Search results for "Protocol"

showing 10 items of 1808 documents

Multipath extensions to the DYMO routing protocol

2007

Multipath routing is a technique that can improve performance, specially in mobile ad hoc networks. Due to traffic dispersion it can perform load balancing; minimize the energy consumed by nodes or prevent traffic analysis. In this work we focus on enhancing the DYMO protocol to support multipath routing. We study the impact of traffic dispersion on both UDP and TCP traffic when varying a set of parameters.

Zone Routing ProtocolDynamic Source Routingbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer network2007 9th IFIP International Conference on Mobile Wireless Communications Networks
researchProduct

Simulation-based Evaluation of DMAMAC - A Dual-Mode Adaptive MAC Protocol for Process Control

2015

Control systems automation is widely used in many industrial domains and have strong requirements on delay, throughput, robustness, and reliability. In the domain of networked control systems, the medium of communication is increasingly involving wireless communication along-side conventional wired communication. Issues ranging from energy efficiency and reliability to low-bandwidth have to be addressed to enable the transition to increased use of wireless communication. In earlier work, we have proposed the Dual-Mode Adaptive MAC (DMAMAC) protocol relying on a combination of Time Division Multiple Access (TDMA) and Carrier Sense Multiple Access (CSMA). The DMAMAC protocol is able to dynami…

Zone Routing ProtocolTransient statebusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessEnergy consumptionWirelessSuperframeWired communicationbusinessEfficient energy useComputer networkProceedings of the Eighth EAI International Conference on Simulation Tools and Techniques
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Toward Approximate GML Retrieval Based on Structural and Semantic Characteristics

2010

International audience; GML is emerging as the new standard for representing geographic information in GISs on the Web, allowing the encoding of structurally and semantically rich geographic data in self describing XML-based geographic entities. In this study, we address the problem of approximate querying and ranked results for GML data and provide a method for GML query evaluation. Our method consists of two main contributions. First, we propose a tree model for representing GML queries and data collections. Then, we introduce a GML retrieval method based on the concept of tree edit distance as an efficient means for comparing semi-structured data. Our approach allows the evaluation of bo…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR]Tree edit distanceSimilarity (geometry)[INFO.INFO-WB] Computer Science [cs]/WebComputer sciencecomputer.internet_protocol[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genre[SCCO.COMP] Cognitive science/Computer science020204 information systemsEncoding (memory)0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB][ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM]Information retrieval[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]GML SearchStructural & Semantic Similarity[INFO.INFO-WB]Computer Science [cs]/WebProcess (computing)[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]GISConstraint (information theory)[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Ranked retrieval020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerXMLDecision tree model
researchProduct

Semantic-based Merging of RSS Items

2009

Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreClusteringMergingSet (abstract data type)[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Cluster analysisComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Measure (data warehouse)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Document relatedne[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_formatRSSMerging operator[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Key (cryptography)020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerSoftwareXML
researchProduct

Semantic aware RSS query algebra

2010

International audience; Existing XML query algebras are not fully appropriate to retrieve RSS news items mainly due to three reasons: 1) RSS is text rich and its content is dependent on the wording and verbification of the author, thus semantic aware operators are needed; 2) news items are dynamic and consequently time oriented retrieval is needed; 3) a news item may evolve through time, or overlap with other news items and hence identifying relationships between items is also needed. In this paper, we aim to solve these issues by providing a dedicated RSS algebra based on semantic-aware operators that consider RSS characteristics. The provided operators are application domain specific and …

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/Webcomputer.internet_protocolComputer scienceRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologyQuery optimizationQuery algebraQuery expansion[SCCO.COMP] Cognitive science/Computer scienceApplication domain020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Equivalence (formal languages)[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM]Semantic queryInformation retrieval[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB][INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_format[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer science020201 artificial intelligence & image processing[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerXML
researchProduct

Query-preserving watermarking of relational databases and XML documents

2011

Watermarking allows robust and unobtrusive insertion of information in a digital document. During the last few years, techniques have been proposed for watermarking relational databases or Xml documents, where information insertion must preserve a specific measure on data (for example the mean and variance of numerical attributes). In this article we investigate the problem of watermarking databases or Xml while preserving a set of parametric queries in a specified language, up to an acceptable distortion. We first show that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guarante…

[INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Theoretical computer scienceInformation retrievalcomputer.internet_protocolRelational databaseComputer science0102 computer and information sciences02 engineering and technologyQuery language01 natural sciencesVC dimension[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Computational learning theory010201 computation theory & mathematicsBounded function0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Graph (abstract data type)020201 artificial intelligence & image processingcomputerDigital watermarkingComputingMilieux_MISCELLANEOUSXMLInformation SystemsParametric statisticsProceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
researchProduct

SECURE SOLUTION FOR MODERN SEMANTIC SCADA

2013

International audience; NOUS TRAVAILLONS SUR LA SECURITE DES SYSTEMES SCADA (SUPERVI-SORY CONTROL AND DATA AQUISITION) MODERNE EXPLOITANT DES EQUI-PEMENTS MODRNE AVEC DE L’INTELLIGENCE EMBARQUE COMME LES RTU (REMOTE TERMINAL UNIT), LES CAPTEURSINTELLIGENTS, LES ACTIONNEURS INTELLIGENTS, LES EQUIPEMENTS DE L’INSTRUMENTATION GAZIERE MODERNE COMME LES COMPTEURS NUME-RIQUE, LES CORECTEURS ELECTONIQUE, LES POMPES DOSEUSES AVEC CARTE ELECTRONIQUE, LES CHROMATOGRAPHES...ECT. AVEC LES AVANCES TECHNLOGIQUES DE L’INFORMATIQUE EMBARQUE COMME LES SERVICES WEB ET LES APPLICATION CONCU SELON LES ARCHITECTURES MODERNE (SOA- SERVICE ORIENTED ARCHITECTURE), LES ONTOLOGIES ET LE WEB SEMANTIQUE, LES BASES DE …

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI](IT-SCADA) PLATFORMSCADASECURITY PROTOCOL
researchProduct

IP-Based Mobility Management and Handover Latency Measurement in heterogeneous environments

2017

International audience; One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at IP level in order to enhance mobile IPv4 and mobile IPv6 with different variants: HMIPv6 (Hierarchical Mobile IPv6), FMIPv6 (Fast Mobile IPv6) and PMIPv6 (Proxy Mobile IPv6) for seamless handover. Moreover, the IEEE 802.21 standard provides another framework for seamless handover. The 3GPP standard provides the Access Netw…

[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]mobility management protocolshandover latency[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSeamless vertical handover[INFO]Computer Science [cs][INFO] Computer Science [cs]IEEE 802.21 MIH
researchProduct

XA2C Framework for XML Alteration/Adaptation

2010

XML has crossed the borders of software engineering and has spread to other areas such as e-commerce, identification, information storage, instant messaging and others. It is used to communicate crucial data over these domains. Thus, allowing non-expert programmers to manipulate and control their XML data is essential. In the literature, this issue has been dealt with from 3 perspectives: (i) XML alteration/adaptation techniques requiring a certain level of expertise to be implemented and are not unified yet, (ii) mashups, which are not formally defined yet and are not specific to XML data, and (iii) XML-oriented visual languages based on structural transformations and data extraction mainl…

[INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]DatabaseProgramming languagecomputer.internet_protocolComputer science02 engineering and technologycomputer.software_genre[INFO.INFO-PL] Computer Science [cs]/Programming Languages [cs.PL]Set (abstract data type)Identification (information)Visual languageData extraction020204 information systems[ INFO.INFO-PL ] Computer Science [cs]/Programming Languages [cs.PL]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMashupControl (linguistics)Adaptation (computer science)computerXMLComputingMilieux_MISCELLANEOUS
researchProduct