Search results for "Computer network"

showing 10 items of 1634 documents

Castadiva: A Test-Bed Architecture for Mobile AD HOC Networks

2007

Evaluating and deploying all sorts of protocols and applications designed for wireless ad hoc networks in a real environment is an important and urgent task. Traditionally, all the proposals made rely solely on simulator results. However, as different research groups develop different solutions to solve problems related to these new networks, it becomes more and more important to migrate the proposed solutions to a real environment. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, of the-shelf devices and open source software. Through a friendly user interface, Castadiva offers the possibility to define …

Vehicular ad hoc networkOptimized Link State Routing Protocolbusiness.industryWireless ad hoc networkComputer scienceDistributed computingMobile computingMobile ad hoc networkAd hoc wireless distribution servicebusinessComputer network2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

MP2P Network in Collecting Data from Sensor Networks

2006

Wireless sensor networks provide numerous applications today. At the same time modern wireless short-range communication technologies combined with mobile users create environments for mobile peerto- peer networks. This paper discusses a concept of an application in which an MP2P network is used for collecting sensor network data. This model requires certain places with a high mobile user density in order to function. Simulation results indicate that the model can be used in environments where these requirements are met.

Vehicular ad hoc networkWi-Fi arrayWireless networkComputer sciencebusiness.industryWireless ad hoc networkDistributed computingMobile computingWireless WANMobile ad hoc networkBase transceiver stationAd hoc wireless distribution servicePublic land mobile networkKey distribution in wireless sensor networksIntelligent sensorIntelligent NetworkMobile wireless sensor networkWirelessRadio resource managementWired communicationbusinessWireless sensor networkHeterogeneous networkComputer network11th IEEE Symposium on Computers and Communications (ISCC'06)
researchProduct

Energy-Efficient Edge Computing Service Provisioning for Vehicular Networks: A Consensus ADMM Approach

2019

In vehicular networks, in-vehicle user equipment (UE) with limited battery capacity can achieve opportunistic energy saving by offloading energy-hungry workloads to vehicular edge computing nodes via vehicle-to-infrastructure links. However, how to determine the optimal portion of workload to be offloaded based on the dynamic states of energy consumption and latency in local computing, data transmission, workload execution and handover, is still an open issue. In this paper, we study the energy-efficient workload offloading problem and propose a low-complexity distributed solution based on consensus alternating direction method of multipliers. By incorporating a set of local variables for e…

Vehicular ad hoc networkenergiatehokkuusComputer Networks and CommunicationsComputer scienceDistributed computingAerospace EngineeringWorkloadEnergy consumptionvehicular edge computingconsensus ADMMlangaton tiedonsiirtoHandoverConsensusAutomotive Engineeringajoneuvotvehicular networksElectrical and Electronic Engineeringworkload offloadinglangattomat verkotEdge computingEfficient energy useIEEE Transactions on Vehicular Technology
researchProduct

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

2015

Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…

Vehicular ad hoc networksEngineeringVehicular ad hoc networkOverheadGeneral Computer Sciencebusiness.industryWireless ad hoc networkIntrusion detection systemNode (networking)Detection rateIntrusion detection system[SPI]Engineering Sciences [physics]Control and Systems EngineeringWirelessOverhead (computing)False positive rateElectrical and Electronic EngineeringDetection timebusinessCluster analysisComputer networkVulnerability (computing)Computers & Electrical Engineering
researchProduct

The Potsdam Open Source Radio Interferometry Tool (PORT)

2021

The Potsdam Open Source Radio Interferometry Tool (PORT) is the very long baseline interferometry (VLBI) analysis software developed and maintained at the GFZ German Research Centre for Geosciences. Chiefly, PORT is tasked with the timely processing of VLBI sessions and post-processing activities supporting the generation of celestial and terrestrial reference frames. In addition, it serves as a framework for research and development within the GFZ's VLBI working group and is part of the tool set employed in educating young researchers. Starting out from VLBI group delays, PORT estimates station and radio sources positions, as well as Earth orientation parameters, tropospheric parameters, a…

Very long baseline interferometry (1769) [Unified Astronomy Thesaurus concepts]media_common.quotation_subjectgeosciences01 natural sciencesFork (software development)German010104 statistics & probabilityAstronomy data analysis (1858)Astrometry (80)The Potsdam Open Source Radio Interferometry ToolVery long baseline interferometry (1769)0103 physical sciences0101 mathematics010303 astronomy & astrophysicsLibrary functionmedia_commonAstronomy and AstrophysicsArt520 Astronomie und zugeordnete WissenschaftenPort (computer networking)language.human_languageOpen source[SDU]Sciences of the Universe [physics]Space and Planetary Sciencevery long baseline interferometrylanguageddc:520Research developmentVLBIPORTHumanities
researchProduct

Discovering Homophily in Online Social Networks

2018

During the last ten years, Online Social Networks (OSNs) have increased their popularity by becoming part of the real life of users. Despite their tremendous widespread, OSNs have introduced several privacy issues as a consequence of the nature of the information involved in these services. Indeed, the huge amount of private information produced by users of current OSNs expose the users to a number of risks. The analysis of the users’ similarity in OSNs is attracting the attention of researchers because of its implications on privacy and social marketing. In particular, the homophily between users could be used to reveal important characteristics that users would like to keep hidden, hence …

Viral marketingComputer scienceComputer Networks and CommunicationsInternet privacy02 engineering and technologyInformation SystemHomophilyHomophilyViral marketing020204 information systemsSimilarity (psychology)0202 electrical engineering electronic engineering information engineeringInformation systemPrivate information retrievalOnline Social NetworkOnline Social Networksbusiness.industryPopularitySocial marketingTie strengthPrivacy preservingHardware and ArchitectureHomophily; Online Social Networks; Privacy preserving; User profiling; Viral marketing; Software; Information Systems; Hardware and Architecture; Computer Networks and Communications020201 artificial intelligence & image processingUser profilingbusinessSoftwareInformation Systems
researchProduct

Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy

2022

FNEGE 3, HCERES A, ABS 2; International audience; The metaverse has the potential to extend the physical world using augmented and virtual reality technologies allowing users to seamlessly interact within real and simulated environments using avatars and holograms. Virtual environments and immersive games (such as, Second Life, Fortnite, Roblox and VRChat) have been described as antecedents of the metaverse and offer some insight to the potential socio-economic impact of a fully functional persistent cross platform metaverse. Separating the hype and “meta…” rebranding from current reality is difficult, as “big tech” paints a picture of the transformative nature of the metaverse and how it w…

Virtual worldAvatarsMetaverseComputer Networks and CommunicationsSecond lifeAugmented realityLibrary and Information SciencesVirtual reality[SHS]Humanities and Social SciencesExtended realityVDP::Samfunnsvitenskap: 200[INFO]Computer Science [cs]Information SystemsZ665VDP::Samfunnsvitenskap: 200::Biblioteks- og informasjonsvitenskap: 320
researchProduct

A User-Balanced System for IP Telephony in WLANs

2008

Wireless IP telephony is becoming very popular between the users of large wireless local area networks (WLANs). This increment has been mainly caused because it allows cost savings. Although, large WLANs use to provide high availability and redundancy, WLANs lack on the available throughput when there are many IP telephony users. In this paper we present a system that reallocates IP telephony devices when the system detects that an AP is overloaded. The algorithm and the frames used for our proposal are described. Measurements taken show how the bandwidth consumed is transferred from an access point to another when our proposal is running. Finally, we show the time needed to re-associate re…

Voice over IPComputer sciencebusiness.industryHigh availabilityServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (computing)Local area networkWirelessThroughputTelephonybusinessComputer network2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
researchProduct

Dynamic Packet Bundling for VoIP Transmission Over Rel'7 HSUPA with 10ms TTI Length

2007

In this paper, the system level optimization of the voice over IP transmission in the HSUPA system, configured with a 10 ms TTI length, is analyzed. The study considers the release 7 improvements to HSUPA, in terms of the DPCCH gating concept. A dynamic activated MAC layer bundling of two VoIP packets in a single frame is proposed and compared against the single packet per frame transmission by means of quasi-static system level simulations.

Voice over IPComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSFrame (networking)Real-time computingSingle frameSystem level optimizationDPCCHTransmission (telecommunications)System levelbusinessComputer network2007 4th International Symposium on Wireless Communication Systems
researchProduct

Trade-Off between Increased Talk-Time and LTE Performance

2010

The purpose of this paper is to analyze the trade-off conditions between battery saving opportunities and long term evolution network performance. To achieve this goal voice over IP with discontinuous reception is studied. Analysis is conducted with vast amount of different settings, including on duration, inactivity and discontinuous reception cycle timers. The quality of service and battery saving opportunities with discontinuous reception are evaluated with a dynamic system simulator which enables detailed simulation of multiple users and cells with realistic assumptions. This paper indicates high battery saving, i.e., increased talk-time opportunities without compromising the performanc…

Voice over IPComputer sciencebusiness.industryQuality of serviceDiscontinuous receptionNetwork performanceDynamic priority schedulingbusinessComputer networkTerm (time)2010 Ninth International Conference on Networks
researchProduct