Search results for "Computer network"

showing 10 items of 1634 documents

Multipath extensions to the DYMO routing protocol

2007

Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.

Zone Routing ProtocolDynamic Source Routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer network2007 9th IFIP International Conference on Mobile Wireless Communications Networks
researchProduct

Simulation-based Evaluation of DMAMAC - A Dual-Mode Adaptive MAC Protocol for Process Control

2015

Control systems automation is widely used in many industrial domains and have strong requirements on delay, throughput, robustness, and reliability. In the domain of networked control systems, the medium of communication is increasingly involving wireless communication along-side conventional wired communication. Issues ranging from energy efficiency and reliability to low-bandwidth have to be addressed to enable the transition to increased use of wireless communication. In earlier work, we have proposed the Dual-Mode Adaptive MAC (DMAMAC) protocol relying on a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA). The DMAMAC protocol is able to dynami…

Zone Routing ProtocolTransient statebusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessEnergy consumptionWirelessSuperframeWired communicationbusinessEfficient energy useComputer networkProceedings of the Eighth EAI International Conference on Simulation Tools and Techniques
researchProduct

PTNet: An efficient and green data center network

2017

International audience; In recent years, data centers have witnessed an exponential growth for hosting hundreds of thousands of servers as well as to accommodating a very large demand for resources. To fulfill the required level of demand, some approaches tackled network aspects so to host a huge number of servers while others focused on delivering rapid services to the clients by minimizing the path length between any two servers. In general, network devices are often designed to achieve 1:1 oversubscription. Alternatively, in a realistic data center environment, the average utilization of a network could vary between 5% and 25%, and thus the energy consumed by idle devices is wasted. This…

[ INFO ] Computer Science [cs]Computer Networks and CommunicationsComputer scienceDistributed computing02 engineering and technologyNetwork topology[ INFO.INFO-AO ] Computer Science [cs]/Computer ArithmeticTheoretical Computer Science03 medical and health sciences[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0302 clinical medicineArtificial IntelligenceRobustness (computer science)Energy savingServerArchitecture0202 electrical engineering electronic engineering information engineering[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO][INFO]Computer Science [cs]ComputingMilieux_MISCELLANEOUSAverage path lengthInterconnectionNetwork topologyEnergy[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industry[INFO.INFO-AO]Computer Science [cs]/Computer ArithmeticScalability020206 networking & telecommunicationsData center networkAverage path lengthNetworking hardware[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]Hardware and Architecture030220 oncology & carcinogenesis[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]ScalabilityData center[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwareComputer network
researchProduct

New Optimization and Security Approaches to Enhance the Smart Grid Performance and Reliability

2016

International audience; Nowadays, the Smart Grid (SG) is becoming smarter thanks to the integration of different information and communication technologies to enhance the reliability and efficiency of the power grid. However, several issues should be met to ensure high SG performance. Among these issues, we cite the problem of electric vehicles (EVs) integration into the SG to avoid electricity intermittence due to the important load that EVs can create. Another issue is the SG communication network security that can be attempted by malicious intruders in order to create damages and make the power grid instable. In this context, we propose at a first level a Bayesian game-theory model that …

[ INFO ] Computer Science [cs]Computer scienceDistributed computing02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Bayesian gameGame TheoryRobustness (computer science)Bayesian Nash Equilibrium0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Smart GridChallengesIntrusion Detection System020203 distributed computingbusiness.industry020206 networking & telecommunicationsTelecommunications networkSmart gridInformation and Communications TechnologyElectricitybusinessGame theoryElectric VehiclesComputer network
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Management and interaction with multimodal information content

2010

[Chbeir, Richard] Univ Bourgogne, CNRS, LE2I, Dept Comp Sci, F-21000 Dijon, France. [Coninx, Karin] Univ Hasselt, Expertise Ctr Digital Media EDM, BE-3590 Diepenbeek, Belgium. [Ferri, Fernando; Grifoni, Patrizia] CNR, Inst Res Populat & Social Policies, Rome, Italy.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Operations research[INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer science[ INFO.INFO-WB ] Computer Science [cs]/WebLibrary science[SCCO.COMP]Cognitive science/Computer science02 engineering and technologyDigital media[SCCO.COMP] Cognitive science/Computer science0202 electrical engineering electronic engineering information engineeringMedia Technology[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]ComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]business.industry05 social sciences[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]020207 software engineering[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]0509 other social sciences050904 information & library sciencesbusinessSoftware
researchProduct

Semantic-based Merging of RSS Items

2009

Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreClusteringMergingSet (abstract data type)[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Cluster analysisComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Measure (data warehouse)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Document relatedne[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_formatRSSMerging operator[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Key (cryptography)020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerSoftwareXML
researchProduct

A Mobile Computing Framework for Pervasive Adaptive Platforms

2012

International audience; Ubiquitous computing is now the new computing trend, such systems that interact with their environment require self-adaptability. Bioinspiration is a natural candidate to provide the capability to handle complex and changing scenarios. This paper presents a programming framework dedicated to pervasive platforms programming. This bioinspired and agentoriented framework has been developed within the frame of the PERPLEXUS European project that is intended to provide support for bioinspiration-driven system adaptability. This framework enables the platform to adapt itself to application requirements at high-level while using hardware acceleration at node level. The resu…

[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR]Context-aware pervasive systemsUbiquitous computingArticle SubjectComputer Networks and CommunicationsComputer scienceDistributed computingmedia_common.quotation_subjectMobile computing02 engineering and technologycomputer.software_genreAdaptabilitylcsh:QA75.5-76.950202 electrical engineering electronic engineering information engineeringAdaptation (computer science)media_commonbusiness.industryFrame (networking)General Engineering020206 networking & telecommunicationsSoftware frameworkEmbedded systemHardware accelerationRobot020201 artificial intelligence & image processinglcsh:Electronic computers. Computer sciencebusinesscomputer
researchProduct

Evolutionary-based 3D reconstruction using an uncalibrated stereovision system: application of building a panoramic object view

2010

In this paper, we propose an original evolutionary-based method for 3D panoramic reconstruction from an uncalibrated stereovision system (USS). The USS is composed of five cameras located on an arc of a circle around the object to be analyzed. The main originality of this work concerns the process of the calculation of the 3D information. Actually, with our method, 3D coordinates are directly obtained without any prior estimation of the fundamental matrix. The method operates in two steps. Firstly, points of interest are detected in pairs of images acquired by two consecutive cameras of the USS are matched. And secondly, using evolutionary algorithms, we jointly compute the transformed matr…

[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM]Object viewComputer Networks and CommunicationsComputer sciencebusiness.industry3D reconstruction[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]020207 software engineering02 engineering and technologyHardware and Architecture0202 electrical engineering electronic engineering information engineeringMedia Technology020201 artificial intelligence & image processingComputer visionArtificial intelligenceFundamental matrix (computer vision)businessSoftwareComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]
researchProduct

Improving IoT Communications Based on Smart Routing Algorithms

2018

International audience; Due to the recorded success by Internet of Things (IoT) technology, more and more domains use it as a communications and exchange network such as e-health, smart cities, vehicles, etc. IoT don’t stop integrating an important number of components and objects that are characterized by their complexity and heterogeneity. Such constraints make the existing routings protocols unsuitable for IoT communications. To accomplish all the expected tasks and satisfy the user services, it is important to guarantee a quality of communication that answers to the requirements of the various applications in terms of data and processing (availability, integrity, efficiency, etc.). The …

[SPI.OTHER]Engineering Sciences [physics]/OtherIoTsmart methodbusiness.industryComputer scienceQuality of servicemedia_common.quotation_subjectefficient communicationsRouting algorithmQoS020206 networking & telecommunications02 engineering and technologyrouting algorithmsWork (electrical)0202 electrical engineering electronic engineering information engineeringself-organizing020201 artificial intelligence & image processingQuality (business)Internet of Thingsbusinessroute selectionenergy efficiencyComputer networkmedia_commonEfficient energy use
researchProduct