Search results for "Ubiquitous Computing"

showing 10 items of 108 documents

A hybrid network for maritime on-board communications

2012

Current maritime on-board communications have to be enhanced for safety and security, where ubiquitous technologies can help, together with providing comfort and convenience to the crew and passengers. Employing wireless sensor networks on board is one recent practice of implementing ubiquitous technology for ships, where further study is needed because of the connectivity challenges. Meanwhile, it is important for an on-board communication system to be reliable and flexible for handling emergency situations. In this paper, we propose a solution of employing ubiquitous technology on ships in a way that both connectivity and emergency handling are examined. Two key aspects of this proposal a…

Key distribution in wireless sensor networksUbiquitous computingbusiness.industryComputer scienceHybrid systemThe InternetWired communicationCommunications systembusinessWireless sensor networkBackward compatibilityComputer network2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

Towards a Formal Analysis of MQtt Protocol in the Context of Communicating Vehicles

2017

International audience; The paper presents a formal approach to model, analyze, and verify a variant of Message Queue Telemetry Transport protocol (MQtt), dedicated to communicating vehicles (MQtt-CV) that send collected data to automotive infrastructures(subscribers). Our formal approach is based on Promela language and its system verification tool, the model checker SPIN. We propose a slight modification of MQtt protocol to reduce the big volume of data collected and sent by vehicles to infrastructures. Indeed, in the original version of MQtt protocol, when a broker receives data from publishers, it sends them directly to its subscribers without any filtration. As consequence, subscribers…

Model checkingComputer scienceDistributed computingAutomotive industryContext (language use)02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)computer.programming_languageMQTTbusiness.industryVolume (computing)020206 networking & telecommunications020207 software engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationPromela[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessMessage queuecomputerComputer network
researchProduct

Parallel filter estimation algorithm for segmentation on a LAN of workstations

1994

International audience

Paralle computing[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[ INFO.INFO-IU ] Computer Science [cs]/Ubiquitous ComputingImages[INFO.INFO-IU] Computer Science [cs]/Ubiquitous ComputingComputingMilieux_MISCELLANEOUS
researchProduct

An Embedded Biometric Sensor for Ubiquitous Authentication

2013

Communication networks and distributed technologies move people towards the era of ubiquitous computing. An ubiquitous environment needs many authentication sensors for users recognition, in order to provide a secure infrastructure for both user access to resources and services and information management. Today the security requirements must ensure secure and trusted user information to protect sensitive data resource access and they could be used for user traceability inside the platform. Conventional authentication systems, based on username and password, are in crisis since they are not able to guarantee a suitable security level for several applications. Biometric authentication systems…

PasswordInformation managementUser informationSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEngineeringUbiquitous computingBiometricsTraceabilitybusiness.industry FPGA rapid prototypingBiometric identity managementFingerprintSelf-contained sensorUbiquitous authenticationIdentity managementEmbedded systembusinessEmbedded system
researchProduct

Child–display interaction:Lessons learned on touchless avatar-based large display interfaces

2020

AbstractDuring the last decade, touchless gestural interfaces have been widely studied as one of the most promising interaction paradigms in the context of pervasive displays. In particular, avatars and silhouettes have proved to be effective in making the touchless capacity of displays self-evident. In this paper, we focus on a child–display interaction approach to avatar-based touchless gestural interfaces. We believe that large displays offer an opportunity to stimulate children’s experiences and engagement; for instance, learning about art is very engaging for children but can bring a number of challenges. Our study aims to contribute to the literature on both pervasive displays and chi…

Pervasive displayAvatarsUbiquitous computingUbiquitous computingComputer scienceInterface (computing)Mobile computingContext (language use)02 engineering and technologyManagement Science and Operations ResearchLibrary and Information SciencesChild–computer interaction; Gesture-based interfaces; Avatars; Pervasive displays; Ubiquitous computingPervasive displaysHuman–computer interaction0202 electrical engineering electronic engineering information engineeringGesture-based interface0501 psychology and cognitive sciencesAffordance050107 human factorsAvatarSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniFocus (computing)RecallChild–computer interaction05 social sciencesComputingMilieux_PERSONALCOMPUTING020207 software engineeringAvatarComputer Science ApplicationsGesture-based interfacesHardware and Architecture
researchProduct

On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators

2018

International audience; There is not a proper mathematical definition of chaos, we have instead a quite big amount of definitions, each of one describes chaos in a more or less general context. Taking in account this, it is clear why it is hard to design an algorithm that produce random numbers, a kind of algorithm that could have plenty of concrete appliceautifat (anul)d bions. However we must use a finite state machine (e.g. a laptop) to produce such a sequence of random numbers, thus it is convenient, for obvious reasons, to redefine those aimed sequences as pseudorandom; also problems arise with floating point arithmetic if one wants to recover some real chaotic property (i.e. propertie…

Pseudorandom number generator020203 distributed computingSequenceFinite-state machineDynamical systems theoryComputer science010102 general mathematicsChaotic[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]0101 mathematicsBoolean functionAlgorithmRandomnessGenerator (mathematics)2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

Energy-Efficiency and Coverage Quality Management for Reliable Diagnostics in Wireless Sensor Networks

2020

International audience; The processing of data and signals provided by sensors aims at extracting rnrelevant features which can be used to assess and diagnose the health state rnof the monitored targets. Nevertheless, Wireless Sensor Networks (WSNs) present rna number of shortcomings that have an impact on the quality of the gathered rndata at the sink level, leading to imprecise diagnostics rnof the observed targets. To improve data accuracy, two main critical and related issues, namely the energy consumption and coverage quality, need to be considered. The goal is to maximize the network lifetime while guaranteeing the complete coverage of all the targets. Unfortunately, these performance…

Quality managementComputer scienceComputer Networks and CommunicationsReal-time computingCorrectness proofs020206 networking & telecommunicationsEnergy consumption02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science Applications[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Distributed algorithmControl and Systems Engineering[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Data accuracy0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Wireless sensor networkEfficient energy use
researchProduct

Human body sensing: A pervasive approach by implanted RFID tags

2011

Starting from the physical evidence that passive RFID systems may be used as self-sensing devices, the feasibility of human monitoring by means of implanted tags is here investigated. The key parameters to master with the purpose to enhance the sensitivity of the implanted radiosensor have been theoretically analyzed and numerically applied to a specific medical problem, i.e. the continuous monitoring of liver cancer evolution. Preliminary experimental results with simplified phantoms corroborate the analysis.

RFIDImplanted tagUbiquitous computingComputer sciencebusiness.industryWearable tagRFID sensor Wearable tag Implanted tagReal-time computingContinuous monitoringSettore ING-INF/02 - Campi ElettromagneticisensorHuman monitoringKey (cryptography)RFID sensorSensitivity (control systems)Telecommunicationsbusiness2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010)
researchProduct

Evaluating Bluetooth Performance as the Support for Context-Aware Applications

2005

We present an experiment relative to the use of the Bluetooth wireless technology to provide network support for context-aware applications. We describe an approach to provide network interconnection using a combination of wireless and wired network technologies. We also describe the steps taken to create a Bluetooth based context-aware application. We, finally, evaluate, using a small test-bed and simulation the overall performance of this technology when adopted in the area of context-aware and ubiquitous computing.

ScatternetInterconnectionUbiquitous computingWireless networkComputer sciencebusiness.industryWireless WANContext (language use)Mobile ad hoc networklaw.inventionBluetoothlawWirelessWi-FiOverall performanceElectrical and Electronic EngineeringPersonal area networkbusinessComputer communication networksHeterogeneous networkComputer networkTelecommunication Systems
researchProduct

Checkpointing Workflows for Fail-Stop Errors

2017

International audience; We consider the problem of orchestrating the exe- cution of workflow applications structured as Directed Acyclic Graphs (DAGs) on parallel computing platforms that are subject to fail-stop failures. The objective is to minimize expected overall execution time, or makespan. A solution to this problem consists of a schedule of the workflow tasks on the available processors and of a decision of which application data to checkpoint to stable storage, so as to mitigate the impact of processor failures. For general DAGs this problem is hopelessly intractable. In fact, given a solution, computing its expected makespan is still a difficult problem. To address this challenge,…

ScheduleComputer scienceworkflowDistributed computing[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]010103 numerical & computational mathematics02 engineering and technologyParallel computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]01 natural sciencesTheoretical Computer Science[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]checkpointfail-stop error0202 electrical engineering electronic engineering information engineeringOverhead (computing)[INFO]Computer Science [cs]0101 mathematicsresilienceClass (computer programming)020203 distributed computingJob shop schedulingProbabilistic logic020206 networking & telecommunications[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationDynamic programmingTask (computing)[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF]WorkflowComputational Theory and MathematicsHardware and Architecture[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Task analysis[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Software
researchProduct