Search results for "Computer Networks"

showing 10 items of 860 documents

DiDuSoNet: A P2P architecture for Ditributed Dunbar-based Social Networks,

2015

Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, informati…

P2PExploitSocial networkbusiness.industryComputer scienceComputer Networks and CommunicationsControl (management)Face (sociological concept)020206 networking & telecommunicationsSocial Welfare02 engineering and technologyDistributed Online Social NetworksData availabilityDistributed Online Social NetworkSet (abstract data type)World Wide WebData availability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDistributed Online Social Networks; P2P; Data availability; DunbarDunbarArchitecturebusinessSoftware
researchProduct

Investigating the impact of virtual tourism on travel intention during the post-COVID-19 era: evidence from China

2022

This study explores the mechanism that contributes to travel intention in the field of virtual tourism. The overall research method is based on the "Stimulus-Organism-Response" theory. In the research model, the effects of content quality, system quality, and interaction quality in virtual tourism on tourism experience and travel intention are explored, as well as the role of virtual attachment and travel intention. A total of 390 respondents were invited to participate in a virtual tourism experience, and provide feedback through a questionnaire. SmartPLS 3.3.2 was used to validate the causal model, and most of the study hypotheses were supported. The findings show that virtual tourism sig…

PLS-SEMChinaComputer Networks and Communicationsmatkailualavirtual tourismvirtuaalitodellisuusHuman-Computer Interactionstimulus-organism-response modelmatkailumatkailun edistäminenKiinapost-COVID-19travel intentionvirtuaalimatkailukäyttäjäkokemusSoftwareInformation Systems
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

Optimized Parallel Implementation of Face Detection based on GPU component

2015

Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…

Parallel computingBiometricsComputer Networks and CommunicationsComputer science02 engineering and technologyParallel computing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingFace detectionRendering (computer graphics)CUDACUDA optimizationArtificial Intelligence0202 electrical engineering electronic engineering information engineeringGraphics processorsAdaBoost[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsGraphicsWaldBoostFace detectionComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingViola and Jones algorithmAdaBoostGrid020202 computer hardware & architectureShared memoryHardware and Architecture020201 artificial intelligence & image processing[INFO.INFO-ES]Computer Science [cs]/Embedded Systems[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

A distributed genetic algorithm for restoration of vertical line scratches

2008

This paper reports a distributed algorithm for the restoration of still frames corrupted by vertical line scratches. The restoration is here approached as an optimisation problem, and is solved using an ad-hoc Genetic Algorithm. The distributed algorithm is designed following a pipeline logical structure. The front end is a network of standard workstations with heterogeneous operating systems. The quality of image is appreciable and the computational time is quite low with respect the sequential version.

Parallel computingOptimisation problemGeneticalgorithmBrooks–Iyengar algorithmSettore INF/01 - InformaticaComputer Networks and CommunicationsComputer sciencePipeline (computing)Parallel algorithmLinescratch removalParallel computingComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceImage (mathematics)Artificial IntelligenceHardware and ArchitectureDistributed algorithmGenetic algorithmDistributed systemParallel Programming Scratch Detection Image AnalysisSoftwareParallel Computing
researchProduct

The complexity of graph languages generated by hyperedge replacement

1990

Although in many ways, hyperedge replacement graph grammars (HRGs) are, among all graph generating mechanisms, what context-free Chomsky grammars are in the realm of string rewriting, their parsing problem is known to be, in general, NP-complete. In this paper, the main difficulty in HRG parsing is analysed and some conditions on either grammar or input graphs are developed under which parsing can be done in polynomial time. For some of the cases, the parsing problem is shown to be log-space reducible to context-free string parsing.

ParsingTheoretical computer scienceComputer Networks and CommunicationsComputer sciencebusiness.industryComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)Parsing expression grammarcomputer.software_genreTop-down parsingTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESParser combinatorS-attributed grammarTop-down parsing languageArtificial intelligenceL-attributed grammarbusinesscomputerComputer Science::Formal Languages and Automata TheorySoftwareNatural language processingInformation SystemsBottom-up parsingActa Informatica
researchProduct

CORMORANT

2019

People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…

PasswordAuthenticationBiometricsComputer Networks and CommunicationsEvent (computing)Computer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreHuman-Computer InteractionInformation sensitivityKeystroke dynamicsHardware and Architecture0202 electrical engineering electronic engineering information engineeringStrong authentication020201 artificial intelligence & image processingcomputerMobile deviceProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
researchProduct

Hereditariness of Aortic Tissue: In-Vitro Time-Dependent Failure of Human and Porcine Specimens

2018

This study aims to investigate the time dependent failure of aortic tissues for pathological and healthy samples by biomechanical testing. The experimental campaign has involved human pathological tissue and healthy swine tissue as preliminary study towards the development of novel failure criteria.

Pathologymedicine.medical_specialtySettore MED/09 - Medicina Internabusiness.industryRenewable Energy Sustainability and the EnvironmentEnergy Engineering and Power TechnologyComputer Science Applications1707 Computer Vision and Pattern RecognitionBiomechanical testingmedicine.diseaseATAAAneurysmIn vitrocreep failureIndustrial and Manufacturing Engineeringaortic tissue biomechanicAneurysmComputer Networks and CommunicationArtificial IntelligenceAortic tissuehereditarineMedicinebusinessSettore ICAR/08 - Scienza Delle CostruzioniPathologicalInstrumentation
researchProduct

Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels

2017

In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …

PhysicsComputer Networks and CommunicationsAerospace Engineering020206 networking & telecommunications020302 automobile design & engineeringStatistical modelGeometry02 engineering and technologyCorrelation function (statistical mechanics)Fading distribution0203 mechanical engineeringChannel state informationRician fadingAutomotive Engineering0202 electrical engineering electronic engineering information engineeringFadingElectrical and Electronic EngineeringMultipath propagationComputer Science::Information TheoryRayleigh fading
researchProduct

A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics

2013

This paper proposes a novel probability density function (PDF) for the distribution of local scatterers inside a disk centered on the mobile station (MS). The new scattering model is introduced as the unified disk scattering model (UDSM), as it unifies a variety of typical circularly symmetric scattering models into one simple model. By adjusting a designated shape factor controlling the distribution of the scatterers, both the uniform circular and uniform ring scattering models can be obtained as special cases. Furthermore, the original Gaussian and uniform hollow-disk scattering models can be approximated with a high level of accuracy. In addition to these established scattering models, a…

PhysicsComputer Networks and CommunicationsScatteringGaussianMathematical analysisAerospace EngineeringProbability density functionsymbols.namesakeTime of arrivalDistribution (mathematics)Joint probability distributionAutomotive EngineeringsymbolsElectronic engineeringScattering theoryElectrical and Electronic EngineeringShape factorIEEE Transactions on Vehicular Technology
researchProduct