Search results for "Computer network"

showing 10 items of 1634 documents

Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation

2014

[EN] With the implementation of channel assembling (CA) techniques, higher data rate can be achieved for secondary users in multi-channel cognitive radio networks. Recent studies which are based on loss systems show that maximal capacity can be achieved using dynamic CA strategies. However the channel allocation schemes suffer from high blocking and forced termination when primary users become active. In this paper, we propose to introduce queues for secondary users so that those flows that would otherwise be blocked or forcibly terminated could be buffered and possibly served later. More specifically, in a multi-channel network with heterogeneous traffic, two queues are separately allocate…

CTMCQueueing theoryChannel allocation schemesbusiness.industryComputer scienceApplied MathematicsCognitive radio networksMarkov processINGENIERIA TELEMATICABlocking (statistics)Computer Science ApplicationsScheduling (computing)Continuous-time Markov chainChannel assemblingsymbols.namesakeCognitive radioHeterogeneous trafficsymbolsQueuing schemesElectrical and Electronic EngineeringbusinessQueueCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Examination of robust D-stability of TCP-DCR protocol

2012

This paper presents non-linear mathematical model of a computer network with a part of wireless network. The article contains an analysis of the stability of the network based on TCP-DCR, which is a modification of the traditional TCP. Block diagram of the network model was converted to a form in order to investigate the D-stability using the method of the space of uncertain parameters. Robust D-stability is calculated for constant delays values.

CUBIC TCPD-stabilityTCP accelerationWireless networkComputer scienceReal-time computingTCP tuningBlock diagramTopologyStability (probability)Computer Science::Networking and Internet Architecturecomputer networksTCP-DCR protocolBIC TCPNetwork modelTheoretical and Applied Informatics
researchProduct

Evaluation of the Impact of Multipath Data Dispersion for Anonymous TCP Connections

2007

Despite recent research efforts, wireless ad hoc networking technology remains especially prone to security attacks. In this work our contribution focuses on determining the optimal trade-off between traffic dispersion and TCP performance to reduce the chances of successful eavesdropping, while maintaining acceptable levels of throughput. For our experiments we propose a multipath-enhanced version of DSR, and we compare Tahoe, Reno and Sack TCP variants. Results show that multipath traffic dispersion impact on TCP throughput is bounded to a maximum of 25-35%, and that there is only a minimal dependence on the number of routes used, the number of consecutive packets sent on each route, the r…

CUBIC TCPTCP Friendly Rate ControlTCP WestwoodTCP Westwood plusTCP VegasTCP accelerationComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSZeta-TCPbusinessTCP global synchronizationComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

Adaptive Low Priority Packet Marking for Better TCP Performance

2003

This paper proposes a packet marking scheme for TCP traffic. Unlike previous literature work, in our scheme the majority of TCP packets are transmitted as high priority. The role of a low priority packet appears that of a probe, whose goal is to early discover network congestion conditions. Low priority packets are marked according to an adaptive marking algorithm. Numerical results show that our scheme provides improved throughput/delay performance.

CUBIC TCPTCP VegasTCP accelerationbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingTCP tuningTCP global synchronizationTCP Westwood plusTCP Friendly Rate ControlZeta-TCPbusinessComputer network
researchProduct

TCP Performance in Mobile Ad hoc Networks

2013

International audience; In this paper, we present a survey of TCP (Transmission Control Protocol) protocol for better performance in the MANET (Mobile Ad Hoc Network). After a short presentation of the main features of TCP, we give the most important problems from which TCP suffer in MANET. We present after that some approaches proposed in the literature in order to improve its performance. Our paper contains also a performance evaluation of TCP NewReno and TCP Vegas transport protocols under AODV and DSR routing protocols. The simulations are conducted under varying conditions of number of TCP connections, number of nodes and mobility.

CUBIC TCPTCP accelerationComputer scienceTCP tuning050801 communication & media studies02 engineering and technologyTCP Friendly Rate ControlTCP Westwood[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0508 media and communications0202 electrical engineering electronic engineering information engineeringZeta-TCPMobile Ad hoc NetworksProblems of TCP in MANETTCP Protocolbusiness.industry05 social sciencesComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSImproving of TCP in MANET020206 networking & telecommunicationsINGENIERIA TELEMATICATCP VegasTCP global synchronizationPerformance evaluationTCP NewRenoCompound TCPbusinessComputer network
researchProduct

Transport infrastructures, spillover effects and regional growth: evidence of the Spanish case

2005

The impact of transport infrastructures on the economic growth of both regions and sectors, distinguishing among modes of transport, is analysed. An attempt is also made to capture the spillover effects associated with transport infrastructures. Two different methodologies are used: the first adopts an accounting approach based on a regression on indices of total factor productivity; the second uses econometric estimates of the production function. Very similar elasticities are obtained with both methodologies for the private sector of the economy, both for the aggregate capital stock of transport infrastructures and for the various types of infrastructure. However, the disaggregated result…

Capital stockSpillover effectEconomyEconomicsProduction (economics)TransportationEconomic geographyProduction functionPrivate sectorTotal factor productivityPort (computer networking)Transport Reviews
researchProduct

Credit card incidents and control systems

2012

Abstract Credit and debit cards have spread and skyrocketed all around the world to become the most popular means of payments in many countries. Despite their enormous popularity, cards are not free of risk. Technology development and e-commerce have exponentially increased internal credit card incidents. This paper identifies and quantifies the different types of credit card fraud and puts into question the effectiveness of the role assigned to cardholders in its detection.

Card security codeComputer Networks and Communicationsmedia_common.quotation_subjectCredit card fraudLibrary and Information SciencesPaymentComputer securitycomputer.software_genreATM cardCredit cardBusinesscomputerMerchant servicesChargebackCredit card interestInformation Systemsmedia_commonInternational Journal of Information Management
researchProduct

Improving Communication in Risk Management of Health Information Technology Systems by means of Medical Text Simplification

2019

Health Information Technology Systems (HITS) are increasingly used to improve the quality of patient care while reducing costs. These systems have been developed in response to the changing models of care to an ongoing relationship between patient and care team, supported by the use of technology due to the increased instance of chronic disease. However, the use of HITS may increase the risk to patient safety and security. While standards can be used to address and manage these risks, significant communication problems exist between experts working in different departments. These departments operate in silos often leading to communication breakdowns. For example, risk management stakeholder…

Care processInteractive computer systemsMedical terminologyHealth information technologyText simplificationComputer sciencemedia_common.quotation_subjectKnowledge management02 engineering and technologyInformation technologyPatient safetyOrder (exchange)Computer securityPatient Empowerment; Health Information Seeking; User Requirements; Risk Management; IEC 80001-1; Medical Terminology Simplification;Machine learning0202 electrical engineering electronic engineering information engineeringInformation retrievalQuality (business)Risk managementComputer networksmedia_commonEstimationRisk ManagementSettore INF/01 - Informaticabusiness.industryCommunication020206 networking & telecommunications020207 software engineeringMedical Terminology SimplificationWorld Wide WebEducational technologyChronic diseaseRisk analysis (engineering)HealthbusinessIEC 80001-1Machine translating
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct

Anomaly detection in dynamic systems using weak estimators

2011

Accepted version of an article from the journal: ACM transactions on internet technology. Published version available from the ACM: http://dx.doi.org/10.1145/1993083.1993086 Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based on the characteristics of data learned from the “normal” observations, new observations are classified as being either “normal” or not. Most state-of-the-art approaches, especially those which belong to the family of parameterized statistical schemes, work under the assumption that the underlying…

Change over timeVDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413education.field_of_studyComputer Networks and CommunicationsComputer sciencePopulationEstimatorParameterized complexityVDP::Technology: 500::Information and communication technology: 550Network monitoringcomputer.software_genreOutlierAnomaly detectionData miningeducationcomputer
researchProduct