2017

When different technologies use the same frequency bands in close proximity, the resulting interference typically results in performance degradation. Coexistence methods exist, but these are often technology specific and requiring technology specific interference detection methods. To remove the root cause of the performance degradation, devices should be able to negotiate medium access even when using different technologies. To this end, this paper proposes an architecture that allows crosstechnology medium access by means of a Time Division Multiple Access (TDMA) scheme. In order to achieve cross-technology synchronization, which is required for the TDMA solution, an energy pattern beacon…

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTestbedTime division multiple access020206 networking & telecommunications02 engineering and technologyInterference (wave propagation)Radio spectrumSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringWirelessIBCN020201 artificial intelligence & image processingMAC protocols interference mitigation crosstechnology TDMA scheme energy pattern beacon parameter negotiationbusinessEnergy (signal processing)Degradation (telecommunications)2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
researchProduct

Cross-Technology WiFi/ZigBee Communications: Dealing With Channel Insertions and Deletions

2016

In this letter, we show how cross-technology interference can be exploited to set up a low-rate bidirectional communication channel between heterogeneous WiFi and ZigBee networks. Because of the environment noise and receivers' implementation, the cross-technology channel can be severely affected by insertions and deletions of symbols, whose effects need to be taken into account by the coding scheme and communication protocol.

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryWiFichannelinterferencewireless coexistenceComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunications020302 automobile design & engineeringinterference; wireless coexistence; WLAN; Modeling and Simulation; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic Engineering02 engineering and technologyComputer Science ApplicationsWLANZigBee0203 mechanical engineeringModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessCommunications protocolComputer networkCommunication channelIEEE Communications Letters
researchProduct

MAC design on real 802.11 devices: From exponential to Moderated Backoff

2016

In this paper we describe how a novel backoff mechanism called Moderated Backoff (MB), recently proposed as a standard extension for 802.11 networks, has been prototyped and experimentally validated on a commercial 802.11 card before being ratified. Indeed, for performance reasons, the time critical operations of MAC protocols, such as the backoff mechanism, are implemented into the card hardware/firmware and cannot be arbitrarily changed by third parties or by manufacturers only for experimental reasons. Our validation has been possible thanks to the availability of the so called Wireless MAC Processor (WMP), a prototype of a novel wireless card architecture in which MAC protocols can be p…

Settore ING-INF/03 - Telecomunicazionibusiness.industryFirmwareWireless ad hoc networkComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsTime critical02 engineering and technologyDistributed coordination functioncomputer.software_genreExponential functionComputer Networks and Communication0508 media and communicationsFormal languageMedia Technology0202 electrical engineering electronic engineering information engineeringWirelessbusinesscomputerComputer network2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Random access with repeated contentions for emerging wireless technologies

2017

In this paper we propose ReCo, a robust contention scheme for emerging wireless technologies, whose efficiency is not sensitive to the number of contending stations and to the settings of the contention parameters (such as the contention windows and retry limits). The idea is iterating a basic contention mechanism, devised to select a sub-set of stations among the contending ones, in consecutive elimination rounds, before performing a transmission attempt. Elimination rounds can be performed in the time or frequency domain, with different overheads, according to the physical capabilities of the nodes. Closed analytical formulas are given to dimension the number of contention rounds in order…

Settore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer scienceComputer Science (all)020206 networking & telecommunications02 engineering and technologycomputer science (all); electrical and electronic engineering; binary alloys0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingElectrical and Electronic EngineeringbusinessRandom accessComputer networkIEEE INFOCOM 2017 - IEEE Conference on Computer Communications
researchProduct

Constant Heat Input Friction Stir Welding of Variable Thickness AZ31 Sheets Through In-Process Tool Rotation Control

2019

Tailored blanks characterized by variable thickness were friction stir welded (FSWed) with the aim to obtain constant joint properties along the weld seam, regardless of the thickness change. To pursue this goal, the heat input was kept constant by in-process control of tool rotation. A dedicated numerical model of the process was used to determine the tool rotation values as a function of the sheet thickness. The mechanical properties and the microstructure of the FSWed joints, produced with varying process parameters, were studied. It was found that the proposed approach can produce joints with uniform properties along the weld line in terms of stress–strain curve shape, joint strength, e…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni0209 industrial biotechnologyMaterials scienceMechanical EngineeringVariable thickness020206 networking & telecommunications02 engineering and technologyIndustrial and Manufacturing EngineeringComputer Science Applications020901 industrial engineering & automationControl and Systems Engineering0202 electrical engineering electronic engineering information engineeringFriction stir weldingBlanks Computer simulation Friction Heat Rotation Welding Temperature Mechanical propertiesComposite materialConstant (mathematics)Settore ING-IND/16 - Tecnologie E Sistemi Di LavorazioneRotation controlJournal of Manufacturing Science and Engineering
researchProduct

A Network Tomography Approach for Traffic Monitoring in Smart Cities

2018

Traffic monitoring is a key enabler for several planning and management activities of a Smart City. However, traditional techniques are often not cost efficient, flexible, and scalable. This paper proposes an approach to traffic monitoring that does not rely on probe vehicles, nor requires vehicle localization through GPS. Conversely, it exploits just a limited number of cameras placed at road intersections to measure car end-to-end traveling times. We model the problem within the theoretical framework of network tomography, in order to infer the traveling times of all individual road segments in the road network. We specifically deal with the potential presence of noisy measurements, and t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni050210 logistics & transportationCost efficiencyExploitbusiness.industryComputer scienceMechanical Engineering05 social sciencesReal-time computingNetwork tomography smart cities Traffic monitoring020206 networking & telecommunicationsTopology (electrical circuits)02 engineering and technologyNetwork tomographyComputer Science ApplicationsSmart city0502 economics and businessAutomotive EngineeringScalability0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemKey (cryptography)businessIEEE Transactions on Intelligent Transportation Systems
researchProduct