Search results for "Communications protocol"

showing 10 items of 76 documents

IN service specification using the KANNEL language

1995

KANNEL is an application-oriented language for protocol engineering, with integrated support for all the main aspects of implementing typical communications software. Intelligent network services with distributed and interacting components share a number of central features with communications protocols, thus bringing in the possibility of applying protocol engineering techniques within the area of intelligent networking. To verify this view, the KANNEL language is applied to the specification of an intelligent calling card service. The specification includes both visual and textual notations of KANNEL.

Service (systems architecture)Protocol engineeringIntelligent NetworkComputer sciencebusiness.industryPersonal identification numberCode reuseCommunications softwareSoftware engineeringbusinessNotationCommunications protocolComputer network
researchProduct

Interaction Mechanism of Humans in a Cyber-Physical Environment

2015

The research initiative “Industrie 4.0” (I4.0) of the high-tech strategy announced by the German government targets the deployment of a cyber-physical system (CPS) in production and logistics. Such CPS-based environments are characterized by an increasing number of heterogeneous intelligent autonomous and communicating artifacts tightly integrated with humans. Thus, the human’s role will become a composite factor (“man-in-the-mesh”) for this future CPS environment, playing more than just a simple role inside the control loop. This paper investigates the need of a robust communication between CPS and humans, which includes a clear semantic of the exchanged information. For this purpose, a me…

Service (systems architecture)SIMPLE (military communications protocol)Human–computer interactionSoftware deploymentMechanism (biology)Computer scienceFactor (programming language)Control systemMediationCyber-physical systemcomplex mixturescomputercomputer.programming_language
researchProduct

Cross-Technology WiFi/ZigBee Communications: Dealing With Channel Insertions and Deletions

2016

In this letter, we show how cross-technology interference can be exploited to set up a low-rate bidirectional communication channel between heterogeneous WiFi and ZigBee networks. Because of the environment noise and receivers' implementation, the cross-technology channel can be severely affected by insertions and deletions of symbols, whose effects need to be taken into account by the coding scheme and communication protocol.

Settore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryWiFichannelinterferencewireless coexistenceComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunications020302 automobile design & engineeringinterference; wireless coexistence; WLAN; Modeling and Simulation; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic Engineering02 engineering and technologyComputer Science ApplicationsWLANZigBee0203 mechanical engineeringModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessCommunications protocolComputer networkCommunication channelIEEE Communications Letters
researchProduct

PDA -- Remote Display Interaction Framework

2008

This paper discusses the design of a PDA-driven remote display control system which was designed for a pervasive computing scenario. Our solution enables a PDA to perform as an interaction device (such as keyboard or mouse) to operate applications which are using remote displays. Our system consists of two components: one devoted to pair users and remote display according to their relative position, and one to provide the PDA with appropriate graphical interfaces and ad-hoc communication protocols. Besides a case study on the use of remote displays during a course with in our department, this paper discusses system highlights, components, and experiments as for standard multimedia and offic…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteraction deviceUbiquitous computingComputer sciencebusiness.industryInteraction frameworkRemote displayComputer Science Artificial IntelligenceSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Human–computer interactionControl systemServerCommunications protocolbusinessGraphical user interface2008 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

High-level Programming and Symbolic Reasoning on IoT Resource Constrained Devices

2015

While the vision of Internet of Things (IoT) is rather inspiring, its practical implementation remains challenging. Conventional programming approaches prove unsuitable to provide IoT resource constrained devices with the distributed processing capabilities required to implement intelligent, autonomic, and self-organizing behaviors. In our previous work, we had already proposed an alternative programming methodology for such systems that is characterized by high-level programming and symbolic expressions evaluation, and developed a lightweight middleware to support it. Our approach allows for interactive programming of deployed nodes, and it is based on the simple but effective paradigm of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInteractive programmingSIMPLE (military communications protocol)MultimediaKnowledge representation and reasoningComputer Networks and CommunicationsComputer scienceDistributed computingcomputer.file_formatKnowledge Representationcomputer.software_genreFuzzy logiclcsh:TelecommunicationSoftware development processResource constrained devicesFuzzy LogicHigh-level programming languageMiddleware (distributed applications)Fuzzy Logic.lcsh:TK5101-6720ExecutableResource constrained devicecomputerHigh-level programmingEAI Endorsed Transactions on Cognitive Communications
researchProduct

A Middleware to Develop and Test Vehicular Sensor Network Applications

2019

The Smart city ecosystem is composed of several networked devices that provide services to citizens and improve their quality of life. Basic services, which must be exposed by the underlying software infrastructure, require efficient networking and communication protocols to coordinate and manage all the system components. In particular, Vehicular Sensor Networks (VSNs) are envisioned as key components of smart cities. Verification is crucial in such a highly dynamic scenario to ensure operation correctness and to reduce the development cost of smart applications. However, the rigidity of existing middlewares makes development, reconfiguration, and testing rather difficult. In this work, we…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIterative and incremental developmentSoftware VerificationCorrectnessComputer science020209 energyDistributed computing020208 electrical & electronic engineeringControl reconfiguration02 engineering and technologycomputer.file_formatcomputer.software_genreSmart CitieVehicular Sensor NetworkDistributed ApplicationSmart cityMiddleware (distributed applications)0202 electrical engineering electronic engineering information engineeringSymbolic processingSoftware Development and TestingExecutableCommunications protocolcomputerWireless sensor network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

Modeling Efficient and Effective Communications in VANET through Population Protocols

2021

Vehicular Ad-hoc NETworks (VANETs) enable a countless set of next-generation applications thanks to the technological progress of the last decades. These applications rely on the assumption that a simple network of vehicles can be extended with more complex and powerful network infrastructure, in which several Road Side Units (RSUs) are employed to achieve application-specific goals. However, this assumption is not always satisfied as in many real-world scenarios it is unfeasible to have a conspicuous deployment of RSUs, due to both economic and environmental constraints. With the aim to overcome this limitation, in this paper we investigate how the only Vehicle-to-Vehicle (V2V) communicati…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studypopulation protocols VANET Vehicle-to-Vehicle communicationsVehicular ad hoc networkSIMPLE (military communications protocol)Event (computing)Computer scienceDistributed computingPopulationPopulation protocolSchema (genetic algorithms)Software deploymentSynchronization (computer science)education2021 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

On the Fidelity of IEEE 802.11 commercial cards

2006

The IEEE 802.11 D CF protocol is known to be fair in terms of long-term resource repartition among the contending stations. However, when considering real scenarios, where commercial 802.11 cards interact, very unpredictable as well as sometimes surprising behaviors emerge. Motivation of this paper is to investigate the reasons of the very evident disagreement between the theoretical IEEE 802.11 DCF protocol models and its practical implementations. Inparticular, we try to characterize the card behavior not only in terms of perceived throughput, but also in terms of low-level channel access operations. In fact, the simple throughput analysis does not allow to identify what affecting paramet…

Signal processingCommunication channels (information theory); Internet; Signal processing; Wireless telecommunication systems; Baseband signals; Carrier sense function; MAC layer; Network protocolsComputer scienceMAC layerWireless local area networks (WLAN)backoff algorithmCommunication channels (information theory)IEEE 802.11Wireless telecommunication systemsNetwork protocolsThroughput (business)InternetBaseband signalsChannel allocation schemesSIMPLE (military communications protocol)Settore ING-INF/03 - Telecomunicazionibusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layerCarrier sense functionThroughputNetwork interface controllerEmbedded systemResource allocationbusinessComputer networkCommunication channel
researchProduct

Improving similarity measures for re-identification of vehicles using AMR sensors

2013

The use of Anisotropic Magneto-Resistive (AMR) sensors for road traffic monitoring has gained popularity in recent years. The Earth magnetic field variations caused by vehicles passing over this kind of sensors can be measured and used for various purposes, including vehicle re-identification at different sensing zones. AMR sensors provide data that allow the calculation of traffic parameters by using simple signal processing techniques. But when vehicle re-identification is the objective, it is not clear which is the best method to compare the signals from different sensors in order to know whether or not they belong to the same vehicle. This paper presents an experimental study with the o…

Signal processingSimilarity (geometry)SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingElectrical engineeringSimilarity measurebusinessRoad trafficRe identification2013 9th International Conference on Information, Communications & Signal Processing
researchProduct