The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile CrowdSensing (MCS) is defined as a pervasive sensing paradigm where mobile devices gather data with the aim of performing a specific application. The major issues in MCS are the following: mobile devices are characterized by limited resources; scalability issues appear when the number of objects that could be potentially involved in the sensing increases together with the application requests;...
In this paper, we present an approach for automated profiling of cloud-based distributed applications. The failure dependencies within or between application nodes can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation in a node acts as a stimulus which propagates to performance meters of dependent nodes...
Human-to-human communication is extremely important in everyday life. Video teleconferencing brings humans closer together over vast distances, but is still not as engaging as face-to-face communication. At the same time, basic virtual reality technology has finally achieved commodity status. In this paper, we present the concept of the “communication portal,” a more immersive communication channel...
Web identity schemes suffer from weak authentication and low trust, while company-granted identities are trusted but inflexible. Users either have trusted identities which they cannot control, or they control identities which are entirely untrusted. To resolve this dichotomy, the Independently Verifiable Identity Scheme (IVIS) is proposed, which draws trust for verification of user-provided personal...
This paper introduces a context-aware IoT (Internet of Things) model featuring context collector, context controller and cognitive engine components. This model supplies internet connectivity to previously published research, forming a complete, distributed, system solution for dynamic adaptability of embedded systems software for resource constrained hardware. We present the updated system model...
As mobile data usage increases dramatically, new architectures and technologies for wireless communication are required. Next generation of mobile networks are expected to be augmented by a massive amount of small cells that will be densely deployed. In order to connect the small cells, new high capacity wireless backhauling technologies are required. A promising solution is to use frequencies in...
With the evolution of Telco systems towards 5G, new requirements emerge for delivering services. Network services are expected to be designed to allow greater flexibility. In order to cope with the new users' requirements, Telcos should rethink their complex and monolithic network architectures into more agile architectures. Adoption of NFV as well as micro-services patterns are opportunities promising...
Proliferation of the number of smart devices and user applications has generated a tremendous volume of data traffic from/to a cellular network. With a traditional cellular network, a user may experience many drawbacks such as low throughput, large latencies and network outages due to overload of data traffic. The software defined networking (SDN) and network function virtualization (NFV) rise as...
Sustainable transport services are key for a smart city, especially when considering the increasing size of the population in major cities. In this context, carpooling solutions have gained more and more popularity in the last years. However, current implementations of carpooling services mostly rely on a “static” approach where users, which have planned future mid or long distance trips, post a message...
The Internet of Things (IoT) is creating a world where physical objects are seamlessly integrated to provide advanced and intelligent services for human beings in their day-to-day life style. The realization of complex applications comes from the collaboration of groups of objects; in such a network, objects seek other devices that can provide the services they need for the implementation of the applications...
This paper investigates the main requirements for achieving Access Control (AC) in IoT as induced from literature. A novel AC architecture is then proposed as a candidate approach for AC in IoT taking into account the addressed requirements. That is, AC is proposed to be administered at the level of IoT communities sharing common attributes, i.e. mission, location, resource capability, or device owner,...
Recently, a demand for flexible “group communication” considering users' real-spatial information such as location and property is increasing drastically. To achieve this, we proposed the “r-Space system” that mainly consists of (a) users' data collection and (b) data delivery. In this research, we focus on data collection that can be applied to mobile nodes. Since the r-Space system delivers application...
Indoor localization is a very promising field in the era of Internet of things (IoT) and has a large number of potential applications. Due to the popularity of mobile devices in recent years, using the Received Signal Strength (RSS) of Wi-Fi signals and a fingerprint database (a.k.a radio map) for indoor localization becomes quite attractive. One obstacle is that the RSS values on the reference device...
Software Networks built by combining Software Defined Networks (SDN), Network Function Virtualization (NFV) and Cloud principles call for agile and dynamic automation of management operations to ensure continuous provisioning and deployment of networked resources and services. In this context, efficient Service Level Agreements (SLA) management and anticipation of Service Level Objectives (SLO) breaches...
The functional efficiency of cloud solutions depends on their responsive allocation of processing resources to individual tasks according to their predefined completion times. An optimum usage of resources requires an accurate prediction of resource consumption. In this paper we introduce a novel method for predicting the resource consumption of processing requests in diverse consumption classes in...
Cloud data centers (CDC) are an integral part of today's internet services. Enterprises and Businesses around the world rely heavily on data centers for their daily computation and IT operations. In fact, every time we search for an information on the internet, or we use an application on our smartphones, we access data centers. In CDC, most compute resources are represented as virtual machines (VMs)...
Today, people buy connected objects for limited usages, although these objects could be used in many other IoT services they are not aware of. In this demo paper, we illustrate a solution that helps people to better leverage their connected objects by recommending all services they could benefit from.
Machine Learning and Big Data Analysis are seen as the silver bullet to detect and counteract attacks on critical communication infrastructure. Every message is analysed and is to some degree under suspicion. The principle of innocent until proven guilty does not seem to apply to modern communication usage. On the other hand, criminals would gain easily upper hand in communication networks that are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.