Search results for "Computer network"
showing 10 items of 1634 documents
Leader election and local identifiers for three‐dimensional programmable matter
2020
International audience; In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional space. While the first leader election algorithm requires a strong hypothesis about the initial configuration of the particles and no hypothesis on the system configurations that the particles are forming, the second one requires fewer hypothesis about the initial configuration of the particles but does not work for all pos…
Solving Two-Person Zero-Sum Stochastic Games With Incomplete Information Using Learning Automata With Artificial Barriers
2021
Learning automata (LA) with artificially absorbing barriers was a completely new horizon of research in the 1980s (Oommen, 1986). These new machines yielded properties that were previously unknown. More recently, absorbing barriers have been introduced in continuous estimator algorithms so that the proofs could follow a martingale property, as opposed to monotonicity (Zhang et al., 2014), (Zhang et al., 2015). However, the applications of LA with artificial barriers are almost nonexistent. In that regard, this article is pioneering in that it provides effective and accurate solutions to an extremely complex application domain, namely that of solving two-person zero-sum stochastic games that…
A nested virtualization tool for information technology practical education
2016
Background A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. Results This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. Conclusions The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that woul…
A status report
1992
Abstract This article considers the financial and proprietary considerations applicable to computer crime, computer security and personal privacy. The failure to take proper precautions in these areas can lead to major operational problems and substantial loss of assets. Developments in the late 1980s, particulary the discovery by the public press of so-called ‘computer viruses’, indicates the need for counsel representing suppliers and users to understand the basic technology involved and the legal implications. Such a report by Robert Bigelow was first published in CLSR in March 1989. He has now updated and revised the text which will be featured in several parts. In the first parts the l…
El plagio cinematográfico de Letty Lynton (1932) y su impacto en la industria fílmica estadounidense: análisis del proceso judicial y de su cobertura…
2016
Este artículo presenta un exhaustivo análisis del proceso judicial relativo al film Letty Lynton (1932), que, pese a ser un emblema del periodo clásico de Hollywood, fue prohibido en 1936, tras la denuncia de dos dramaturgos que acusaron a Metro-Goldwyn-Mayer de haber plagiado una de sus obras. El pleito evidenció una complejidad en materia de infracción del copyright que la justicia estadounidense no había afrontado hasta el momento, entre otros motivos porque la cinta partía de unos hechos reales acontecidos durante el siglo XIX y la productora había adquirido los derechos de una novela que también los relataba. Los continuos recursos y resoluciones judiciales finalizaron, tras ochos años…
A LiDAR Prototype with Silicon Photomultiplier and MEMS Mirrors
2018
In this paper, we present a low cost prototype of a Time-Of-Flight (TOF) LiDAR system, employing a SiPM as photo detector and MEMS mirrors in order to steer the nanosecond pulsed optical beam with a scanning angle of +/-6°. Preliminary TOF measurements have been performed both indoor and outdoor to test the limits of the system.
Mapping wordnets from the perspective of inter-lingual equivalence
2017
Mapping wordnets from the perspective of inter-lingual equivalence This paper explores inter-lingual equivalence from the perspective of linking two large lexico-semantic databases, namely the Princeton WordNet of English and the plWordnet ( pl. Slowosiec ) of Polish. Wordnets are built as networks of lexico-semantic relations between words and their meanings, and constitute a type of monolingual dictionary cum thesaurus. The development of wordnets for different languages has given rise to many wordnet linking projects (e.g. EuroWordNet, Vossen, 2002). Regardless of a linking method used, these projects require defining rules for establishing equivalence links between wordnet building bloc…
MODULAR KNOWLEDGE REPRESENTATION IN ADVISOR AGENTS FOR SITUATION AWARENESS
2011
A modular knowledge representation framework for conversational agents is presented. The approach has been realized to suit the situation awareness paradigm. The modularity of the framework makes possible the composition of specific modules that deal with particular features, simplifying both the chatbot design process and its smartness. As a proof of concepts we have developed a modular, situation awareness oriented, KB for a conversational agent, which plays the role of an advisor aimed at helping a user to be in charge of a virtual town, inspired to the SimCity series game. The agent makes an extensive use of semantic computing techniques and is able to perceive, comprehend and project c…
A Multi-Phase Decode-and-Forward Transmission Protocol in Cognitive Relay Networks: Outage Analysis and Relay Power Allocation
2015
Consider an underlay cognitive relay network with multiple source and destination pairs and that a decode-and-forward scheme is adopted at the relay. We propose a multi-phase transmission protocol in this paper which involves cooperation among source, relay and destination nodes. Given perfect interference elimination before decoding at the destination nodes, we derive closed-form expressions for outage probability calculation over Rayleigh fading channels. Furthermore, the optimal relay power allocation factor which leads to minimal outage probability is determined. Numerical results reveal the conditions under which satisfactory performance can be achieved based on the proposed scheme.
Is TCP Packet Reordering Always Harmful?
2004
IP networks do not provide any guarantee that packets belonging to the same flow are delivered in the correct order. Out-of-order reception of packets was commonly considered due to pathological network conditions (such as link failures, etc.). However, it has been shown that packet reordering is a phenomenon which occurs even in normal network operation, due to a number of link-level and/or router-level implementation features, such as local parallelism and load balancing. Packet reordering is intuitively considered as a negative phenomenon, which may severely affect TCP traffic performance since it is expected to cause inefficient usage of the available link bandwidth and is expected to i…