Search results for "Computer network"

showing 10 items of 1634 documents

Business continuity of business models : Evaluating the resilience of business models for contingencies

2019

Company business models are vulnerable to various contingencies in the business environment that may unexpectedly render their business logic ineffective. In particular, technological advancements, such as the Internet of things, big data, sharing economy and crowdsourcing, have enabled new forms of business models that can effectively and abruptly make traditional business models obsolete. By disrupting or even diminishing companies’ revenue streams, environmental contingencies may present a significant threat to business continuity (BC). Evaluating the resilience of business models against these contingencies should therefore be a core area of BC. However, existing BC approaches tend to f…

Value (ethics)liiketoimintamallitComputer Networks and Communicationsvalue creationpalautuminenBig data02 engineering and technologyLibrary and Information SciencesBusiness modelmuutosSharing economyBusiness continuity020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringRevenueBusiness logicbusiness modelsta512resilienceIndustrial organizationta113resilienssiliiketoimintaympäristöbusiness.industrydisaster recoveryarvonluonti05 social sciencessharing economybusiness continuityjakamistalousResilience (organizational)050211 marketingvarautuminenbusinessInformation Systems
researchProduct

Soft variable structure controller design for singular systems

2015

Abstract A novel soft variable structure control (SVSC) scheme is addressed for a class of singular systems under I-controllable in this paper. The structural features of SVSC with differential equations are investigated. The stability of singular systems based on SVSC scheme is guaranteed by an equivalent characterization theory, and then a soft variable structure controller is designed. The concrete algorithm of SVSC with differential equations is proposed. The developed SVSC law for singular systems is carried out for the purpose of achieving rapid regulative rate, and shortening arrival time. Moreover, system chattering can be attenuated in the process of approaching to the equilibrium …

Variable structure controlVariable (computer science)Computer Networks and CommunicationsControl and Systems EngineeringControl theoryThermodynamic equilibriumDifferential equationApplied MathematicsSignal ProcessingStructure (category theory)Process (computing)Stability (probability)MathematicsJournal of the Franklin Institute
researchProduct

Skeletons for parallel image processing: an overview of the SKiPPER project

2002

International audience; This paper is a general overview of the SKIPPER project, run at Blaise Pascal University between 1996 and 2002. The main goal of the SKIPPER project was to demonstrate the appli- cability of skeleton-based parallel programming techniques to the fast prototyping of reactive vision applications. This project has produced several versions of a full-fledged integrated pa- rallel programming environment (PPE). These PPEs have been used to implement realistic vi- sion applications, such as road following or vehicle tracking for assisted driving, on embedded parallel platforms embarked on semi-autonomous vehicles. All versions of SKIPPER share a common front-end and reperto…

Vehicle tracking system[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputer Networks and CommunicationsComputer science02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingcomputer.software_genreTheoretical Computer ScienceSoftware portability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringcomputer.programming_language020203 distributed computingbusiness.industryProgramming language020207 software engineeringPascal (programming language)Computer Graphics and Computer-Aided DesignSkeleton (computer programming)Parallel image processingData flow diagramHardware and ArchitectureSoftware engineeringbusinesscomputer[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingSoftware
researchProduct

Network Slicing Enabled Resource Management for Service-Oriented Ultra-Reliable and Low-Latency Vehicular Networks

2020

Network slicing has been considered as a promising candidate to provide customized services for vehicular applications that have extremely high requirements of latency and reliability. However, the high mobility of vehicles poses significant challenges to resource management in such a stochastic vehicular environment with time-varying service demands. In this paper, we develop an online network slicing scheduling strategy for joint resource block (RB) allocation and power control in vehicular networks. The long-term time-averaged total system capacity is maximized while guaranteeing strict ultra-reliable and low-latency requirements of vehicle communication links, subject to stability const…

Vehicular ad hoc networkComputer Networks and CommunicationsComputer scienceDistributed computingAerospace EngineeringComputingMilieux_LEGALASPECTSOFCOMPUTING020302 automobile design & engineeringLyapunov optimization02 engineering and technologySlicingScheduling (computing)0203 mechanical engineeringAutomotive EngineeringResource managementStochastic optimizationElectrical and Electronic EngineeringOnline algorithmVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Power controlIEEE Transactions on Vehicular Technology
researchProduct

Analysis of mobile-oriented energy consumption for heterogeneous connections in hybrid wireless networks

2012

While more and more mobile devices are equipped with both cellular and WLAN interfaces for internet access, the energy consumption aspect of these connections has not been studied in depth in the literature. In this paper, a hybrid network with three alternative wireless connections, namely, a cellular component, a combined component with a mixed ad hoc and cellular link, or an infrastructure-based WLAN component, is investigated. A distance-based analysis on the energy consumption of a mobile station has been performed for each alternative wireless connection, and corresponding numerical results have been obtained. The results suggest that, to increase link throughput while maintaining min…

Vehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless WANBase transceiver stationEnergy consumptionMobile ad hoc networkStationMobile stationbusinessComputer networkInternational Journal of Communication Networks and Distributed Systems
researchProduct

BEGIN: Big Data Enabled Energy-Efficient Vehicular Edge Computing

2018

Vehicular edge computing is essential to support future emerging multimedia-rich and delay-sensitive applications in vehicular networks. However, the massive deployment of edge computing infrastructures induces new problems including energy consumption and carbon pollution. This motivates us to develop BEGIN (Big data enabled EnerGy-efficient vehIcular edge computiNg), a programmable, scalable, and flexible framework for integrating big data analytics with vehicular edge computing. In this article, we first present a comprehensive literature review. Then the overall design principle of BEGIN is described with an emphasis on computing domain and data domain convergence. In the next section, …

Vehicular ad hoc networkComputer Networks and Communicationsbusiness.industryComputer scienceEnergy managementDistributed computingQuality of service020208 electrical & electronic engineeringBig data020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionComputer Science ApplicationsScalability0202 electrical engineering electronic engineering information engineeringResource managementElectrical and Electronic EngineeringbusinessEdge computingEfficient energy useIEEE Communications Magazine
researchProduct

Privacy-preserving scheme for mobile ad hoc networks

2011

This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.

Vehicular ad hoc networkComputer scienceWireless ad hoc networkbusiness.industryMobile computingCryptographyMobile ad hoc networkEncryptionQA76Optimized Link State Routing ProtocolSecurity associationReputation systemComputer Science::Networking and Internet ArchitecturebusinessComputer Science::Cryptography and SecurityComputer network2011 IEEE Symposium on Computers and Communications (ISCC)
researchProduct

Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks

2010

Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…

Vehicular ad hoc networkDigital mappingbusiness.industryWireless ad hoc networkComputer scienceMobile ad hoc networkComputer securitycomputer.software_genreCollisionSystems architectureLocation based informationbusinesscomputerDisseminationComputer network
researchProduct

Video Streaming Distribution in VANETs

2011

Streaming applications will rapidly develop and contribute a significant amount of traffic in the near future. A problem, scarcely addressed so far, is how to distribute video streaming traffic from one source to all nodes in an urban vehicular network. This problem significantly differs from previous work on broadcast and multicast in ad hoc networks because of the highly dynamic topology of vehicular networks and the strict delay requirements of streaming applications. We present a solution for intervehicular communications, called Streaming Urban Video (SUV), that 1) is fully distributed and dynamically adapts to topology changes, and 2) leverages the characteristics of streaming applica…

Vehicular ad hoc networkMulticastComputer sciencebusiness.industryWireless ad hoc networkDistributed computingTopology (electrical circuits)Video streaming in vehicular networksNetwork topologymyMedComputational Theory and MathematicsHardware and ArchitectureSignal Processinggraph coloringVideo streaming in vehicular networks; graph coloring; VANETs; myMedVideo streamingVANETsbusinessComputer network
researchProduct

How to prevent cyber-attacks in inter-vehicle communication network?

2015

In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.

Vehicular ad hoc networkNetwork securitybusiness.industryComputer scienceMechanism (biology)Computer securitycomputer.software_genreTelecommunications networkSecure communicationOverhead (computing)False positive ratebusinesscomputerGame theoryComputer network2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)
researchProduct