Search results for "NETWORK"

showing 10 items of 7718 documents

New insights into the OCST problem

2009

This paper considers the Euclidean variant of the optimal communciation spanning tree (OCST) problem. Researches have analyzed the structure of the problem and found that high quality solutions prefer edges of low cost. Further, edges pointing to the center of the network are more likely to be included in good solutions. We add to the literature and provide additional insights into the structure of the OCST problem. Therefore, we investigate properies of the whole tree, such as node degrees and the Wiener index. The results reveal that optimal solutions are structured in a star-like manner. There are few nodes with high node degrees, these nodes are located next to the graph's center. The m…

Tree (data structure)Mathematical optimizationeducation.field_of_studySpanning treeDegree (graph theory)Node (networking)PopulationEvolutionary algorithmGraph (abstract data type)educationAlgorithmMinimum degree spanning treeMathematicsProceedings of the 11th Annual conference on Genetic and evolutionary computation
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

User requirements and resource control for cooperative multimedia applications

1997

The spread of distributed multimedia applications is setting forth a new set of challenges in the management of host and network resources for guaranteeing Quality of Service (QoS). When the multimedia applications compete for resources as in the case of a cooperative multimedia environment, the management task becomes even more difficult. In this work, we first discuss QoS for multimedia applications. We then present the architectural and implementation details of a Cooperative Multimedia Environment (CME) made up of Cooperative Multimedia Applications (COMMA), one for each user. A COMMA presents a user with a single interface that allows him to invite other users to a cooperative session,…

World Wide WebMultimediaComputer scienceInterface (Java)Quality of serviceIP Multimedia SubsystemWireless Multimedia ExtensionsSession (computer science)User requirements documentcomputer.software_genrecomputerHost (network)Task (project management)
researchProduct

Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture

2009

Some initiatives towards Future Internet, e.g., GENI, DARPA's Active Networks, argue the need for programmability of the network components. Some other initiatives extend this with argumentation for declarative networking, where the behavior of a network component is specified using some high-level declarative language, with a software-based engine implementing the behavior based on that specification. Our Proactive Future Internet (PROFI) vision follows these initiatives targeting also the following two problems: interoperability of the network elements programmed by different organizations, and the need for flexible cooperation among network elements, including coordination, conflict reso…

business.industrycomputer.internet_protocolComputer scienceInteroperabilityService-oriented architecturecomputer.software_genreWorld Wide WebNetwork elementSoftware agentMiddleware (distributed applications)The InternetbusinessSemantic WebcomputerActive networking2009 Fifth International Conference on Networking and Services
researchProduct

A Multilevel Analysis of Economic Literacy Among International Students

2021

International student mobility has increased in the past years. The inclusion of a highly heterogeneous group of students requires updated recruitment and admission strategies. A particularly vulnerable group of international students are refugees, who have an exceptionally high risk of dropping out of their studies. We present an entrance assessment of incoming international students from 77 countries who are at the beginning of their studies in Germany. Based on this unique sample, we examine (i) whether there are systematic country-specific effects on the economic literacy of beginning students of business and economics and (ii) whether refugee students differ from the group of internati…

Medical educationHeterogeneous groupHigher educationbusiness.industryRefugeeeducation05 social sciencesMultilevel model050301 education020206 networking & telecommunicationsSample (statistics)02 engineering and technologyEconomic literacyEducation0202 electrical engineering electronic engineering information engineeringRelevance (law)businessPsychology0503 educationInclusion (education)Journal of International Students
researchProduct

Do South African townships lack entrepreneurial spirit?

2014

It is often assumed that the black population of South Africa lack entrepreneurial spirit and an entrepreneurial culture. A survey conducted in the Walmer Township in Port Elizabeth explored the entrepreneurial spirit and culture in terms of entrepreneurial activities, perceived start-up barriers, entrepreneurship climate, and general cultural factors relating to entrepreneurship. The sample comprised of 309 black adults living in Walmer Township. The results revealed surprisingly high entrepreneurial activity in the form of informal business ventures. Furthermore, the level of entrepreneurial aspirations turned out to be higher than expected. Many of the township inhabitants regard the tow…

Entrepreneurial cultureEconomics and EconometricsEntrepreneurshipeducation.field_of_studyEconomic growthPopulationEntrepreneurial spiritSample (statistics)BusinessBusiness and International ManagementeducationPort (computer networking)International Journal of Entrepreneurship and Small Business
researchProduct

Using Network Community Detection to Investigate the Psychopathy Levels of Subjects Condemned for Mafia Crimes

2014

The main objective of this study is to understand what are the psychopathy levels of subjects condemned for Mafia crimes. To this end we will investigate a set of 30 subjects condemned for Mafia crimes and imprisoned in the “Pagliarelli” jail of Palermo (Italy). We will test their psychopathy level by using the PCL-R test. Additionally we will also investigate some other sociological feature of these subjects. This will allow us to characterize these criminals in terms of some psychiatric or sociological features. Such statistical characterization will be performed by using tools and methodologies of Statistical Physics and Network Theory. We believe that the importance of our study is twof…

Interpersonal relationshipPsychopathymedicineQuantitative assessmentNetwork theoryCriminologymedicine.diseaseSet (psychology)PsychologySocial psychologyTest (assessment)SSRN Electronic Journal
researchProduct

Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine

2020

The rapid deployment in information and communication technologies and internet-based services have made anomaly based network intrusion detection ever so important for safeguarding systems from novel attack vectors. To this date, various machine learning mechanisms have been considered to build intrusion detection systems. However, achieving an acceptable level of classification accuracy while preserving the interpretability of the classification has always been a challenge. In this paper, we propose an efficient anomaly based intrusion detection mechanism based on the Tsetlin Machine (TM). We have evaluated the proposed mechanism over the Knowledge Discovery and Data Mining 1999 (KDD’99) …

Artificial neural networkbusiness.industryComputer science0206 medical engineeringDecision tree02 engineering and technologyIntrusion detection systemMachine learningcomputer.software_genreRandom forestSupport vector machineStatistical classificationKnowledge extraction0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinesscomputer020602 bioinformaticsInterpretability2020 IEEE Symposium Series on Computational Intelligence (SSCI)
researchProduct

A Dynamic Simulation Approach to Frame Drivers and Implications of Corruption Practices on Firm Performance

2014

Corruption is a multifaceted socio-economic phenomenon widely spread – although with different intensity – all around the world. Many studies on corruption have been conducted at a country-level, but relatively little effort has been placed in evaluating its implications, in terms of both financial and competitive performance, at a firm-level. Therefore, this paper aims at exploring the causal relationships underlying the effect of corruption on firm performance in order to show the different scenarios that may emerge from the combination between external (i.e., contextual conditions) and internal (i.e., organizational characteristics) forces that drive corruption. To this end, we adopt a D…

Performance managementbusiness.industryCorruptionStrategy and Managementmedia_common.quotation_subjectFrame (networking)Public relationsSystem dynamicsSocial systemOrder (exchange)PhenomenonBusinessScenario analysisBusiness and International ManagementIndustrial organizationmedia_commonEuropean Management Review
researchProduct

Paths Coloring Algorithms in Mesh Networks

2003

In this paper, we will consider the problem of coloring directed paths on a mesh network. A natural application of this graph problem is WDM-routing in all-optical networks. Our main result is a simple 4-approximation algorithm for coloring line-column paths on a mesh. We also present sharper results when there is a restriction on the path lengths. Moreover, we show that these results can be extended to toroidal meshes and to line-column or column-line paths.

AlgorithmicsMesh networkingPath (graph theory)Approximation algorithmPolygon meshFractional coloringTelecommunications networkAlgorithmTime complexityMathematics
researchProduct