Search results for "Computer network"

showing 10 items of 1634 documents

A Proposed Access Control-Based Privacy Preservation Model to Share Healthcare Data in Cloud

2020

Healthcare data in cloud computing facilitates the treatment of patients efficiently by sharing information about personal health data between the healthcare providers for medical consultation. Furthermore, retaining the confidentiality of data and patients' identity is a another challenging task. This paper presents the concept of an access control-based (AC) privacy preservation model for the mutual authentication of users and data owners in the proposed digital system. The proposed model offers a high-security guarantee and high efficiency. The proposed digital system consists of four different entities, user, data owner, cloud server, and key generation center (KGC). This approach makes…

FOS: Computer and information sciencesKey generationComputer Science - Cryptography and Security020205 medical informaticsbusiness.industryComputer science020206 networking & telecommunicationsAccess controlCloud computing02 engineering and technologyMutual authenticationEncryptionPublic-key cryptographyData sharingComputer Science - Computers and SocietyComputers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSession keybusinessCryptography and Security (cs.CR)Computer network2020 16th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

The IceProd framework: distributed data processing for the IceCube neutrino observatory

2015

IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, identify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. This paper presents the first detailed description of IceProd, a lightweight distributed management system designed to meet these requirements. It is driven by a central database in order to manage mass production of simulations and analysis of data produced by the IceCube detector. IceProd runs as a separate layer on top of other middleware and can take advantage of a variety of c…

FOS: Computer and information sciencesMonitoringComputer scienceComputer Networks and CommunicationsDistributed computingData managementReal-time computingDistributed managementcomputer.software_genre01 natural sciencesData managementIceCube Neutrino ObservatoryTheoretical Computer ScienceIceCubeArtificial Intelligence0103 physical sciences010306 general physicsData processingData management; Distributed computing; Grid computing; Monitoring010308 nuclear & particles physicsbusiness.industryDistributed computingGrid computingComputer Science - Distributed Parallel and Cluster ComputingHardware and ArchitectureMiddleware (distributed applications)MiddlewareGrid computingParticleDistributed Parallel and Cluster Computing (cs.DC)Neutrinoddc:004businesscomputerSoftware
researchProduct

IncentMe: Effective Mechanism Design to Stimulate Crowdsensing Participants with Uncertain Mobility

2018

Mobile crowdsensing harnesses the sensing power of modern smartphones to collect and analyze data beyond the scale of what was previously possible with traditional sensor networks. Given the participatory nature of mobile crowdsensing, it is imperative to incentivize mobile users to provide sensing services in a timely and reliable manner. Most importantly, given sensed information is often valid for a limited period of time, the capability of smartphone users to execute sensing tasks largely depends on their mobility pattern, which is often uncertain. For this reason, in this paper, we propose IncentMe, a framework that solves this core issue by leveraging game-theoretical reverse auction …

FOS: Computer and information sciencesOptimizationMonitoringComputer Networks and CommunicationsComputer scienceDistributed computingMobile computingCrowdsensing02 engineering and technologyComputer Science - Networking and Internet ArchitectureReverse auctionSmart phoneCrowdsensingGame Theory0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringSensorNetworking and Internet Architecture (cs.NI)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMechanism designMobile computing020206 networking & telecommunicationsAuctionNavigationCore (game theory)RoadComputer Networks and CommunicationSensingTask analysisTask analysiParticipatoryState (computer science)MechanismSmartphoneWireless sensor networkIncentiveSoftware
researchProduct

P2P-PL: A pattern language to design efficient and robust peer-to-peer systems

2017

To design peer-to-peer (P2P) software systems is a challenging task, because of their highly decentralized nature, which may cause unexpected emergent global behaviors. The last fifteen years have seen many P2P applications to come out and win favor with millions of users. From success histories of applications like BitTorrent, Skype, MyP2P we have learnt a number of useful design patterns. Thus, in this article we present a P2P pattern language (shortly, P2P-PL) which encompasses all the aspects that a fully effective and efficient P2P software system should provide, namely consistency of stored data, redundancy, load balancing, coping with asymmetric bandwidth, decentralized security. The…

FOS: Computer and information sciencesPattern languageComputer Networks and CommunicationsComputer sciencebusiness.industryDistributed computing020206 networking & telecommunications02 engineering and technologycomputer.file_formatPeer-to-peerLoad balancing (computing)computer.software_genreSoftwareComputer Science - Distributed Parallel and Cluster ComputingRobustness (computer science)Software design patternC.2.40202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDistributed Parallel and Cluster Computing (cs.DC)Software systembusinesscomputerBitTorrentSoftwarePeer-to-Peer Networking and Applications
researchProduct

Towards realistic artificial benchmark for community detection algorithms evaluation

2013

Many algorithms have been proposed for revealing the community structure in complex networks. Tests under a wide range of realistic conditions must be performed in order to select the most appropriate for a particular application. Artificially generated networks are often used for this purpose. The most realistic generative method to date has been proposed by Lancichinetti, Fortunato and Radicchi (LFR). However, it does not produce networks with some typical features of real-world networks. To overcome this drawback, we investigate two alternative modifications of this algorithm. Experimental results show that in both cases, centralisation and degree correlation values of generated networks…

FOS: Computer and information sciencesPhysics - Physics and Societypreferential attachmentComputer Networks and CommunicationsComputer science[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]FOS: Physical sciencesvirtual communitiesPhysics and Society (physics.soc-ph)01 natural sciences010305 fluids & plasmasEducation0103 physical sciencescommunity detectionbenchmarking010306 general physicsSocial and Information Networks (cs.SI)CommunicationComputer Science - Social and Information Networkscomplex networksweb based communitiesonline communitiesconfiguration modellingIdentification (information)LFR benchmarkBenchmark (computing)[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]community structureAlgorithmtopological propertiesSoftware
researchProduct

PRINCIPAL POLYNOMIAL ANALYSIS

2014

© 2014 World Scientific Publishing Company. This paper presents a new framework for manifold learning based on a sequence of principal polynomials that capture the possibly nonlinear nature of the data. The proposed Principal Polynomial Analysis (PPA) generalizes PCA by modeling the directions of maximal variance by means of curves instead of straight lines. Contrarily to previous approaches PPA reduces to performing simple univariate regressions which makes it computationally feasible and robust. Moreover PPA shows a number of interesting analytical properties. First PPA is a volume preserving map which in turn guarantees the existence of the inverse. Second such an inverse can be obtained…

FOS: Computer and information sciencesPolynomialComputer Networks and CommunicationsComputer scienceMachine Learning (stat.ML)02 engineering and technologyReduction (complexity)03 medical and health sciencessymbols.namesake0302 clinical medicineStatistics - Machine LearningArtificial Intelligence0202 electrical engineering electronic engineering information engineeringPrincipal Polynomial AnalysisPrincipal Component AnalysisMahalanobis distanceModels StatisticalCodingDimensionality reductionNonlinear dimensionality reductionGeneral MedicineClassificationDimensionality reductionManifold learningNonlinear DynamicsMetric (mathematics)Jacobian matrix and determinantsymbolsRegression Analysis020201 artificial intelligence & image processingNeural Networks ComputerAlgorithmAlgorithms030217 neurology & neurosurgeryCurse of dimensionalityInternational Journal of Neural Systems
researchProduct

Rate-Splitting Random Access Mechanism for Massive Machine Type Communications in 5G Cellular Internet-of-Things

2021

The cellular Internet-of-Things has resulted in the deployment of millions of machine-type communication (MTC) devices. These massive number of devices must communicate with a single gNodeB (gNB) via the random access channel (RACH) mechanism. However, existing RACH mechanisms are inefficient when dealing with such large number of devices. To address this issue, we propose the rate-splitting random access (RSRA) mechanism, which uses rate splitting and decoding in rate-splitting multiple access (RSMA) to improve RACH success rates. The proposed mechanism divides the message into common and private messages and enhances the decoding performance. We demonstrate, using extensive simulations, t…

FOS: Computer and information sciencesbusiness.industryMechanism (biology)Computer scienceComputer Science - Information TheoryInformation Theory (cs.IT)Type (model theory)Random-access channelSoftware deploymentInternet of Thingsbusiness5GRandom accessDecoding methodsComputer network2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
researchProduct

MAC Design for WiFi Infrastructure Networks: A Game-Theoretic Approach

2011

In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this protocol is in principle fair, since all the stations have the same probability to transmit on the channel, it has been shown that unfair behaviors may emerge in actual networking scenarios because of non-standard configurations of the nodes. Due to the proliferation of open source drivers and programmable cards, enabling an easy customization of the channel access policies, we propose a game-theoretic analysis of random access schemes. Assuming that each node is rational and implements a best response strategy, we show that…

FOS: Computer and information sciencesgame theorycheating nodeaccess protocolsmobile nodesComputer sciencegame-theoretic approachMAC designDistributed coordination functionUpload[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]MAC protocolschannel access policyComputer Science - Computer Science and Game TheoryFOS: MathematicsElectrical and Electronic EngineeringMathematics - Optimization and Controlwireless LANdistributed coordination functionMechanism designcheating nodesWiFi infrastructure networksbusiness.industryApplied MathematicsNode (networking)WiFiComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiFi; cheating nodes; game theory; MAC protocolsComputer Science ApplicationsShared resourceprogrammable cardsOptimization and Control (math.OC)game-theoretic analysisBest responserandom access schemebusinessrandom access protocolRandom accessCommunication channelComputer networkComputer Science and Game Theory (cs.GT)
researchProduct

The invisible setting of digital space: the Facebook case

2018

La neutralidad en la red no existe. El espacio digital puede ser adaptado de forma automática al perfil de cada usuario. Sin que este tenga que identificarse, las empresas de gestión de contenidos en Internet disponen de suficientes datos de cualquier individuo para poder filtrar los resultados de su búsqueda y personalizarlos, sin previo aviso, condicionando así su experiencia en la red. Esta investigación, de carácter exploratorio, aborda en primer lugar la descripción del espacio público digital. En segundo lugar, plantea una tipología de espacios digitales que se definen en función del grado de adaptación de los contenidos al usuario. Finalmente, presenta un análisis de caso de espacio …

FacebookalgorithmPersonalizationComputer Networks and Communicationsdigital public spaceCommunicationespacio público digitalNews FeedalgoritmosFilter bubblePersonalizaciónSocietat de la informacióBurbuja de filtros
researchProduct

Design and use of a Facebook 4 Urban Facelifts

2015

The renewal of the 'urban look' (Urban Facelift) could play a crucial role for the development of the whole city. This study will analyse the case of the Palermo port area, which is considered as the 'face' of the city. Sicily is indeed an island, and therefore, because of its natural and infrastructural features, the sea is still its main connection with the world. For this reason, urban renovation in the city of Palermo has begun first with its coastal area. The tested methodology combines future urban faces with the present–state evaluation criteria by involving different stakeholders. Then, the urban faces are associated with possible and suitable future scenarios. In this way, an Urban…

Facebookpioneer cityGeography Planning and DevelopmentUrban densityFace (sociological concept)Urban regenerationManagement Monitoring Policy and LawUrban FaceliftCivil engineeringPort (computer networking)GeographyUrban planningparticipationEnvironmental planning
researchProduct