Search results for "Computer network"

showing 10 items of 1634 documents

Leader election and local identifiers for three‐dimensional programmable matter

2020

International audience; In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional space. While the first leader election algorithm requires a strong hypothesis about the initial configuration of the particles and no hypothesis on the system configurations that the particles are forming, the second one requires fewer hypothesis about the initial configuration of the particles but does not work for all pos…

Leader electionComputer Networks and CommunicationsComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technology[INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM][INFO] Computer Science [cs]Computer securitycomputer.software_genre01 natural sciencesComputer Science ApplicationsTheoretical Computer ScienceIdentifierProgrammable matter[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computational Theory and Mathematics010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingcomputerSoftware
researchProduct

Solving Two-Person Zero-Sum Stochastic Games With Incomplete Information Using Learning Automata With Artificial Barriers

2021

Learning automata (LA) with artificially absorbing barriers was a completely new horizon of research in the 1980s (Oommen, 1986). These new machines yielded properties that were previously unknown. More recently, absorbing barriers have been introduced in continuous estimator algorithms so that the proofs could follow a martingale property, as opposed to monotonicity (Zhang et al., 2014), (Zhang et al., 2015). However, the applications of LA with artificial barriers are almost nonexistent. In that regard, this article is pioneering in that it provides effective and accurate solutions to an extremely complex application domain, namely that of solving two-person zero-sum stochastic games that…

Learning automataComputer Networks and CommunicationsComputer scienceVDP::Technology: 500::Information and communication technology: 550Monotonic functionMathematical proofMartingale (betting system)Computer Science Applicationssymbols.namesakeStrategyArtificial IntelligenceComplete informationNash equilibriumSaddle pointsymbolsApplied mathematicsSoftwareIEEE Transactions on Neural Networks and Learning Systems
researchProduct

A nested virtualization tool for information technology practical education

2016

Background A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. Results This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. Conclusions The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that woul…

Lecture-based learningNetwork securityComputer scienceProblem-based learningDistributed computingNested virtualization02 engineering and technologyMultidisciplinary approach020204 information systems0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDEDUCATIONComputer networksSystem administrationMultidisciplinarybusiness.industry05 social sciences050301 educationInformation technologyNetwork securityNested virtualizationProblem-based learningSystem administrationbusinessSoftware engineering0503 educationSoftwareSpringerPlus
researchProduct

A status report

1992

Abstract This article considers the financial and proprietary considerations applicable to computer crime, computer security and personal privacy. The failure to take proper precautions in these areas can lead to major operational problems and substantial loss of assets. Developments in the late 1980s, particulary the discovery by the public press of so-called ‘computer viruses’, indicates the need for counsel representing suppliers and users to understand the basic technology involved and the legal implications. Such a report by Robert Bigelow was first published in CLSR in March 1989. He has now updated and revised the text which will be featured in several parts. In the first parts the l…

Legal positionComputer Networks and Communicationsbusiness.industryInternet privacySociologyComputer securitycomputer.software_genreStatus reportbusinessLawGeneral Business Management and AccountingcomputerComputer virusComputer Law & Security Review
researchProduct

El plagio cinematográfico de Letty Lynton (1932) y su impacto en la industria fílmica estadounidense: análisis del proceso judicial y de su cobertura…

2016

Este artículo presenta un exhaustivo análisis del proceso judicial relativo al film Letty Lynton (1932), que, pese a ser un emblema del periodo clásico de Hollywood, fue prohibido en 1936, tras la denuncia de dos dramaturgos que acusaron a Metro-Goldwyn-Mayer de haber plagiado una de sus obras. El pleito evidenció una complejidad en materia de infracción del copyright que la justicia estadounidense no había afrontado hasta el momento, entre otros motivos porque la cinta partía de unos hechos reales acontecidos durante el siglo XIX y la productora había adquirido los derechos de una novela que también los relataba. Los continuos recursos y resoluciones judiciales finalizaron, tras ochos años…

Letty Lynton (1932)Hollywood film industryplagiarism in filmComputer Networks and CommunicationsCommunicationcopyrightindustria cinematográfica de Hollywoodfilm journalismjusticia estadounidenseplagio cinematográficoUS justiceperiodismo cinematográficoObservatorio (OBS*)
researchProduct

A LiDAR Prototype with Silicon Photomultiplier and MEMS Mirrors

2018

In this paper, we present a low cost prototype of a Time-Of-Flight (TOF) LiDAR system, employing a SiPM as photo detector and MEMS mirrors in order to steer the nanosecond pulsed optical beam with a scanning angle of +/-6°. Preliminary TOF measurements have been performed both indoor and outdoor to test the limits of the system.

LiDARMaterials scienceSiPMInstrumentationOptical beamComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEnergy Engineering and Power TechnologyPhotodetectorSettore ING-INF/01 - ElettronicaIndustrial and Manufacturing EngineeringOpticsSilicon photomultiplierArtificial IntelligenceSilicon PhotomultiplierInstrumentationMicroelectromechanical systemsRenewable Energy Sustainability and the Environmentbusiness.industryTOFComputer Science Applications1707 Computer Vision and Pattern RecognitionNanosecondMEMSComputer Networks and CommunicationLidarbusinessLiDAR TOF SiPM Silicon Photomultiplier MEMS2018 IEEE 4th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct

Mapping wordnets from the perspective of inter-lingual equivalence

2017

Mapping wordnets from the perspective of inter-lingual equivalence This paper explores inter-lingual equivalence from the perspective of linking two large lexico-semantic databases, namely the Princeton WordNet of English and the plWordnet ( pl. Slowosiec ) of Polish. Wordnets are built as networks of lexico-semantic relations between words and their meanings, and constitute a type of monolingual dictionary cum thesaurus. The development of wordnets for different languages has given rise to many wordnet linking projects (e.g. EuroWordNet, Vossen, 2002). Regardless of a linking method used, these projects require defining rules for establishing equivalence links between wordnet building bloc…

Linguistics and LanguageComputer Networks and CommunicationsWordNetequivalencetranslationcomputer.software_genrelcsh:P325-325.5Polish wordnet (Słowosieć)Equivalence (formal languages)Princeton WordnetMathematicsbusiness.industryCommunicationlcsh:P98-98.5lcsh:LexicographyLexicographywordnet mappingArtificial intelligencebilingual lexicographylcsh:Computational linguistics. Natural language processingbusinesscomputerlcsh:P327-327.5Natural language processingEuroWordNetlcsh:SemanticsCognitive Studies / Etudes Cognitives (former title: Studia Kognitywne)
researchProduct

MODULAR KNOWLEDGE REPRESENTATION IN ADVISOR AGENTS FOR SITUATION AWARENESS

2011

A modular knowledge representation framework for conversational agents is presented. The approach has been realized to suit the situation awareness paradigm. The modularity of the framework makes possible the composition of specific modules that deal with particular features, simplifying both the chatbot design process and its smartness. As a proof of concepts we have developed a modular, situation awareness oriented, KB for a conversational agent, which plays the role of an advisor aimed at helping a user to be in charge of a virtual town, inspired to the SimCity series game. The agent makes an extensive use of semantic computing techniques and is able to perceive, comprehend and project c…

Linguistics and LanguageDecision support systemKnowledge managementSituation awarenessKnowledge representation and reasoningComputer Networks and CommunicationsComputer sciencecomputer.software_genreModularityChatbotArtificial IntelligenceHuman–computer interactionSemantic computingDialog systemSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSituation awareness; conversational agents; decision support systemsbusiness.industryconversational agentModular designComputer Science ApplicationsSituation awarenebusinesscomputerdecision support systemsSoftwareInformation Systems
researchProduct

A Multi-Phase Decode-and-Forward Transmission Protocol in Cognitive Relay Networks: Outage Analysis and Relay Power Allocation

2015

Consider an underlay cognitive relay network with multiple source and destination pairs and that a decode-and-forward scheme is adopted at the relay. We propose a multi-phase transmission protocol in this paper which involves cooperation among source, relay and destination nodes. Given perfect interference elimination before decoding at the destination nodes, we derive closed-form expressions for outage probability calculation over Rayleigh fading channels. Furthermore, the optimal relay power allocation factor which leads to minimal outage probability is determined. Numerical results reveal the conditions under which satisfactory performance can be achieved based on the proposed scheme.

Link Access Procedure for Frame Relaybusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYlaw.inventionPower (physics)RelaylawComputer Science::Networking and Internet ArchitectureUnderlayTransmission protocolbusinessDecoding methodsRelay channelComputer Science::Information TheoryCommunication channelRayleigh fadingComputer network2015 IEEE 81st Vehicular Technology Conference (VTC Spring)
researchProduct

Is TCP Packet Reordering Always Harmful?

2004

IP networks do not provide any guarantee that packets belonging to the same flow are delivered in the correct order. Out-of-order reception of packets was commonly considered due to pathological network conditions (such as link failures, etc.). However, it has been shown that packet reordering is a phenomenon which occurs even in normal network operation, due to a number of link-level and/or router-level implementation features, such as local parallelism and load balancing. Packet reordering is intuitively considered as a negative phenomenon, which may severely affect TCP traffic performance since it is expected to cause inefficient usage of the available link bandwidth and is expected to i…

Link state packetNetwork packetbusiness.industryComputer scienceTransmission Control ProtocolRadio Link ProtocolDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnd-to-end delayLoad balancing (computing)law.inventionTCP global synchronizationlawNetwork performancebusinessComputer network
researchProduct