Search results for "Computer network"

showing 10 items of 1634 documents

Random access with repeated contentions for emerging wireless technologies

2017

In this paper we propose ReCo, a robust contention scheme for emerging wireless technologies, whose efficiency is not sensitive to the number of contending stations and to the settings of the contention parameters (such as the contention windows and retry limits). The idea is iterating a basic contention mechanism, devised to select a sub-set of stations among the contending ones, in consecutive elimination rounds, before performing a transmission attempt. Elimination rounds can be performed in the time or frequency domain, with different overheads, according to the physical capabilities of the nodes. Closed analytical formulas are given to dimension the number of contention rounds in order…

Settore ING-INF/03 - Telecomunicazionibusiness.industryOrthogonal frequency-division multiplexingComputer scienceComputer Science (all)020206 networking & telecommunications02 engineering and technologycomputer science (all); electrical and electronic engineering; binary alloys0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingElectrical and Electronic EngineeringbusinessRandom accessComputer networkIEEE INFOCOM 2017 - IEEE Conference on Computer Communications
researchProduct

Coloring-based resource allocations in ad-hoc wireless networks

2011

It is well known that CSMA/CA protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. We propose to control such an interference by preallocating temporal slots in which different sets of network nodes are allowed to contend for the channel access. The approach is based on distributed coloring algorithms with limited signaling overhead that can be customized as a function of the network topology and traffic load.

Settore ING-INF/03 - Telecomunicazionibusiness.industryWireless ad hoc networkWireless networkComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputNetwork topologyInterference (wave propagation)coloring schemes; multi-hop wireless networksSettore ING-INF/04 - Automaticacoloring schemesOverhead (computing)Resource managementbusinesscoloring schememulti-hop wireless networksComputer networkCommunication channel2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop
researchProduct

A Platform for the Evaluation of Distributed Reputation Algorithms

2018

In distributed environments, where unknown entities cooperate to achieve complex goals, intelligent techniques for estimating agents' truthfulness are required. Distributed Reputation Management Systems (RMSs) allow to accomplish this task without the need for a central entity that may represent a bottleneck and a single point of failure. The design of a distributed RMS is a challenging task due to a multitude of factors that could impact on its performances. In order to support the researcher in evaluating the RMS robustness against security attacks since its beginning design phase, in this work we present a distributed simulation environment that allows to model both the agent's behaviors…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAgent-based simulationDistributed Reputation Management SystemComputer Networks and CommunicationMulti-agent systemArtificial IntelligenceModeling and SimulationComputer Science Application2018 IEEE/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT)
researchProduct

An Adaptive Bayesian System for Context-Aware Data Fusion in Smart Environments

2017

The adoption of multi-sensor data fusion techniques is essential to effectively merge and analyze heterogeneous data collected by multiple sensors, pervasively deployed in a smart environment. Existing literature leverages contextual information in the fusion process, to increase the accuracy of inference and hence decision making in a dynamically changing environment. In this paper, we propose a context-aware, self-optimizing, adaptive system for sensor data fusion, based on a three-tier architecture. Heterogeneous data collected by sensors at the lowest tier are combined by a dynamic Bayesian network at the intermediate tier, which also integrates contextual information to refine the infe…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceComputer Networks and CommunicationsComputer scienceIntelligent decision support systemInferenceBayesian network020206 networking & telecommunications02 engineering and technologyEnergy consumptionSensor fusioncomputer.software_genreActivity recognitionEnergy conservationContext Data integration Intelligent sensors Sensor phenomena and characterization Bayes methods Energy consumptionIntelligent sensor0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentData miningElectrical and Electronic EngineeringWireless sensor networkcomputerSoftwareDynamic Bayesian networkIEEE Transactions on Mobile Computing
researchProduct

Sensor9k : A testbed for designing and experimenting with WSN-based ambient intelligence applications

2012

Ambient Intelligence systems are typically characterized by the use of pervasive equipment for monitoring and modifying the environment according to users' needs, and to globally defined constraints. Our work describes the implementation of a testbed providing the hardware and software tools for the development and management of AmI applications based on wireless sensor and actuator networks, whose main goal is energy saving for global sustainability. A sample application is presented that addresses temperature control in a work environment, through a multi-objective fuzzy controller taking into account users' preferences and energy consumption.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingTestbedEnergy consumptionProbabilistic reasoningFuzzy logicComputer Science ApplicationsSoftwareEnergy efficiencyHardware and ArchitectureControl theoryEmbedded systemWireless sensor and actuator networkWirelessAmbient intelligencebusinessSoftwareInformation SystemsEfficient energy use
researchProduct

A multi‐agent system for itinerary suggestion in smart environments

2021

Abstract Modern smart environments pose several challenges, among which the design of intelligent algorithms aimed to assist the users. When a variety of points of interest are available, for instance, trajectory recommendations are needed to suggest users the most suitable itineraries based on their interests and contextual constraints. Unfortunately, in many cases, these interests must be explicitly requested and their lack causes the so‐called cold‐start problem. Moreover, lengthy travelling distances and excessive crowdedness of specific points of interest make itinerary planning more difficult. To address these aspects, a multi‐agent itinerary suggestion system that aims at assisting t…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial intelligenceComputer Networks and CommunicationsComputer scienceMulti-agent systemDistributed computingpattern recognitionHuman-Computer InteractionQA76.75-76.765Computational linguistics. Natural language processingSmart environmentComputer softwareComputer Vision and Pattern RecognitionP98-98.5Information Systems
researchProduct

Rule based reasoning for network management

2006

This paper focuses on improving network management by the adoption of artificial intelligence techniques. We propose a distributed multi-agent architecture for network management, where a logical reasoner acts as a managing entity capable of directing, coordinating, and triggering monitoring and management actions in the proposed architecture. The logical inference system has been devised to enable automated isolation, diagnosis, and to repair network anomalies, thus enhancing the reliability, performance, and security of the network. The measurements of network events are captured by programmable sensors deployed on the network devices and are collected by the network management entity whe…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial intelligenceComputer networkComputer sciencebusiness.industrySemantic reasonerFormal logiccomputer.software_genreNetworking hardwareNetwork management applicationNetwork simulationIntelligent computer networkNetwork managementElement management systemKnowledge based systemsData miningbusinesscomputerNetwork management station
researchProduct

A Reconfigurable Neural Environment on Active Networks

2000

This paper proposes the deployment of a neural network computing environment on Active Networks. Active Networks are packet-switched computer networks in which packets can contain code fragments that are executed on the intermediate nodes. This feature allows the injection of small pieces of codes to deal with computer network problems directly into the network core, and the adoption of new computing techniques to solve networking problems. The goal of our project is the adoption of a distributed neural network for approaching tasks which are specific of the computer network environment. Dynamically reconfigurable neural networks are spread on an experimental wide area backbone of active no…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniArtificial neural networkNetwork packetbusiness.industryComputer scienceTime delay neural networkDistributed computingActive Networks Neural NetworksComputer network programmingIntelligent computer networkCellular neural networkCode (cryptography)businessComputer networkActive networking
researchProduct

METABOLIC NETWORKS ROBUSTNESS: THEORY, SIMULATIONS AND RESULTS

2011

Metabolic networks are composed of several functional modules, reproducing metabolic pathways and describing the entire cellular metabolism of an organism. In the last decade, an enormous interest has grown for the study of tolerance to errors and attacks in metabolic networks. Studies on their robustness have suggested that metabolic networks are tolerant to errors, but very vulnerable to targeted attacks against highly connected nodes. However, many findings on metabolic networks suggest that the above classification is too simple and imprecise, since hub node attacks can be by-passed if alternative metabolic paths can be exploited. On the contrary, non-hub nodes attacks can affect cell …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCellular metabolismTheoretical computer scienceComputer Networks and Communicationsnetwork robustness and fault tolerance propertietopological analysiRobustness (evolution)Metabolic networkComputational biologyfunctional analysisComputingMethodologies_PATTERNRECOGNITIONstatistical analysiStatistical analysisOrganismMathematics
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct