Search results for "Tribute"
showing 10 items of 1455 documents
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs
2010
Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…
Enhanced islanding detection in smart interface protection systems of distributed generation
2021
The widespread presence of distributed generators (DGs) and storage systems (DSSs) in electricity grids has increased the risk of islanding occurrence. This phenomenon must be suitably managed by Distribution System Operators (DSO), in order to avoid adverse situations, in terms of grid-protection problems, equipment damage, safety hazards, power quality problems and so on. Currently anti-islanding protection functions are handled by interface protection systems (IPSs), which are built in accordance with relevant standards for DGs and DSSs connection to power systems. However, some problems may occur in case of operation within the so-called non detection zone (NDZ). This paper presents an …
UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments
2010
A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…
Multilevel system optimisation via nonlinearity management
2006
Nonlinearity management is explored as a multilevel tool to obtain maximum transmission reach in a WDM system. A technique for the fast calculation of the optimal dispersion pre-compensation in systems with distributed amplification is proposed.
P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research
2006
Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…
Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers
2016
Service level agreements (SLAs) gain more and more importance in the area of cloud computing. An SLA is a contract between a customer and a cloud service provider (CSP) in which the CSP guarantees functional and non-functional quality of service parameters for cloud services. Since CSPs have to pay for the hardware used as well as penalties for violating SLAs, they are eager to fulfill these agreements while at the same time optimizing the utilization of their resources.In this paper we examine SLA-aware VM scheduling strategies for cloud data centers. The service level objectives considered are resource usage and availability. The sample resources are CPU and RAM. They can be overprovision…
A new autonomous data transmission reduction method for wireless sensors networks
2018
International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…
Predictive models for energy saving in Wireless Sensor Networks
2011
ICT devices nowadays cannot disregard optimizations toward energy sustainability. Wireless Sensor Networks, in particular, are a representative class of a technology where special care must be given to energy saving, due to the typical scarcity and non-renewability of their energy sources, in order to enhance network lifetime. In our work we propose a novel approach that aims to adaptively control the sampling rate of wireless sensor nodes using prediction models, so that environmental phenomena can be consistently modeled while reducing the required amount of transmissions; the approach is tested on data available from a public dataset.
A Formal Semantics and a Client Synthesis for a BPEL Service
2008
A complex Web service described with languages like BPEL4WS, consists of an executable process and its observable behaviour (called an abstract process) based on the messages exchanged with the client. The abstract process behaviour is non deterministic due to the internal choices during the service execution. Furthermore the specification often includes timing constraints which must be taken into account by the client. Thus given a service specification, we identify the synthesis of a client as a key issue for the development of Web services. To this end, we propose an approach based on (dense) timed automata to first describe the observable service behaviour and then to build correct inte…
Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks
2018
International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …