Search results for "Distributed computing"

showing 10 items of 622 documents

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing

2016

Personal health records (PHR) are an emerging health information exchange model, which facilitates PHR owners to efficiently share their private health data among a variety of users including healthcare professionals as well as family and friends. PHRs are usually outsourced and stored in third-party cloud platforms which relieves PHR owners from the burden of managing their PHR data while achieving better availability of health data. However, outsourcing private health data raises significant privacy concerns because there is a higher risk of leaking health information to unauthorized parties. To ensure PHR owners' control of their outsourced PHR data, attribute based encryption (ABE) mech…

020203 distributed computingbusiness.industryComputer scienceInternet privacy020206 networking & telecommunicationsAccess controlHealth information exchangeCloud computing02 engineering and technologyEncryptionComputer securitycomputer.software_genreOutsourcingResource (project management)Health care0202 electrical engineering electronic engineering information engineeringAttribute-based encryptionbusinesscomputer2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)
researchProduct

AS4 message exchange protocol consolidation through the European CEF eDelivery infrastructure

2020

Since 2014, the European Union has supported the creation of cross-border communication networks based on an AS4 eDelivery solution through the Connecting Europe Facility. This article describes the current status of the uptake of the AS4 message exchange protocol in accordance with both the European infrastructure CEF eDelivery and the European regulation n°910/2014 on electronic identification and trust services for electronic transactions in the internal market. The main objective is to present an analysis of the achieved results from the implementation of the AS4 solution in several European projects carried out during the last 12 years to verify the impact of these projects around Euro…

020203 distributed computingbusiness.industryComputer scienceInteroperability02 engineering and technologyTelecommunications networkDomestic marketExchange protocolConsolidation (business)Information and Communications Technology0202 electrical engineering electronic engineering information engineeringmedia_common.cataloged_instance020201 artificial intelligence & image processingEuropean unionTelecommunicationsbusinessE-procurementmedia_commonProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

A Stochastic Routing Algorithm for Distributed IoT with Unreliable Wireless Links

2016

Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose an improved distributed stochastic routing algorithm to increase packet delivery ratio and decrease delivery delay in IoT with unreliable communication links. We adopt the concept of absorbing Markov chain to model the network and evaluate the expected delivery ratio and expected delivery delay …

020203 distributed computingbusiness.industryComputer scienceNetwork packetDistributed computingReliability (computer networking)020206 networking & telecommunications02 engineering and technologyAbsorbing Markov chain0202 electrical engineering electronic engineering information engineeringWirelessRouting (electronic design automation)businessAlgorithmWireless sensor networkData transmissionComputer network2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Towards Intelligent IoT Networks: Reinforcement Learning for Reliable Backscatter Communications

2019

Backscatter communication is becoming the focal point of research for low-powered Internet of things (IoT). However, the intelligence aspect of the backscattering devices is not well-defined. Since future IoT networks are going to be a formidable platform of intelligent sensing devices operating in a self-organizing manner, it is necessary to incorporate learning capabilities in backscatter devices. Motivated by this objective, this paper aims to employ reinforcement learning for improving the performance of backscatter networks. In particular, a multicluster backscatter communication model is developed for shortrange information sharing. This is followed by a power allocation algorithm usi…

0203 mechanical engineeringBackscatterComputer scienceInformation sharingDistributed computing0202 electrical engineering electronic engineering information engineeringReinforcement learning020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyCeiling (cloud)Interference (wave propagation)Power (physics)2019 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Robust Network Agreement on Logical Information

2011

Abstract Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent's communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent's communication neighbors. The protocol allows the construction of a r…

0209 industrial biotechnology020901 industrial engineering & automationTheoretical computer scienceSettore ING-INF/04 - AutomaticaComputer scienceDistributed computingIntrusion detection security robust logical consensus networked and distributed systems.0202 electrical engineering electronic engineering information engineering020207 software engineeringTopology (electrical circuits)02 engineering and technologyIntrusion detection systemProtocol (object-oriented programming)
researchProduct

Reducing the observation error in a WSN through a consensus-based subspace projection

2013

An essential process in a Wireless Sensor Network is the noise mitigation of the measured data, by exploiting their spatial correlation. A widely used technique to achieve this reduction is to project the measured data into a proper subspace. We present a low complexity and distributed algorithm to perform this projection. Unlike other algorithms existing in the literature, which require the number of connections at every node to be larger than the dimension of the involved subspace, our algorithm does not require such dense network topologies for its applicability, making it suitable for a larger number of scenarios. Our proposed algorithm is based on the execution of several consensus pro…

0209 industrial biotechnologyBrooks–Iyengar algorithmComputer scienceDistributed computingNode (networking)020206 networking & telecommunications02 engineering and technologyNetwork topologyReduction (complexity)020901 industrial engineering & automationDistributed algorithm0202 electrical engineering electronic engineering information engineeringSymmetric matrixProjection (set theory)Wireless sensor networkAlgorithmSubspace topology
researchProduct

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

Intelligent virtual manufacturing cell formation in cloud-based design and manufacturing

2018

Abstract Cloud-based design and manufacturing (CBDM) can presumably stimulate greater intelligence in cloud-based models. This paper assumes that cloud-based design for cellular manufacturing can be referred to as a multiscale, uncertain, and dynamic service-oriented network where a set of CAD parts, modelled by set of features, can be manufactured in intelligent virtual manufacturing cells under certain constraints. Using the concepts of the holon and the attractor, integrating the uncertainty in the modelling of part design and part–manufacturing network, an approach to address intelligent virtual manufacturing cell formation in CBDM is proposed. The powerful role of the CAD features is e…

0209 industrial biotechnologyCloud-based design and manufacturingComputer scienceHolon (philosophy)business.industryCellular manufacturingDistributed computingCloud computing02 engineering and technologycomputer.software_genreFuzzy logic[SHS]Humanities and Social SciencesIntelligent agent020901 industrial engineering & automationArtificial IntelligenceControl and Systems Engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringCloud manufacturingManufacturing cellbusinesscomputerComputingMilieux_MISCELLANEOUSEngineering Applications of Artificial Intelligence
researchProduct

Adaptive Consensus-Based Distributed Kalman Filter for WSNs with Random Link Failures

2016

Wireless Sensor Networks have emerged as a very powerful tool for the monitoring and control, over large areas, of diverse phenomena. One of the most appealing properties of these networks is their potentiality to perform complex tasks in a total distributed fashion, without requiring a central entity. In this scenario, where nodes are constrained to use only local information and communicate with one-hop neighbors, iterative consensus algorithms are extensively used due to their simplicity. In this work, we propose the design of a consensus-based distributed Kalman filter for state estimation, in a sensor network whose connections are subject to random failures. As a result of this unrelia…

0209 industrial biotechnologyComputer scienceDistributed computingEstimator020206 networking & telecommunications02 engineering and technologyKalman filterInvariant extended Kalman filterExtended Kalman filter020901 industrial engineering & automationFilter (video)0202 electrical engineering electronic engineering information engineeringFast Kalman filterWireless sensor networkRandom variable2016 International Conference on Distributed Computing in Sensor Systems (DCOSS)
researchProduct

Topology design to increase network lifetime in WSN for graph filtering in consensus processes

2018

Graph filters, which are considered as the workhorses of graph signal analysis in the emerging field of signal processing on graphs, are useful for many applications such as distributed estimation in wireless sensor networks. Many of these tasks are based on basic distributed operators such as consensus, which are carried out by sensor devices under limited energy supply. To cope with the energy constraints, this paper focuses on designing the network topology in order to maximize the network lifetime and reduce the energy consumption when applying graph filters. The problem is a complex combinatorial problem and in this work, we propose two efficient heuristic algorithms for solving it. We…

0209 industrial biotechnologyComputer scienceDistributed computingLogical topology020206 networking & telecommunications02 engineering and technologyEnergy consumptionNetwork topologyGraph020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringAlgorithm designEnergy supplyWireless sensor network2017 25th European Signal Processing Conference (EUSIPCO)
researchProduct