Search results for "Computer network"

showing 10 items of 1634 documents

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations

2001

The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…

Core routerEdge deviceDifferentiated servicesbusiness.industryComputer scienceQuality of serviceAdmission controlbusinessQueueComputer networkJitterHop (networking)
researchProduct

PCP: An End-to end Measurement Based Call Admission Control for Real-Time Services Over IP Networks

2000

Distributed end-to-end measurement based connection admission control mechanisms have been recently proposed. The goal of these schemes is to provide tight QoScon trol on a per connection basis by means of measurements taken by the edge nodes and priority based forwarding procedure at internal nodes. Since the additional flows handling procedures are implemented at the border routers and the forwarding mechanisms are for flows aggregates only, the approach is fully scalable and compatible with the IETF Differentiated Service proposal. The aim of this paper is to propose specific schemes and to investigate the advantages and limits of the approach by analyzing the basic mechanisms and evalua…

Core routerVoice over IPEnd-to-end principleNetwork packetComputer sciencebusiness.industryCall Admission ControlAdmission controlTelephonyDifferentiated servicebusinessComputer network
researchProduct

Automated Synthesis of Application-layer Connectors from Automata-based Specifications

2019

Abstract Ubiquitous and Pervasive Computing, and the Internet of Things, promote dynamic interaction among heterogeneous systems. To achieve this vision, interoperability among heterogeneous systems represents a key enabler, and mediators are often built to solve protocol mismatches. Many approaches propose the synthesis of mediators. Unfortunately, a rigorous characterization of the concept of interoperability is still lacking, hence making hard to assess their applicability and soundness. In this paper, we provide a framework for the synthesis of mediators that allows us to: (i) characterize the conditions for the mediator existence and correctness; and (ii) establish the applicability bo…

CorrectnessUbiquitous computingGeneral Computer ScienceComputer Networks and CommunicationsComputer scienceDistributed computingInteroperability0102 computer and information sciences02 engineering and technology01 natural sciencesHeterogeneous ApplicationsTheoretical Computer Science020204 information systems0202 electrical engineering electronic engineering information engineeringProtocol MismatchesCommunication & CoordinationProtocol (object-oriented programming)Automated Mediator SynthesisSoundnessApplied MathematicsAutomated Mediator Synthesis Interoperability Protocols Heterogeneous Applications Communication & Coordination Protocol MismatchesInteroperabilityApplication layerAutomatonComputational Theory and Mathematics010201 computation theory & mathematicsKey (cryptography)Protocols
researchProduct

High performance hardware correlation coefficient assessment using programmable logic for ECG signals

2003

Abstract Correlation coefficient is frequently used to obtain cardiac rhythm by peak estimation and appreciate differences in the signal compared to a pattern. This work focuses on the description of a real-time correlation assessment procedure. Applied to electrocardiogram (ECG) signals, a new correlation value is obtained every new sample and pulse detection information is provided. The ECG pattern is internally stored and can be changed when desired. This procedure is useful in Systems on Chip implementation and can be applied to design compact ECG monitoring systems consisting on a system on chip where programmable logic offloads the main processor. A Xilinx FPGA device has been used fo…

Correlation coefficientComputer Networks and CommunicationsComputer sciencebusiness.industryPulse (signal processing)SignalSample (graphics)Ecg monitoringProgrammable logic deviceArtificial IntelligenceHardware and ArchitectureComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSSystem on a chipEcg signalField-programmable gate arraybusinessSoftwareComputer hardwareMicroprocessors and Microsystems
researchProduct

‘Tour me onshore’: understanding cruise tourists’ evaluation of shore excursions through text mining

2018

ABSTRACTThe aim of this paper is to shed light on the elements underlying cruise tourists’ evaluation of shore excursions, approaching them as an interaction of expressive and instrumental components.To fulfil the aim of the investigation, a thematic content analysis of 1296 online reviews was conducted using the text-mining software Leximancer. The results of the study revealed that cruise visitors with different overall satisfaction with their guided tour focus the narrative of their opinion on different tour attributes. Thus, the dominant themes of the cruise passengers delighted with their tour included the performance of the tour guide, the arrangement of the tour, as well as the cruis…

Cultural StudiesShoregeographygeography.geographical_feature_categoryHistory05 social sciencesGeography Planning and DevelopmentExcursionCruiseTransportationPort (computer networking)Consumer satisfactionTourism Leisure and Hospitality Management0502 economics and business050211 marketingNarrativeThematic analysisMarketing050212 sport leisure & tourismTourismNature and Landscape ConservationJournal of Tourism and Cultural Change
researchProduct

Tracing the Cultural Background of Lone-Wolf Terrorism

2021

The end of the Cold War, as well as the collapse of the Soviet Union, posed new greater challenges and risks for the “Global North.” Terrorism—doubtless—seems to be one of them. Over the recent years, and particularly after 9/11, terrorists changed the focus of their attacks. While classic terrorism targeted important persons such as politicians, chief police officers, or celebrities, modern terrorism planned attacks on leisure-spots spaces, tourist destinations, and lay-persons. This is particularly troublesome for policymakers (who are in charge of orchestrating all-pervading models to preserve homeland security) and for field-workers who are seriously punished when they are in contact wi…

Cultural backgroundInformation Systems and ManagementComputer Networks and CommunicationsHardware and ArchitecturePolitical scienceLone wolfTerrorismCriminologySafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

2020

Abstract Information technology (IT) engagement is defined as a need to spend more time using IT. Practice-based examples show that IT engagement can have adverse effects in organizations. Although users can potentially get more work done through IT engagement, observations show that the users might jeopardize their well-being and hamper their work performance. We aimed to investigate this complexity in the research on IT engagement by examining its potential antecedents and outcomes in organizations. Considering the potentially mixed outcomes, we developed a model to examine the effects of IT engagement on personal productivity and strain. We also aimed to explain the antecedents of IT eng…

CurseComputer Networks and Communicationsbusiness.industry05 social sciencesBlessingInformation technology02 engineering and technologyLibrary and Information SciencesPublic relationsWork performance020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringNormativeSurvey data collection050211 marketingPsychologybusinessProductivityInformation SystemsDependency (project management)International Journal of Information Management
researchProduct

Consumers' perceptions of mobile banking continuous usage in Finland and South Africa

2015

This study examines continuous usage behaviour related to mobile banking (m-banking) among consumers living in Finland (FI) and South Africa (ZA). The study investigates three post-adoption behavioural consequences - namely, trust, satisfaction and word of mouth. Using purposeful sampling techniques, we found that trust plays a significant role in promoting continuous usage of m-banking. In general, the respondents reported high levels of trust in m-banking technology and were satisfied with the m-banking application and services. In addition, convenience, user friendliness and speed emerged as the main sub-topics related to satisfaction. In most cases, the convenience of using m-banking do…

Customer retentionComputer Networks and Communicationsmedia_common.quotation_subjectmature marketWord of mouthm-bankingUser friendlinessSouth AfricaManagement of Technology and InnovationPerceptionmobile bankingMarketingword of mouthEmerging marketsta512Finlandmedia_commonMobile bankingelectronic financee-financesatisfactionAdvertisingtrustComputer Science ApplicationsPurposeful samplingluottamusemerging marketCustomer satisfactionBusinessFinanceInternational Journal of Electronic Finance
researchProduct

Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

2015

Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT device…

Cyber defenseComputer Networks and CommunicationsHardware and Architecturebusiness.industryComputer scienceInternet privacyCyber-attackInternet of ThingsbusinessComputer securitycomputer.software_genrecomputerJournal of Cyber Security and Mobility
researchProduct

Criminal networks analysis in missing data scenarios through graph distances.

2021

Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …

Data AnalysisFOS: Computer and information sciencesComputer and Information SciencesScienceIntelligenceSocial SciencesTransportationCriminologyCivil EngineeringSocial NetworkingComputer Science - Computers and SocietyLaw EnforcementSociologyComputers and Society (cs.CY)PsychologyHumansComputer NetworksSocial and Information Networks (cs.SI)Algorithms; Humans; Terrorism; Criminals; Data Analysis; Social NetworkingSettore INF/01 - InformaticaQCognitive PsychologyRBiology and Life SciencesEigenvaluesComputer Science - Social and Information NetworksCriminalsTransportation InfrastructurePoliceRoadsProfessionsAlgebraLinear AlgebraPeople and PlacesPhysical SciencesEngineering and TechnologyCognitive ScienceMedicineLaw and Legal SciencesPopulation GroupingsTerrorismCrimeCriminal Justice SystemMathematicsNetwork AnalysisAlgorithmsResearch ArticleNeurosciencePLoS ONE
researchProduct