Search results for "Computer network"

showing 10 items of 1634 documents

AIOC2: A deep Q-learning approach to autonomic I/O congestion control in Lustre

2021

Abstract In high performance computing systems, I/O congestion is a common problem in large-scale distributed file systems. However, the current implementation mainly requires administrator to manually design low-level implementation and optimization, we proposes an adaptive I/O congestion control framework, named AIOC 2 , which can not only adaptively tune the I/O congestion control parameters, but also exploit the deep Q-learning method to start the training parameters and optimize the tuning for different types of workloads from the server and the client at the same time. AIOC 2 combines the feedback-based dynamic I/O congestion control and deep Q-learning parameter tuning technology to …

ExploitComputer Networks and CommunicationsComputer sciencebusiness.industryQ-learningInterference (wave propagation)SupercomputerComputer Graphics and Computer-Aided DesignTheoretical Computer ScienceNetwork congestionArtificial IntelligenceHardware and ArchitectureEmbedded systemLustre (file system)Latency (engineering)businessThroughput (business)SoftwareParallel Computing
researchProduct

An Augmented Reality (AR) CAD System at Construction Sites

2011

Augmented Reality (AR) technologies allow computer-generated content to be superimposed over a live camera view of the real world. Although AR is still a very promising technology, currently only a few commercial applications for industrial purposes exploit the potential of adding contextual content to real scenarios. Most of AR applications are oriented to fields such as education or entertainment, where the requirements in terms of repeatability, fault tolerance, reliability and safety are low. Different visualization devices, tracking methods and interaction techniques are described in the literature, establishing a classification between Indoor and Outdoor AR systems. On the one hand, t…

ExploitHuman–computer interactionComputer scienceFace (geometry)Reliability (computer networking)Scale (chemistry)Augmented realityFault toleranceVariation (game tree)Visualization
researchProduct

Performance of LoRa for Bike-Sharing Systems

2019

Today bike sharing systems are becoming popular in many cities as short-distance transit vehicles. More than 18 million bicycles are available worldwide for public use and one of the main problems that afflicts such sharing systems is the loss of bikes, which can be stolen or simply left in unknown locations. Thus, many bikes are docked or tracked using GPS and costly cellular connections. In this paper, we consider the emerging Long Range (LoRa) technology for use in bike sharing systems. LoRa exploits free ISM bands and has been conceived for low power and low data rate applications. Additionally, LoRa is characterized by large cells and heterogeneous application domains, which may lead t…

ExploitSettore ING-INF/03 - Telecomunicazionibusiness.industryComputer science020209 energy020208 electrical & electronic engineeringAutomotive industry02 engineering and technologyScalabilityLow data rate0202 electrical engineering electronic engineering information engineeringGlobal Positioning SystemBike sharingbusinessInternet of ThingsLoRa LoRaWAN Low Power Wide Area Net-works (LPWAN) Automotive Vehicular Network (VANET) bikebike-sharing tracker IoTComputer network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

Licensed and Unlicensed Spectrum Management for Energy-Efficient Cognitive M2M

2020

Edge computing has emerged as a promising solution for relieving the tension between resource-limited MTDs and computational-intensive tasks. To realize successful task offloading with limited spectrum, we focus on the cognitive machine-to-machine (CM2M) paradigm which enables a massive number of MTDs to either opportunistically use the licensed spectrum that is temporarily available, or to exploit the under-utilized unlicensed spectrum. We formulate the channel selection problem with both licensed and unlicensed spectrum as an adversarial multi-armed bandit (MAB) problem, and combine the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to devel…

Exploitbusiness.industryComputer scienceReliability (computer networking)Lyapunov optimizationbusinessSelection algorithmSpectrum managementEdge computingCommunication channelEfficient energy useComputer network
researchProduct

DEMO: Unconventional WiFi-ZigBee communications without gateways

2014

Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…

Exploitbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniReading (computer)Node (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork interfacezigbeeEmbedded systemDefault gatewayComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessProtocol (object-oriented programming)Computer networkNeuRFonCommunication channel
researchProduct

Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling

2017

In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.

Exponential backoffMarkov chainbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunicationsThroughput02 engineering and technology01 natural sciences0104 chemical sciencesComputer Science ApplicationsModulationModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessWireless sensor networkComputer networkEfficient energy useData transmissionIEEE Communications Letters
researchProduct

A gap analysis of Internet-of-Things platforms

2016

We are experiencing an abundance of Internet-of-Things (IoT) middleware solutions that provide connectivity for sensors and actuators to the Internet. To gain a widespread adoption, these middleware solutions, referred to as platforms, have to meet the expectations of different players in the IoT ecosystem, including device providers, application developers, and end-users, among others. In this article, we evaluate a representative sample of these platforms, both proprietary and open-source, on the basis of their ability to meet the expectations of different IoT users. The evaluation is thus more focused on how ready and usable these platforms are for IoT ecosystem players, rather than on t…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer science02 engineering and technologyGap analysiscomputer.software_genreWorld Wide WebComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringesineiden internetIoT ecosystemIoT marketplaceta113internet of Thingsbusiness.industry020206 networking & telecommunicationsIoT platformsData sharingMiddleware (distributed applications)Middleware020201 artificial intelligence & image processingThe InternetbusinessInternet of Thingsgap analysiscomputerComputer Communications
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

Optimized Kernel Entropy Components

2016

This work addresses two main issues of the standard Kernel Entropy Component Analysis (KECA) algorithm: the optimization of the kernel decomposition and the optimization of the Gaussian kernel parameter. KECA roughly reduces to a sorting of the importance of kernel eigenvectors by entropy instead of by variance as in Kernel Principal Components Analysis. In this work, we propose an extension of the KECA method, named Optimized KECA (OKECA), that directly extracts the optimal features retaining most of the data entropy by means of compacting the information in very few features (often in just one or two). The proposed method produces features which have higher expressive power. In particular…

FOS: Computer and information sciencesComputer Networks and CommunicationsKernel density estimationMachine Learning (stat.ML)02 engineering and technologyKernel principal component analysisMachine Learning (cs.LG)Artificial IntelligencePolynomial kernelStatistics - Machine Learning0202 electrical engineering electronic engineering information engineeringMathematicsbusiness.industry020206 networking & telecommunicationsPattern recognitionComputer Science ApplicationsComputer Science - LearningKernel methodKernel embedding of distributionsVariable kernel density estimationRadial basis function kernelKernel smoother020201 artificial intelligence & image processingArtificial intelligencebusinessSoftwareIEEE Transactions on Neural Networks and Learning Systems
researchProduct