Search results for "Computer network"

showing 10 items of 1634 documents

Functional Type Error Control for Stabilised Space-Time IgA Approximations to Parabolic Problems

2018

The paper is concerned with reliable space-time IgA schemes for parabolic initial-boundary value problems. We deduce a posteriori error estimates and investigate their applicability to space-time IgA approximations. Since the derivation is based on purely functional arguments, the estimates do not contain mesh dependent constants and are valid for any approximation from the admissible (energy) class. In particular, they imply estimates for discrete norms associated with stabilised space-time IgA approximations. Finally, we illustrate the reliability and efficiency of presented error estimates for the approximate solutions recovered with IgA techniques on a model example.

Class (set theory)Computer scienceReliability (computer networking)Space timeFunctional typeParabolaValue (computer science)010103 numerical & computational mathematicsComputer Science::Numerical Analysis01 natural sciences010101 applied mathematicsApplied mathematics0101 mathematicsError detection and correctionEnergy (signal processing)
researchProduct

Noise-tolerant efficient inductive synthesis of regular expressions from good examples

1997

We present an almost linear time method of inductive synthesis restoring simple regular expressions from one representative (good) example. In particular, we consider synthesis of expressions of star-height one, where we allow one union operation under each iteration, and synthesis of expressions without union operations from examples that may contain mistakes. In both cases we provide sufficient conditions defining precisely the class of target expressions and the notion of good examples under which the synthesis algorithm works correctly, and present the proof of correctness. In the case of expressions with unions the proof is based on novel results in the combinatorics of words. A genera…

Class (set theory)CorrectnessComputer programComputer Networks and CommunicationsComputer scienceComputer experimentTheoretical Computer ScienceHardware and ArchitectureSimple (abstract algebra)Regular expressionTime complexityAlgorithmSoftwareProgram synthesisNew Generation Computing
researchProduct

On the chromatic number of disk graphs

1998

Colorings of disk graphs arise in the study of the frequency-assignment problem in broadcast networks. Motivated by the observations that the chromatic number of graphs modeling real networks hardly exceeds their clique number, we examine the related properties of the unit disk (UD) graphs and their different generalizations. For all these graphs including the most general class of the double disk (DD) graphs, it is shown that X(G) ≤ c.ω(G) for a constant c. Several coloring algorithms are analyzed for disk graphs, aiming to improve the bounds on X(G). We find that their worst-case performance expressed in the number of used colors is indeed reached in some instances.

Clique-sumComputer Networks and CommunicationsTrapezoid graph1-planar graphMetric dimensionCombinatoricsIndifference graphPathwidthHardware and ArchitectureChordal graphMaximal independent setSoftwareMathematicsofComputing_DISCRETEMATHEMATICSInformation SystemsMathematicsNetworks
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Comparative analysis of architectures for monitoring cloud computing infrastructures

2015

The lack of control over the cloud resources is one of the main disadvantages associated to cloud computing. The design of efficient architectures for monitoring such resources can help to overcome this problem. This contribution describes a complete set of architectures for monitoring cloud computing infrastructures, and provides a taxonomy of them. The architectures are described in detail, compared among them, and analysed in terms of performance, scalability, usage of resources, and security capabilities. The architectures have been implemented in real world settings and empirically validated against a real cloud computing infrastructure based on OpenStack. More than 1000 virtual machin…

Cloud computing securityComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingCloud computingcomputer.software_genreSet (abstract data type)Utility computingHardware and ArchitectureVirtual machineScalabilitybusinesscomputerSoftwareFuture Generation Computer Systems
researchProduct

Self-establishing a Service Level Agreement within Autonomic Cloud Networking Environment

2014

International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). Several research works have been proposed for the SLA establishing in cloud computing, but not in cloud networking. In this paper, we propose an architecture for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and a …

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEE/IFIPbusiness.industryComputer scienceQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Data_MISCELLANEOUSQoSCloud computingComputer securitycomputer.software_genreService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cloud testingAutonomic Cloud NetworkingData as a serviceArchitectureSLAbusinesscomputerDrawbackComputer network
researchProduct

Autonomic Brokerage Service for an End-to-End Cloud Networking Service Level Agreement

2014

8 pages; International audience; Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) assurance and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end-to-end service level agreement between a Cloud Service User (CSU) and multiple Cloud Service Providers (CSPs) in a cloud networking environment using brokerage service. We focus on Qo…

Cloud computing security[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryService delivery frameworkComputer scienceCloud NetworkingQuality of service[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Quality of ServiceService level requirementCloud computingAutonomic computingService-level agreement[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]IEEECloud testingService catalogAutonomic ComputingCloudSimScalabilityVideoconferencingService Level AgreementData as a servicebusinessComputer network
researchProduct

ROS/Gazebo Based Simulation of Co-operative UAVs

2019

UAVs can be assigned different tasks such as e.g., rendez-vous and space coverage, which require processing and communication capabilities. This work extends the architecture ROS/Gazebo with the possibility of simulation of co-operative UAVs. We assume UAV with the underlying attitude controller based on the open-source Ardupilot software. The integration of the co-ordination algorithm in Gazebo is implemented with software modules extending Ardupilot with the capability of sending/receiving messages to/from drones, and executing the co-ordination protocol. As far as it concerns the simulation environment, we have extended the world in Gazebo to hold more than one drone and to open a specif…

Co operative0209 industrial biotechnologyComputer sciencebusiness.industryComputer Science (all)Real-time computing020206 networking & telecommunicationsROS/Gazebo02 engineering and technologyPort (computer networking)DroneTheoretical Computer ScienceCo-operative UAVSoftware modulesCo-operative UAVs; ROS/Gazebo; Simulation020901 industrial engineering & automationSoftwareSettore ING-INF/04 - AutomaticaControl theory0202 electrical engineering electronic engineering information engineeringbusinessProtocol (object-oriented programming)SimulationCo-operative UAVs
researchProduct

Toll-quality digital secraphone

2002

This paper describes the design and performance of a secraphone that, when plugged between any conventional telephone set and the public telephone network, protects the speech information travelling through the PSTN. The device has a transparent operating mode that does not alter the signal and a secure mode, accessed upon request of any of the speakers, that encrypts the speech with digital techniques, assuring privacy against unwanted listeners. At the transmission branch, voice is sampled, coded with a CELP scheme at 9600 bps (with a slow mode at 7200 bps), encrypted with a proprietary algorithm and interfaced to the line with a V.32 modem chip set. The keys for encryption are establishe…

Code-excited linear predictionPublic-key cryptographyTelephone networkComputer sciencebusiness.industrySpeech codingCryptographyTelephonyEncryptionbusinessLinear predictive codingComputer networkProceedings of 8th Mediterranean Electrotechnical Conference on Industrial Applications in Power Systems, Computer Science and Telecommunications (MELECON 96)
researchProduct

Performance evaluation of three dynamic channel access strategies for spectrum leasing in CRNs

2015

Spectrum leasing in cognitive radio networks (CRNs) allows the primary network (PN) to lease a certain fraction of its licensed bandwidth to the secondary network (SN). The motivation for such a concept is to enhance the performance of SNs while improving channel utilization. Meanwhile, the license owners of the channels can also gain benefits through spectrum leasing in terms of either monetary rewards or cooperative communications. In this paper, we propose three dynamic channel access strategies for spectrum leasing in multi-channel CRNs. A common characteristic of all these strategies is that the priority for channel access over the leased spectrum is given to SNs and the unleased spect…

Cognitive radioComputer scienceBlocking (radio)business.industrySpectrum (functional analysis)Bandwidth (signal processing)Dynamic channelbusinessComputer networkCommunication channel2015 IEEE International Conference on Communications (ICC)
researchProduct