Search results for "Distributed"

showing 10 items of 1260 documents

Three-dimensional matching based resource provisioning for the design of low-latency heterogeneous IoT networks

2019

Internet-of-Things (IoT) is a networking architecture where promising, intelligent services are designed via leveraging information from multiple heterogeneous sources of data within the network. However, the availability of such information in a timely manner requires processing and communication of raw data collected from these sources. Therefore, the economic feasibility of IoT-enabled networks relies on the efficient allocation of both computational and communication resources within the network. Since fog computing and 5G cellular networks approach this problem independently, there is a need for joint resource-provisioning of both communication and computational resources in the networ…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIoTbusiness.industryComputer scienceDistributed computingResource constraintsResource Provisioning020206 networking & telecommunicationsProvisioning02 engineering and technologyFogPRBFog computing0202 electrical engineering electronic engineering information engineeringCellular networkMatching020201 artificial intelligence & image processingLatency (engineering)Internet of ThingsbusinessRaw dataSAP5G5G
researchProduct

A Middleware to Develop and Test Vehicular Sensor Network Applications

2019

The Smart city ecosystem is composed of several networked devices that provide services to citizens and improve their quality of life. Basic services, which must be exposed by the underlying software infrastructure, require efficient networking and communication protocols to coordinate and manage all the system components. In particular, Vehicular Sensor Networks (VSNs) are envisioned as key components of smart cities. Verification is crucial in such a highly dynamic scenario to ensure operation correctness and to reduce the development cost of smart applications. However, the rigidity of existing middlewares makes development, reconfiguration, and testing rather difficult. In this work, we…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIterative and incremental developmentSoftware VerificationCorrectnessComputer science020209 energyDistributed computing020208 electrical & electronic engineeringControl reconfiguration02 engineering and technologycomputer.file_formatcomputer.software_genreSmart CitieVehicular Sensor NetworkDistributed ApplicationSmart cityMiddleware (distributed applications)0202 electrical engineering electronic engineering information engineeringSymbolic processingSoftware Development and TestingExecutableCommunications protocolcomputerWireless sensor network2019 AEIT International Conference of Electrical and Electronic Technologies for Automotive (AEIT AUTOMOTIVE)
researchProduct

A Monitoring Framework Exploiting the Synergy between Actual and Virtual Wireless Sensors

2006

This paper describes a framework that allows realistic monitoring of a wireless sensor network in order to assess its behavior before actually deploying all the nodes. Designing a wireless sensor network for a specific application typically involves a preliminary phase of simulations that rely on specialized software, whose behavior does not necessarily reproduce what will be experienced by an actual network. On the other hand, delaying the test phase until deployment may not be advisable due to unreasonable costs. This paper suggests the adoption of a hybrid approach that involves coupling an actual wireless sensor network composed of a minimal set of actual nodes with a simulated one; we …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniKey distribution in wireless sensor networksWireless site surveyComputer scienceSoftware deploymentVisual sensor networkbusiness.industryDistributed computingMobile wireless sensor networkWirelessbusinessWireless sensor networkWireless sensor networks2006 International Conference on Parallel Processing Workshops (ICPPW'06)
researchProduct

Secure random number generation in wireless sensor networks

2011

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniLeader electionleader election random numbers generation wireless sensor networksRandom number generationbusiness.industryComputer scienceDistributed computingKey distribution in wireless sensor networksTrue random numbers generatorRobustness (computer science)Mobile wireless sensor networknetwork securityWirelessbusinesswireless sensor networksWireless sensor networkRandomnessComputer Science::Cryptography and SecurityComputer network
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

Enabling Technologies on Hybrid Camera Networks for Behavioral Analysis of Unattended Indoor Environments and Their Surroundings

2008

This paper presents a layered network architecture and the enabling technologies for accomplishing vision-based behavioral analysis of unattended environments. Specifically the vision network covers both the attended environment and its surroundings by means of multi-modal cameras. The layer overlooking at the surroundings is laid outdoor and tracks people, monitoring entrance/exit points. It recovers the geometry of the site under surveillance and communicates people positions to a higher level layer. The layer monitoring the unattended environment undertakes similar goals, with the addition of maintaining a global mosaic of the observed scene for further understanding. Moreover, it merges …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetwork architecturebusiness.industryReliability (computer networking)Computer laboratorydistributed video surveillanceSMART CAMERA NETWORKSBehavioral analysisMULTI-MODAL SENSOR FUSIONECamera networkGeographyHuman–computer interactionmulti-modal surveillance; wireless sensor networksEMBEDDED SMART CAMERASmulti-modal surveillanceMULTI-MODAL SENSOR FUSIONE; SMART CAMERA NETWORKS; EMBEDDED SMART CAMERASComputer visionArtificial intelligenceLayer (object-oriented design)businesswireless sensor networks
researchProduct

A management architecture for active networks

2003

In this paper we present an architecture for network and applications management, which is based on the Active Networks paradigm and shows the advantages of network programmability. The stimulus to develop this architecture arises from an actual need to manage a cluster of active nodes, where it is often required to redeploy network assets and modify nodes connectivity. In our architecture, a remote front-end of the managing entity allows the operator to design new network topologies, to check the status of the nodes and to configure them. Moreover, the proposed framework allows to explore an active network, to monitor the active applications, to query each node and to install programmable …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetwork packetbusiness.industryComputer sciencecomputer.internet_protocolDistributed computingTestbedSimple Network Management ProtocolNetwork topologyNetwork managementbusinessActive Networks Network ManagementcomputerNetwork management stationXMLActive networkingComputer networkProceedings of Fourth Annual International Workshop on Active Middleware Services
researchProduct

QoS-Aware Fault Detection in Wireless Sensor Networks

2013

Wireless sensor networks (WSNs) are a fundamental building block of many pervasive applications. Nevertheless the use of such technology raises new challenges regarding the development of reliable and fault-tolerant systems. One of the most critical issues is the detection of corrupted readings amidst the huge amount of gathered sensory data. Indeed, such readings could significantly affect the quality of service (QoS) of the WSN, and thus it is highly desirable to automatically discard them. This issue is usually addressed through “fault detection” algorithms that classify readings by exploiting temporal and spatial correlations. Generally, these algorithms do not take into account QoS re…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniQA75Article SubjectComputer Networks and CommunicationsComputer scienceQuality of serviceReal-time computingGeneral EngineeringBayesian networkcomputer.software_genreMulti-objective optimizationFault detection and isolationlcsh:QA75.5-76.95Distributed algorithmData mininglcsh:Electronic computers. Computer scienceWireless Sensor NetworksWireless sensor networkcomputerBlock (data storage)International Journal of Distributed Sensor Networks
researchProduct

A fog-based hybrid intelligent system for energy saving in smart buildings

2019

In recent years, the widespread diffusion of pervasive sensing devices and the increasing need for reducing energy consumption have encouraged research in the energy-aware management of smart environments. Following this direction, this paper proposes a hybrid intelligent system which exploits a fog-based architecture to achieve energy efficiency in smart buildings. Our proposal combines reactive intelligence, for quick adaptation to the ever-changing environment, and deliberative intelligence, for performing complex learning and optimization. Such hybrid nature allows our system to be adaptive, by reacting in real time to relevant events occurring in the environment and, at the same time, …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniQA75General Computer ScienceAmbient Intelligence Fuzzy Systems Fog Computing Energy Efficiencybusiness.industryComputer scienceDistributed computingComputational intelligence02 engineering and technologyEnergy consumptionHybrid intelligent systemHome automation020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSmart environmentbusinessAdaptation (computer science)Efficient energy useBuilding automationJournal of Ambient Intelligence and Humanized Computing
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct