Search results for "Network"

showing 10 items of 7718 documents

Quenched and annealed free energies

1984

This paper gives a simple exposition of the Nishimori method to solve certain quenched, random bond spin-glass models. It allows a transparent physical interpretation in terms of annealed systems. As an application a special solution of the Sherrington-Kirkpatrick model with a discrete probability distribution is obtained and shown to agree with the solution for the Gaussian case. This substantiates the claim that the averaged free energy does not depend on the details of the probability distribution Expose simple de la methode de Nishimori pour resoudre certains modeles de verres de spin avec interactions aleatoires. Interpretation transparente en termes de systemes recuits. Presentation d…

symbols.namesakeSpin glassCondensed matter physicsChemistrySpecial solutionGaussiansymbolsProbability distributionFree energiesIsing modelCondensed Matter::Disordered Systems and Neural NetworksMathematical physicsJournal de Physique
researchProduct

How to Improve the Reliability of Chord?

2008

In this paper we focus on Chord P2P protocol and we study the process of unexpected departures of nodes from this system. Each of such departures may effect in losing any information and in classical versions of this protocol the probability of losing some information is proportional to the quantity of information put into this system. This effect can be partially solved by gathering in the protocol multiple copies (replicas) of information. The replication mechanism was proposed by many authors. We present a detailed analysis of one variant of blind replication and show that this solution only partially solves the problem. Next we propose two less obvious modifications of the Chord protoco…

symbols.namesakeTheoretical computer scienceSource codemedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSHash functionsymbolsPareto distributionChord (peer-to-peer)Algorithmmedia_commonMathematics
researchProduct

Violent Conflicts and the New Mediatization: The Impact of Social Media on the European Parliamentary Agenda Regarding the Syrian War

2018

As key institutions in Western democracies, parliaments have gained importance regarding foreign affairs issues in recent years. Their increasing role as moral tribunes and discussion forums on conflict prevention and resolution have led to the parliamentarization of international affairs. The examination of the parliamentary agenda and the actors who shape it constitutes a fundamental part of agenda-setting studies as applied to the media and political systems. Among these actors, mass media must be highlighted, taking into account the complex process of information gathering for members of Parliament, particularly in cases related to international violent conflicts. Moreover, in the speci…

syriasocial networksparliamentParliamentparliamentary agendaCommunicationmedia_common.quotation_subjectsocial mediaconflictlcsh:P87-96lcsh:Communication. Mass medialcsh:AdvertisingPolitical sciencePolitical economySocial medialcsh:HF5801-6182media_commonmediatization
researchProduct

Voice traffic bicasting enhancements in mobile HSPA network

2014

This paper discusses methods for improving the effectiveness of delivering voice traffic over High-Speed Downlink Packet Access (HSDPA) network by employing transmission diversity with Single-Frequency Dual-Cell (SF-DC) Aggregation that is part of the Multiflow specification. SF-DC Aggregation allows the user to be served at the same time by two different cells. The enhancements discussed in the paper capitalize strongly on the availability of the composed Channel Quality Indication (CQI) feedback at both serving cells. According to the results obtained from the network simulations, the ability to select the better channel for each voice transmission significantly decreases the required tra…

ta113Access networkta213Computer sciencebusiness.industryNetwork packetCSoHSbicastingThroughputTransmission (telecommunications)HandovermultiflowTelecommunications linkHSPAVoHSSF-DC aggregationbusinessComputer networkPower controlCommunication channel
researchProduct

Acoustic detection and classification of river boats

2011

We present a robust algorithm to detect the arrival of a boat of a certain type when other background noises are present. It is done via the analysis of its acoustic signature against an existing database of recorded and processed acoustic signals. We characterize the signals by the distribution of their energies among blocks of wavelet packet coefficients. To derive the acoustic signature of the boat of interest, we use the Best Discriminant Basis method. The decision is made by combining the answers from the Linear Discriminant Analysis (LDA) classifier and from the Classification and Regression Trees (CART) that is also accompanied with an additional unit, called Aisles, that reduces fal…

ta113Acoustics and UltrasonicsNetwork packetbusiness.industryPattern recognitionLinear discriminant analysisRegressionWaveletDiscriminantAcoustic signatureProcess controlArtificial intelligencebusinessClassifier (UML)MathematicsApplied Acoustics
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Teaching Knowledge Management by Combining Wikis and Screen Capture Videos

2011

PurposeThis paper aims to report on the design and creation of a knowledge management course aimed at facilitating student creation and use of social interactive learning tools for enhanced learning.Design/methodology/approachThe era of social media and web 2.0 has enabled a bottom‐up collaborative approach and new ways to publish work on the web, promoted by tools such as YouTube video service. In this spirit a knowledge management course was designed aiming to facilitate university students to compose videos on different difficult concepts in the theory part of the course by searching for explanations on the web and by creating a Windows Media Player video focusing on the self‐defined pro…

ta113Collaborative writingKnowledge managementMultimediaComputer Networks and Communicationsbusiness.industryComputer scienceWindows MediaLibrary and Information Sciencescomputer.software_genreInteractive LearningWorld Wide WebProblem-based learningConstructivism (philosophy of education)The InternetSocial mediabusinessSocial constructivismcomputer
researchProduct

Introduction of Multiflow for HSDPA

2012

This paper introduces a multi-cell transmission scheme for High-Speed Downlink Packet Access (HSDPA) networks, called Multiflow. In this concept, downlink data is transmitted to a user terminal at the border of two cells from one or both of the cells. The cells may belong to same NodeB or to two different NodeBs. The data flows are separated by different scrambling codes used by each associated cell, thus the flows can be treated independently. This provides increased multi-user diversity by means of flexibility in downlink resource management, in addition to the spatial diversity of multiple transmission locations. Another important gain mechanism for this scheme is realized by short-term …

ta113Computer scienceNetwork packetbusiness.industryHSDPALoad balancing (computing)Antenna diversityMonipistelähetysScramblingHandoverTelecommunications linkNetwork performanceNodeBbusinessMultipoint transmissionComputer network2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct