Search results for "Computer Networks"

showing 10 items of 860 documents

Evolución de la comunicación política digital (2011-2019): ocaso de los blogs, declive de Facebook, generalización de Twitter y popularización de Ins…

2022

Este trabajo estudia la utilización electoral de la blogosfera, Facebook, Twitter e Instagram por parte de la clase política española durante la última década. El objetivo es describir la evolución de su presencia en dichos canales, tanto de manera individual como multiplataforma, así como de su actividad y notoriedad en cada uno de ellos. La investigación aplica un análisis cuantitativo longitudinal a un corpus formado por los blogs y las cuentas en redes sociales de los líderes de las candidaturas al Congreso de los Diputados presentadas en todas las circunscripciones por los partidos con mayor expectativa de voto en las Elecciones Generales de noviembre de 2011 (PP y PSOE), diciembre de …

Computer Networks and CommunicationsCommunicationPolíticaObservatorio (OBS*)
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

A Random Trajectory Approach for the Development of Nonstationary Channel Models Capturing Different Scales of Fading

2017

This paper introduces a new approach to developing stochastic nonstationary channel models, the randomness of which originates from a random trajectory of the mobile station (MS) rather than from the scattering area. The new approach is employed by utilizing a random trajectory model based on the primitives of Brownian fields (BFs), whereas the position of scatterers can be generated from an arbitrarily 2-D distribution function. The employed trajectory model generates random paths along which the MS travels from a given starting point to a fixed predefined destination point. To capture the path loss, the gain of each multipath component is modeled by a negative power law applied to the tra…

Computer Networks and CommunicationsComputer scienceAerospace Engineering020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologysymbols.namesakeFading distribution0203 mechanical engineeringChannel state informationAutomotive Engineering0202 electrical engineering electronic engineering information engineeringElectronic engineeringTrajectorysymbolsPath lossFadingStatistical physicsElectrical and Electronic EngineeringPower delay profileGaussian processRandomnessComputer Science::Information Theory
researchProduct

Throughput and delay analysis of HARQ with code combining over double Rayleigh fading channels

2018

This paper proposes the use of hybrid automatic repeat request (HARQ) with code combining (HARQ-CC) to offer reliable communications over double Rayleigh channels. The double Rayleigh fading channel is of particular interest to vehicleto-vehicle communication systems as well as amplify-and-forward relaying and keyhole channels. This paper studies the performance of HARQ-CC over double Rayleigh channels from an information theoretic perspective. Analytical approximations are derived for the ϵ-outage capacity, the average number of transmissions, and the throughput of HARQ-CC. Moreover, we evaluate the delay experienced by Poisson-arriving packets for HARQ-CC. We provide analytical expression…

Computer Networks and CommunicationsComputer scienceAerospace EngineeringHybrid automatic repeat request020302 automobile design & engineering020206 networking & telecommunicationsThroughput02 engineering and technologyData_CODINGANDINFORMATIONTHEORYCommunications systemsymbols.namesake0203 mechanical engineeringAutomotive Engineering0202 electrical engineering electronic engineering information engineeringsymbolsFadingElectrical and Electronic EngineeringRayleigh scatteringThroughput (business)AlgorithmDecoding methodsCommunication channelRayleigh fadingComputer Science::Information Theory
researchProduct

Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation

2012

[EN] To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-fo…

Computer Networks and CommunicationsComputer scienceAerospace EngineeringMarkov process02 engineering and technologyContinuous-time Markov chain (CTMC) modelsChannel assemblingsymbols.namesake0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringCognitive radio networks (CRNs)Electrical and Electronic EngineeringAdaptation (computer science)SimulationMarkov chainPerformance analysisSpectrum (functional analysis)020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICACognitive radioAutomotive EngineeringsymbolsSpectrum adaptationAlgorithmCommunication channelIEEE Transactions on Vehicular Technology
researchProduct

Location of navigation menus in websites: an experimental study with Arabic users

2015

Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…

Computer Networks and CommunicationsComputer scienceArabicFirst languagemedia_common.quotation_subjectWebsite designPopulation050105 experimental psychologyWorld Wide WebReading (process)0501 psychology and cognitive scienceseducationComputer communication networks050107 human factorsmedia_commoneducation.field_of_studybusiness.industry05 social sciencesUsabilitylanguage.human_languageHuman-Computer InteractionTrustworthinessArabic Internet userslanguageThe InternetbusinessMenu locationSoftwareInformation SystemsUniversal Access in the Information Society
researchProduct

Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint

2019

Mobile Edge Computing (MEC) is an important and effective platform to offload the computational services of modern mobile applications, and has gained tremendous attention from various research communities. For delay and resource constrained mobile devices, the important issues include: 1) minimization of the service latency; 2) optimal revenue maximization; 3) high quality-of-service (QoS) requirement to offload the computational service offloading. To address the above issues, an adaptive service offloading scheme is designed to provide the maximum revenue and service utilization to MEC. Unlike most of the existing works, we consider both the delay-tolerant and delay-constraint services i…

Computer Networks and CommunicationsComputer scienceCloud computing02 engineering and technologypilvipalvelutmobiililaitteet0203 mechanical engineeringServer0202 electrical engineering electronic engineering information engineeringRevenueesitysanalyysiperformance analysisEdge computingta113suorituskykyMobile edge computingbusiness.industry020206 networking & telecommunications020302 automobile design & engineeringComputer Science Applicationsadaptive service offloadingHardware and ArchitectureSignal Processingmobile edge computingrevenue maximizationbusinessMobile deviceInformation SystemsComputer networkIEEE Internet of Things Journal
researchProduct

Evaluation of Structural and Temporal Properties of Ego Networks for Data Availability in DOSNs

2017

The large diffusion of Online Social Networks (OSNs) has influenced the way people interact with each other. OSNs present several drawbacks, one of the most important is the problem of privacy disclosures. Distributed Online Social Networks (DOSNs) have been proposed as a valid alternative solution to solve this problem. DOSNs are Online Social Networks implemented on a distributed platform, such as a P2P system or a mobile network. However, the decentralization of the control presents several challenges, one of the main ones is guaranteeing data availability without relying on a central server. To this aim, users’ data allocation strategies have to be defined and this requires the knowledg…

Computer Networks and CommunicationsComputer scienceCommunity detection; Data availability; DOSN; P2P; Social networks; Temporal affinity; Software; Information Systems; Hardware and Architecture; Computer Networks and CommunicationsControl (management)Information System02 engineering and technologySocial networksField (computer science)Task (project management)Order (exchange)0202 electrical engineering electronic engineering information engineeringDOSNSocial networkStructure (mathematical logic)P2PCommunity detectionSocial networkbusiness.industry020206 networking & telecommunicationsData scienceData availabilityData availabilityHardware and ArchitectureCellular network020201 artificial intelligence & image processingTemporal affinitybusinessSoftwareInformation SystemsComputer networkMobile Networks and Applications
researchProduct

Efficiently using connectivity information between triangles in a mesh for real-time rendering

2004

Triangle meshes are the most popular standard model used to represent polygonal surfaces. Drawing these meshes as a set of independent triangles involves sending a vast amount of information to the graphics system. Taking advantage of the connectivity information between the triangles in a mesh dramatically diminishes the amount of information the graphics system must handle. Multiresolution Triangle Strips (MTS) represent a triangle mesh as a collection of multiresolution triangles strips. These strips are the basis of both the storage and the rendering stage. The coherence between the extraction of two levels of detail is used in the model in order to decrease the visualisation time.

Computer Networks and CommunicationsComputer scienceComputer Science::Computational GeometryReal-time renderingVisualizationRendering (computer graphics)Computer Science::GraphicsHardware and ArchitectureComputer graphics (images)Triangle meshPolygonPolygon meshGraphicsInteractive visualizationSoftwareLevel of detailComputingMethodologies_COMPUTERGRAPHICSFuture Generation Computer Systems
researchProduct

BELM: Bayesian Extreme Learning Machine

2011

The theory of extreme learning machine (ELM) has become very popular on the last few years. ELM is a new approach for learning the parameters of the hidden layers of a multilayer neural network (as the multilayer perceptron or the radial basis function neural network). Its main advantage is the lower computational cost, which is especially relevant when dealing with many patterns defined in a high-dimensional space. This brief proposes a bayesian approach to ELM, which presents some advantages over other approaches: it allows the introduction of a priori knowledge; obtains the confidence intervals (CIs) without the need of applying methods that are computationally intensive, e.g., bootstrap…

Computer Networks and CommunicationsComputer scienceComputer Science::Neural and Evolutionary ComputationBayesian probabilityOverfittingMachine learningcomputer.software_genrePattern Recognition AutomatedReduction (complexity)Artificial IntelligenceComputer SimulationRadial basis functionExtreme learning machineArtificial neural networkbusiness.industryEstimation theoryBayes TheoremGeneral MedicineComputer Science ApplicationsMultilayer perceptronNeural Networks ComputerArtificial intelligencebusinesscomputerAlgorithmsSoftwareIEEE Transactions on Neural Networks
researchProduct