The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computational Grids are high performance computing systems used to solve large scale computational demands. Because scheduling workflow applications in a distributed environment is a NP-Complete problem, meta-heuristics are introduced to solve this issue. In this paper, we propose an Energy-Aware algorithm based on Discrete Particle Swarm Optimization (DPSO) called EA-DPSO. Our aim is to minimize...
In this paper, we present preliminary results from a performance comparison between the two multicast routing protocols ODMRP and SMF. While SMF uses a proactive selection of forwarding nodes, ODMRP is a reactive approach to multicast routing. For the evaluation, we use an two-step approach. First, we perform emulation-based measurements in a virtualized test bed utilizing the ns-3 IEEE 802.11 model...
This paper describes the standard or test bed-agnostic interfaces offered by Community-Lab an exemplifies its use in a reference experiment, the Island Connectivity Experiment. The experiment provides a web application that shows a matrix of network measurements across a slice of test bed nodes from different community networks in the test bed. The experiment uses test bed-agnostic and interoperable...
This article proposes a new approach for secure communications Device-to-Device (D2D) if unable to apply network coding transmissions within LTE small cells. Our new algorithm called Secure Load Balancing Selective Ad hoc On-demand Multipath Distance Vector (LBS-AOMDV) is based on a multipath coded information transmissions, Data Splitting and Data Shuffling schemes. The objective of this study is...
The Future Internet and the Internet of Things (IoT) and clouds as its integral parts need a specialized theory for their information protection from different threats and intruders. The history and main results of research aimed at creating a scientific and methodological foundation of the Information Security Theory in Russia are examined. The discussion considers the formulation of the informal...
The analysts need timely and accurate information to conduct proactive action over complex situations. Typically, there are thousands of reported activities in real time operation, although, to direct the analysts attentions to the most important one, researchers have designed multiple levels of situational awareness (SWA). Each process lends itself to ranking the most important activities into a...
The rapid growth and the distributed sites of the datacenters increase the complexity of control and management processes. A new paradigm which is called Software Defined Systems (SDSys) comes as a solution to reduce the overhead of datacenters management by abstracting all the control functionalities from the hardware devices and setting it inside a software layer. These functionalities are responsible...
Several information technology enterprises have decided to migrate into cloud for their computing and storage requirements in order to get reliable software and high performance hardware resources in a cost-effective manner. A single cloud service cannot ful fill the functional requirements in several real-world situations. Then, the concept of composite cloud service is introduced to bundle single...
Process mining is a modern family of techniques applied to datasets generated from business processes run in organizations, in order to improve and obtain useful insights and performance measurements on the processes themselves (with clear societal and economical benefits). While these techniques are very promising in understanding business processes, their complete and efficient implementation inside...
The predicted prevalence of both Internet of Things (IoT) based devices and the concept of Software Defined Networking (SDN) as a new paradigm in networking, means that consideration is required for how they will interact. Current SDN implementations operate on the principle that on receiving an unrecognised packet, a switch will query a centralised controller for a corresponding rule. Memory limitations...
Heterogeneous networks principally composed of macro-cells overlaid with small cells (e.g., Femtocells, pico-cells, and relays) can potentially improve the coverage and capacity of existing cellular networks and satisfy the growing demands of data throughput. In Het Nets, small cells play a key role in offloading user data traffic from congested macro-cells and extending the limited coverage of macro-cells...
Context aware mobile applications are special types of context aware network systems that process gathered data from environment with context cycle functionalities and special infrastructure to obtain context information. Here, modelling and reasoning are most important functionalities and middleware is one of the common infrastructure to implement these functionalities. Essentially, techniques that...
With the advent of the Internet of Things (IoT) a myriad of new devices will become part of our everyday life. Constrained Application Protocol (CoAP), and its extensions, are specifically designed to address the integration of these constrained devices. However, due to their limited resources, they are often unable to be fully connected and instead form intermittently connected and sparse networks...
Today, telecommunication and computing technology offer various novel applications for users with utilizing many technologies that cooperate with each other to ensure the required bandwidth. Internet Protocol Television (IPTV), Video on demand (VOD) and pay per view (PPV) applications use multicasting with wavelength division multiplexing (WDM). Thus, we worked on providing multicast over Optical...
In recent years the technological world has grown by incorporating billions of small sensing devices, collecting and sharing real-world information. As the number of such devices grows, it becomes increasingly difficult to manage all these new information sources. There is no uniform way to share, process and understand context information. In previous publications we discussed efficient ways to organize...
Integration of large heterogeneous data collections, gathered usually for making decisions on information security (IS) management issues, requires a preliminary step -- unification of their data models. It is provided by mapping the source data models into the canonical information model. Information and semantics of data definition languages (DDL) and semantics of the operations of data manipulation...
This paper describes an approach to infer the location of a social media post at a hyper-local scale based on its content, conditional to the knowledge that the post originates from a larger area such as a city or even a state. The approach comprises three components: (i) a discriminative classifier, namely, Logistic Regression (LR) which selects from a set of most probable sub-regions from where...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.