Search results for "LESS"

showing 10 items of 2452 documents

Strategie di codifica linguistica degli eventi di movimento nel greco omerico

2019

Il saggio indaga le strategie linguistiche con cui lo stadio omerico della lingua greca tende ad esprimere un evento di moto, cioè un evento che coinvolge il movimento (o la collocazione) di un’entità nello spazio. Il fondamentale dominio cognitivo dello spazio viene infatti codificato in modi differenti dalle diverse lingue del mondo, e le strategie di codifica degli eventi di moto costituiscono un parametro su cui la Tipologia ha negli ultimi decenni concentrato il suo interesse, pervenendo all’individuazione di tipi linguistici sulla base della strategia con cui ciascuna lingua tende a codificare tale tipo di eventi. Sulla scorta del concetto di ‘uniformitarianismo linguistico’, la natur…

Eventi di moto aspetto lessicale telicità particelle preposizioni greco arcaico OmeroSettore L-LIN/01 - Glottologia E Linguistica
researchProduct

A study of mobility and reachability in ad hoc networks using stochastic activity networks

2006

The integration of ad-hoc networks into real environments is now becoming more and more common and supervision and control systems are no exception. The efficiency of the communication in these networks as well as various other factors, are governed by the working area, the number of nodes, mobility, transmission power, etc. In this paper, the mobility and reachability of mobile nodes appearing spontaneously in a large installation such as can be found in a water purification system are studied. These nodes form an ad-hoc network and communicate between each other in order to finally reach a fixed node which can offer them information from the rest of the system in real time or act as a gat…

Evolving networksCover (telecommunications)Transmission (telecommunications)Computer scienceWireless ad hoc networkReachabilitybusiness.industryControl systemNode (networking)Distributed computingDefault gatewaybusinessComputer network2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. NGI '06.
researchProduct

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

Activité physique et prévention des chutes chez les personnes âgées

2015

Les chutes chez les personnes âgées sont fréquentes : près d’une personne de plus de 65 ans sur trois et une personne de plus de 80 ans sur deux chutent chaque année. L’état de santé, les capacités fonctionnelles, les facteurs comportementaux ou les caractéristiques de l’environnement constituent autant de facteurs de risque. Au-delà des traumatismes physiques et psychologiques tels que la peur de tomber qui en résultent, les chutes peuvent entraîner des limitations fonctionnelles, une diminution de la qualité de vie, une perte d’autonomie voire une entrée en institution.Dans un contexte de vieillissement de la population, la prévention des chutes et la préservation de l’autonomie dans les …

Exercice physiqueCollection Expertise collective / ISBN 978-2-85598-920-5[SDV.MHEP] Life Sciences [q-bio]/Human health and pathologyOstéoporoseFaiblesse musculairePrévention des accidentsChutes accidentellesVieillissementSujet âgéEspérance de vie[SDV.MHEP]Life Sciences [q-bio]/Human health and pathology
researchProduct

Enabling Backoff for SCM Wake-Up Radio: Protocol and Modeling

2017

In sub-carrier modulation (SCM) wake-up radio (WuR) enabled wireless sensor networks, a node can initiate data transmission at any instant of time. In this letter, we propose to activate a backoff procedure before sending wake-up calls (WuCs) in order to avoid potential collisions among WuCs. Consequently, no backoff is needed for the main radio after a WuC is received. A discrete-time Markov chain model is developed to evaluate the performance. Numerical results on network throughput, energy efficiency, average delay, and collision probability reveal the benefits of enabling backoff for SCM-WuRs, especially under heavy traffic loads or saturated traffic conditions.

Exponential backoffMarkov chainbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryReal-time computing020206 networking & telecommunicationsThroughput02 engineering and technology01 natural sciences0104 chemical sciencesComputer Science ApplicationsModulationModeling and Simulation0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringbusinessWireless sensor networkComputer networkEfficient energy useData transmissionIEEE Communications Letters
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Investigating Low Level Protocols for Wireless Body Sensor Networks

2016

The rapid development of medical sensors has increased the interest in Wireless Body Area Network (WBAN) applications where physiological data from the human body and its environment is gathered, monitored, and analyzed to take the proper measures. In WBANs, it is essential to design MAC protocols that ensure adequate Quality of Service (QoS) such as low delay and high scalability. This paper investigates Medium Access Control (MAC) protocols used in WBAN, and compares their performance in a high traffic environment. Such scenario can be induced in case of emergency for example, where physiological data collected from all sensors on human body should be sent simultaneously to take appropria…

FOS: Computer and information sciencesComputer scienceComputer Science - Information TheoryTime division multiple accessAccess control[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Body area network0202 electrical engineering electronic engineering information engineeringWirelessProtocol (science)business.industryInformation Theory (cs.IT)Quality of service020208 electrical & electronic engineeringComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science - Distributed Parallel and Cluster Computing[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Scalability[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer network
researchProduct

Efficient and accurate monitoring of the depth information in a Wireless Multimedia Sensor Network based surveillance

2017

International audience; Abstract—Wireless Multimedia Sensor Network (WMSN) is a promising technology capturing rich multimedia data like audio and video, which can be useful to monitor an environment under surveillance. However, many scenarios in real time monitoring requires 3D depth information. In this research work, we propose to use the disparity map that is computed from two or multiple images, in order to monitor the depth information in an object or event under surveillance using WMSN. Our system is based on distributed wireless sensors allowing us to notably reduce the computational time needed for 3D depth reconstruction, thus permitting the success of real time solutions. Each pa…

FOS: Computer and information sciencesComputer scienceComputer Vision and Pattern Recognition (cs.CV)Real-time computingComputer Science - Computer Vision and Pattern Recognition[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyImage (mathematics)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringWirelessWireless multimedia sensor networksEvent (computing)business.industryNode (networking)Bandwidth (signal processing)020206 networking & telecommunicationsObject (computer science)[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationStereopsis[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]business2017 Sensors Networks Smart and Emerging Technologies (SENSET)
researchProduct

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct