Search results for "Telecomunicazioni"

showing 10 items of 246 documents

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Enhancing tracking performance in a smartphone-based navigation system for visually impaired people

2016

In this paper we show how to enhance the tracking performance of Arianna, a low-cost augmented reality system designed to meet the needs of people with problems of orientation, people with sight impairment and blind people. For augmented reality system we mean the design of: i) a set of paths and tags to be deployed in the environment, realized in various ways depending on the context (decorative elements easily identifiable, colorful stripes, QR code, RFID, etc.); ii) an instrument of mediation between the reality and the user (typically a smartphone) to access the information disseminated in the environment by means of a camera and provide a vibration feedback signal to the users for foll…

0209 industrial biotechnologyEngineeringControl and OptimizationOptical flowContext (language use)02 engineering and technologycyber-physical systemscyber-physical systemoptical flow020901 industrial engineering & automationassistive technology0202 electrical engineering electronic engineering information engineeringComputer visionSet (psychology)Settore ING-INF/03 - Telecomunicazionibusiness.industryOrientation (computer vision)Cyber-physical systemNavigation systemfilteringSightassistive technology; cyber-physical systems; filtering; navigation system; optical flow; vibration; Control and Systems Engineering; Control and Optimization; Modeling and SimulationAssistive technologyControl and Systems EngineeringModeling and Simulationnavigation system020201 artificial intelligence & image processingAugmented realityArtificial intelligencevibrationbusiness2016 24th Mediterranean Conference on Control and Automation (MED)
researchProduct

Location-Aware MAC Scheduling in Industrial-Like Environment

2018

We consider an environment strongly affected by the presence of metallic objects, that can be considered representative of an indoor industrial environment with metal obstacles. This scenario is a very harsh environment where radio communication has notorious difficulties, as metallic objects create a strong blockage component and surfaces are highly reflective. In this environment, we investigate how to dynamically allocate MAC resources in time to static and mobile users based on context awareness extracted from a legacy WiFi positioning system. In order to address this problem, we integrate our WiFi ranging and positioning system in the WiSHFUL architecture and then define a hypothesis t…

0209 industrial biotechnologyPositioning systemSettore ING-INF/03 - TelecomunicazioniComputer scienceDistributed computingContext awareness020206 networking & telecommunicationsContext (language use)Ranging02 engineering and technologyNon-line-of-sight propagation020901 industrial engineering & automationIndoor localization systemComponent (UML)MAC scheduler0202 electrical engineering electronic engineering information engineeringContext awarenessArchitectureStatistical hypothesis testing
researchProduct

Modeling Energy Demand Aggregators for Residential Consumers

2013

International audience; Energy demand aggregators are new actors in the energy scenario: they gather a group of energy consumers and implement a demand- response paradigm. When the energy provider needs to reduce the current energy demand on the grid, it can pay the energy demand aggregator to reduce the load by turning off some of its consumers loads or postponing their activation. Currently this operation involves only greedy energy consumers like industrial plants. In this paper we want to study the potential of aggregating a large number of small energy consumers like home users as it may happen in smart grids. In particular we want to address the feasibility of such approach by conside…

0209 industrial biotechnologydemand-response paradigm020209 energyEnergy current02 engineering and technologycomputer.software_genre7. Clean energyNews aggregatorload regulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]020901 industrial engineering & automationdemand side management; load regulation; queueing theory; smart power grids; demand-response paradigm; energy consumers; energy demand aggregator modeling; greedy energy consumers; home users; industrial plants; power load control; queuing theory; residential consumers; smart grids; Delays; Home appliances; Load modeling; Power demand; Sociology; Statistics; Switchesresidential consumerSociologySettore ING-INF/04 - Automatica0202 electrical engineering electronic engineering information engineeringindustrial plantenergy demand aggregator modelingDemand loadSimulationStatisticQueueing theoryDelayLoad modelingdemand side managementSettore ING-INF/03 - Telecomunicazionigreedy energy consumerpower load controlLoad balancing (electrical power)Poisson processEnvironmental economicsGridenergy consumerHome applianceSettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridQueueing theorymart gridLoad regulationqueuing theoryPower demandEnergy demand aggregatorsmart power gridcomputerSwitcheshome user
researchProduct

Self-validating bundles for flexible data access control

2016

Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…

021110 strategic defence & security studiesbundle information-centric security access policy bytecodeComputer sciencebusiness.industrySettore ING-INF/03 - Telecomunicazioni0211 other engineering and technologies020207 software engineeringAccess controlCloud computing02 engineering and technologyClient-sideComputer securitycomputer.software_genreMetadataData access0202 electrical engineering electronic engineering information engineeringData Protection Act 1998businesscomputerAccess structure
researchProduct

A Clustering approach for profiling LoRaWAN IoT devices

2019

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

050101 languages & linguisticsIoTComputer scienceIoT; LoRa; LoRaWAN; machine learning; k-means; anomaly detection; cluster analysisk-means02 engineering and technologyLoRaSilhouette0202 electrical engineering electronic engineering information engineeringProfiling (information science)Wireless0501 psychology and cognitive sciencesCluster analysisbusiness.industryNetwork packetSettore ING-INF/03 - Telecomunicazioni05 social sciencesk-means clusteringanomaly detectionLoRaWANmachine learning020201 artificial intelligence & image processingAnomaly detectionInternet of ThingsbusinessComputer networkcluster analysis
researchProduct

A flexible and reconfigurable 5G networking architecture based on context and content information

2017

The need for massive content delivery is a consolidated trend in mobile communications, and will even increase for next years. Moreover, while 4G maturity and evolution is driven by video contents, next generation (5G) networks will be dominated by heterogeneous data and additional massive diffusion of Internet of Things (IoT). The current network architecture is not sufficient to cope with such traffic, which is heterogeneous in terms of latency and QoS requirements, and variable in space and time. This paper proposes architectural advances to endow the network with the necessary flexibility helping to adapt to these varying traffic needs by providing content and communication services whe…

5G networkingComputer scienceflexible HW/SW platforms 5G networking context-awareness content-centric networks reconfigurability050801 communication & media studies02 engineering and technologyflexible HW/SW platforms 5G networking context-awareness; content-centric networks; reconfigurability.0508 media and communications0202 electrical engineering electronic engineering information engineeringReference architectureArchitectureNetwork architecturebusiness.industrySettore ING-INF/03 - TelecomunicazioniQuality of service05 social sciencesflexible HW/SW platformscontent-centric networkscontext-awarenessReconfigurability020206 networking & telecommunicationsApplications architectureMobile telephonybusinessreconfigurability5GComputer network
researchProduct

A Metaheuristic Bandwidth Allocation Scheme for FiWi Networks Using Ant Colony Optimization

2015

Optical-wireless access networks constitute a quite attractive solution to meet the ever-increasing bandwidth requirements of end-users, offering significant benefits such as ubiquitous coverage in the wireless domain and huge bandwidth in the optical domain. However, converging optical and wireless networking technologies, with Passive Optical Networks (PONs) and 4G wireless standards, such as the Worldwide Interoperability for Microwave Access (WiMAX) and the Long Term Evolution (LTE), entails major challenges that need to be addressed. In this context, designing an efficient and fair bandwidth distribution with Quality of Service (QoS) support is a difficult task due to the interdependen…

Access networkDynamic bandwidth allocationWireless networkbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWiMAXPassive optical networkBandwidth allocationComputer Networks and CommunicationAutomotive EngineeringBandwidth (computing)Radio resource managementbusinessComputer network
researchProduct

Utility-based resource allocations in multi-hop wireless networks

2011

It is well known that CSMA (Carrier Sense Multiple Access) protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. Since ad-hoc networks based on multihop packet deliveries are becoming more and more common in different application and networking scenarios, different medium access control extensions are currently considered for improving the channel utilization efficiency. In this paper, we propose a simple approach based on preallocating temporal slots in which different sets of nodes are allowed to contend for the channel access, which can significantly improve CSMA performance with limited signaling …

Ad-hoc Networks; Distributed Resource Allocation; Game theory; Sensor NetworksSettore ING-INF/04 - Automatica[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Ad-hoc Networksad hoc wireless networks allocations networksSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYSensor NetworksDistributed Resource AllocationGame theory
researchProduct

Error-Based Interference Detection in WiFi Networks

2017

In this paper we show that inter-technology interference can be recognized by commodity WiFi devices by monitoring the statistics of receiver errors. Indeed, while for WiFi standard frames the error probability varies during the frame reception in different frame fields (PHY, MAC headers, payloads) protected with heterogeneous coding, errors may appear randomly at any point during the time the demodulator is trying to receive an exogenous interfering signal. We thus detect and identify cross-technology interference on off-the-shelf WiFi cards by monitoring the sequence of receiver errors (bad PLCP, bad PCS, invalid headers, etc.) and develop an Artificial Neural Network (ANN) to recognize t…

Artificial Neural NetworkNeuronsMonitoringComputer scienceSettore ING-INF/03 - Telecomunicazioni05 social sciencesReal-time computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS050801 communication & media studies020206 networking & telecommunicationsWireless LAN02 engineering and technologySpectrum managementReceiversZigBee0508 media and communicationsComputer Networks and CommunicationPHYHardware and Architecture0202 electrical engineering electronic engineering information engineeringLong Term EvolutionDemodulationWireless fidelitySafety Risk Reliability and QualityInterference
researchProduct