Search results for "Network"
showing 10 items of 7718 documents
Skeletons for parallel image processing: an overview of the SKiPPER project
2002
International audience; This paper is a general overview of the SKIPPER project, run at Blaise Pascal University between 1996 and 2002. The main goal of the SKIPPER project was to demonstrate the appli- cability of skeleton-based parallel programming techniques to the fast prototyping of reactive vision applications. This project has produced several versions of a full-fledged integrated pa- rallel programming environment (PPE). These PPEs have been used to implement realistic vi- sion applications, such as road following or vehicle tracking for assisted driving, on embedded parallel platforms embarked on semi-autonomous vehicles. All versions of SKIPPER share a common front-end and reperto…
Network Slicing Enabled Resource Management for Service-Oriented Ultra-Reliable and Low-Latency Vehicular Networks
2020
Network slicing has been considered as a promising candidate to provide customized services for vehicular applications that have extremely high requirements of latency and reliability. However, the high mobility of vehicles poses significant challenges to resource management in such a stochastic vehicular environment with time-varying service demands. In this paper, we develop an online network slicing scheduling strategy for joint resource block (RB) allocation and power control in vehicular networks. The long-term time-averaged total system capacity is maximized while guaranteeing strict ultra-reliable and low-latency requirements of vehicle communication links, subject to stability const…
Analysis of mobile-oriented energy consumption for heterogeneous connections in hybrid wireless networks
2012
While more and more mobile devices are equipped with both cellular and WLAN interfaces for internet access, the energy consumption aspect of these connections has not been studied in depth in the literature. In this paper, a hybrid network with three alternative wireless connections, namely, a cellular component, a combined component with a mixed ad hoc and cellular link, or an infrastructure-based WLAN component, is investigated. A distance-based analysis on the energy consumption of a mobile station has been performed for each alternative wireless connection, and corresponding numerical results have been obtained. The results suggest that, to increase link throughput while maintaining min…
BEGIN: Big Data Enabled Energy-Efficient Vehicular Edge Computing
2018
Vehicular edge computing is essential to support future emerging multimedia-rich and delay-sensitive applications in vehicular networks. However, the massive deployment of edge computing infrastructures induces new problems including energy consumption and carbon pollution. This motivates us to develop BEGIN (Big data enabled EnerGy-efficient vehIcular edge computiNg), a programmable, scalable, and flexible framework for integrating big data analytics with vehicular edge computing. In this article, we first present a comprehensive literature review. Then the overall design principle of BEGIN is described with an emphasis on computing domain and data domain convergence. In the next section, …
Multi-Layer Offloading at the Edge for Vehicular Networks
2020
This paper proposes a multi-layer platform for job offloading in vehicular networks. Offloading is performed from vehicles in the Vehicular Domain towards Multi-Access Edge Computing (MEC) Servers deployed at the edge of the network, and between MEC Servers. Offloading decisions at both domains are challenging for the overall system performance. Optimization at the MEC Layer domain is obtained by model-based Reinforcement Learning, while a strategy to decide the best offloading rate from the Vehicular Domain is defined to achieve the desired trade-off between costs and performance. Numerical analysis shows the achieved performance.
Privacy-preserving scheme for mobile ad hoc networks
2011
This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes.
Location Based Information Storage and Dissemination in Vehicular Ad Hoc Networks
2010
Vehicular Ad Hoc Networks (VANETs) is an emerging type of information networks in urban areas. A lot of research has been done in the area of increasing the vehicle awareness by disseminating collision and congestion warnings, and parking place availability information. In this paper we propose a novel idea and framework for dissemination of location based information, called digital maps, which are useful not only directly for the drivers and vehicle onboard navigation systems, but also external entities, such as tourists, environmental scientists, emergency services, advertisement companies. Centralized authority defines cooperative knowledge collection tasks and disseminates orders in th…
Video Streaming Distribution in VANETs
2011
Streaming applications will rapidly develop and contribute a significant amount of traffic in the near future. A problem, scarcely addressed so far, is how to distribute video streaming traffic from one source to all nodes in an urban vehicular network. This problem significantly differs from previous work on broadcast and multicast in ad hoc networks because of the highly dynamic topology of vehicular networks and the strict delay requirements of streaming applications. We present a solution for intervehicular communications, called Streaming Urban Video (SUV), that 1) is fully distributed and dynamically adapts to topology changes, and 2) leverages the characteristics of streaming applica…
How to prevent cyber-attacks in inter-vehicle communication network?
2015
In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.
Castadiva: A Test-Bed Architecture for Mobile AD HOC Networks
2007
Evaluating and deploying all sorts of protocols and applications designed for wireless ad hoc networks in a real environment is an important and urgent task. Traditionally, all the proposals made rely solely on simulator results. However, as different research groups develop different solutions to solve problems related to these new networks, it becomes more and more important to migrate the proposed solutions to a real environment. In this work we present Castadiva, a test-bed architecture that allows validating software solutions for ad hoc networks using low-cost, of the-shelf devices and open source software. Through a friendly user interface, Castadiva offers the possibility to define …