Search results for "NETWORK"
showing 10 items of 7718 documents
New insights into the OCST problem
2009
This paper considers the Euclidean variant of the optimal communciation spanning tree (OCST) problem. Researches have analyzed the structure of the problem and found that high quality solutions prefer edges of low cost. Further, edges pointing to the center of the network are more likely to be included in good solutions. We add to the literature and provide additional insights into the structure of the OCST problem. Therefore, we investigate properies of the whole tree, such as node degrees and the Wiener index. The results reveal that optimal solutions are structured in a star-like manner. There are few nodes with high node degrees, these nodes are located next to the graph's center. The m…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
User requirements and resource control for cooperative multimedia applications
1997
The spread of distributed multimedia applications is setting forth a new set of challenges in the management of host and network resources for guaranteeing Quality of Service (QoS). When the multimedia applications compete for resources as in the case of a cooperative multimedia environment, the management task becomes even more difficult. In this work, we first discuss QoS for multimedia applications. We then present the architectural and implementation details of a Cooperative Multimedia Environment (CME) made up of Cooperative Multimedia Applications (COMMA), one for each user. A COMMA presents a user with a single interface that allows him to invite other users to a cooperative session,…
Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture
2009
Some initiatives towards Future Internet, e.g., GENI, DARPA's Active Networks, argue the need for programmability of the network components. Some other initiatives extend this with argumentation for declarative networking, where the behavior of a network component is specified using some high-level declarative language, with a software-based engine implementing the behavior based on that specification. Our Proactive Future Internet (PROFI) vision follows these initiatives targeting also the following two problems: interoperability of the network elements programmed by different organizations, and the need for flexible cooperation among network elements, including coordination, conflict reso…
A Multilevel Analysis of Economic Literacy Among International Students
2021
International student mobility has increased in the past years. The inclusion of a highly heterogeneous group of students requires updated recruitment and admission strategies. A particularly vulnerable group of international students are refugees, who have an exceptionally high risk of dropping out of their studies. We present an entrance assessment of incoming international students from 77 countries who are at the beginning of their studies in Germany. Based on this unique sample, we examine (i) whether there are systematic country-specific effects on the economic literacy of beginning students of business and economics and (ii) whether refugee students differ from the group of internati…
Do South African townships lack entrepreneurial spirit?
2014
It is often assumed that the black population of South Africa lack entrepreneurial spirit and an entrepreneurial culture. A survey conducted in the Walmer Township in Port Elizabeth explored the entrepreneurial spirit and culture in terms of entrepreneurial activities, perceived start-up barriers, entrepreneurship climate, and general cultural factors relating to entrepreneurship. The sample comprised of 309 black adults living in Walmer Township. The results revealed surprisingly high entrepreneurial activity in the form of informal business ventures. Furthermore, the level of entrepreneurial aspirations turned out to be higher than expected. Many of the township inhabitants regard the tow…
Using Network Community Detection to Investigate the Psychopathy Levels of Subjects Condemned for Mafia Crimes
2014
The main objective of this study is to understand what are the psychopathy levels of subjects condemned for Mafia crimes. To this end we will investigate a set of 30 subjects condemned for Mafia crimes and imprisoned in the “Pagliarelli” jail of Palermo (Italy). We will test their psychopathy level by using the PCL-R test. Additionally we will also investigate some other sociological feature of these subjects. This will allow us to characterize these criminals in terms of some psychiatric or sociological features. Such statistical characterization will be performed by using tools and methodologies of Statistical Physics and Network Theory. We believe that the importance of our study is twof…
Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine
2020
The rapid deployment in information and communication technologies and internet-based services have made anomaly based network intrusion detection ever so important for safeguarding systems from novel attack vectors. To this date, various machine learning mechanisms have been considered to build intrusion detection systems. However, achieving an acceptable level of classification accuracy while preserving the interpretability of the classification has always been a challenge. In this paper, we propose an efficient anomaly based intrusion detection mechanism based on the Tsetlin Machine (TM). We have evaluated the proposed mechanism over the Knowledge Discovery and Data Mining 1999 (KDD’99) …
A Dynamic Simulation Approach to Frame Drivers and Implications of Corruption Practices on Firm Performance
2014
Corruption is a multifaceted socio-economic phenomenon widely spread – although with different intensity – all around the world. Many studies on corruption have been conducted at a country-level, but relatively little effort has been placed in evaluating its implications, in terms of both financial and competitive performance, at a firm-level. Therefore, this paper aims at exploring the causal relationships underlying the effect of corruption on firm performance in order to show the different scenarios that may emerge from the combination between external (i.e., contextual conditions) and internal (i.e., organizational characteristics) forces that drive corruption. To this end, we adopt a D…
Paths Coloring Algorithms in Mesh Networks
2003
In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.