The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Multi-Agent Flood algorithm is an algorithm to control multiple autonomous agents to explore unknown terrain and to find p oints of interest in t he newly uncovered territory. It does so by using a mix of indirect and direct communication. The direct communication via radio signals allows for a faster exchange of data between the agents. This layered communication model allows for a robust data...
Recent studies have shown the benefits of using SMART attributes to predict disk failures in homogeneous populations of disks from the same make and model. We address here the case of data centers with more heterogeneous disk populations, such as the ones described in the BackBlaze datasets, and propose to build global disk failure predictors that would apply to disks of all makes and models. Our...
In this work, Skeleton Decomposition (SD) and Singular Value Decomposition (SVD) are compared and evaluated for reconstruction of data matrices whose columns come from a union of subspaces. Specifically, an original data matrix is reconstructed from noise-contaminated version of it. First, matrix reconstruction using SD iteratively is introduced and alternative methods for forming SD-based reconstruction...
This work evaluates the impact of different path loss models on capacity of small cell (SC) networks, including the relationship between cell size and capacity. We compare four urban path loss models: the urban/vehicular and pedestrian test environment from the ITU-R M. 1255 Report, and the two-slope Micro Urban Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) models from the ITU-R 2135 Report. We...
Unmanned Aerial Vehicles (UAVs) have manifold applications and profound research potential. They can fairly act as access points serving users by forming a mesh network in the air. In disaster hit areas or battlefields, providing communication through infrastructure is impossible due to either time constraints or impracticable ground conditions. The UAVs can be dynamically deployed in such scenarios,...
As the complexity of the cyber attacks are increasing, there is a growing demand for proactive defense against them. CYBersecurity information EXchange (CYBEX) is playing a crucial role to implement proactive defense. CYBEX conveys organizations' sensitive information which demands proper access control management. However, previous works in this area do not consider access control for CYBEX. In this...
With the continuously increasing popularity of video streaming applications, providing video streaming services with high Quality of Experience (QoE) is becoming a main concern for cellular network operators. This paper presents and investigates the performance of an architecture for improving the QoE of video streaming in cellular networks. The architecture provides Dynamic Adaptive Streaming over...
Heterogeneous networks (HetNets) are considered a promising cellular network architecture to provide services to the massive number of subscribers. However, in heterogeneous networks, as cell size becomes smaller, the number of handovers and handover failure increase significantly. Therefore, mobility management becomes an important issue in HetNets. In this research, we analyzed the handover parameters,...
Video streaming is a major contributor to modern Internet traffic. In this paper, we use data collected from a campus edge network to characterize two popular video streaming services: Netflix and Twitch. While these video streaming services provide inherently different types of content, namely video-on-demand and live-streaming, they nonetheless exhibit many similarities in traffic patterns, protocol...
This paper provides a methodology of estimating downlink throughput using the drive test data collected by an RF scanner device rather than obtaining the downlink throughput via FTP downloading from UE. The throughput test using the UE's FTP application to perform the throughput test has a merit of presenting the packet data speed from the end user perspective however, it also has significant shortcomings...
With the rapid expansion in multi-media and signal processing applications, DSP processors with high-performance execution and low-power consumption evoke to be the trend. As these applications are often characterised by a huge number of data accesses, the computation efficiency often be heavily decreased by bank conflicts on account of non-aligned and irregular data accesses. This paper presents...
Using simulation to study the behavior of large-scale data storage systems becomes capital to predict the performance and the reliability of any of them at a lower cost. This helps to take the right decisions before the system development and deployment. OGSSim is a simulation tool for large and heterogeneous storage systems that uses parallelism to provide informations about the behavior of such...
The growth and evolution of threats, vulnerabilities and cyber-attacks increase security incidents and generate negative impacts on organizations. We present an online analytical processing (OLAP) system for early alerts of upcoming malicious activities. This study aims to systematize the support of cybersecurity granted by a Computer Security Incident Response Team (CSIRT) and shall help to establish...
Drones or Unmanned Aerial Vehicles (UAVs) receive a growing interest for agricultural purposes. The aim is to provide inspiring insights in this domain from a technological and computational point of view. In these last years, indeed, there is an enormous potential that UAV technologies presents to support the agricultural domain in monitoring the land for checking and countering the presence of parasites...
In this paper, we study a cognitive radio network comprising a pair of sources and multiple relays operating in non-overlapping bands in the radio spectrum. We address the problem of deciding the transmission powers of the sources and relays so that the sum of the sources' transmission capacities is maximized. Due to the non-overlapping nature of the relays' signals, the problem can be represented...
Performance analysis of a complex computing system requires a lot of time and effort. Many studies related to performance analysis have been conducted. Firstly, there are studies about workload modeling that model and analyze the observed workloads using statistical summaries. Also, there are studies to analyze system behavior and procedures through simulation modeling. However, there are some disadvantages...
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
Cybersecurity information sharing is improving cyber incident detection and prevention by reducing the loss caused by attacks and eliminating the costs of duplication efforts for cyber-defense. However, privacy is one of the major concerns of organizations, while they are gathering security information to share externally. In order to preserve the privacy of organizations in the cybersecurity information...
The key enabling technology in dynamic spectrum access is Cognitive Radio that allows unlicensed secondary users to access the licensed bands without causing any interference to the primary users. In any situation where there are a certain number of secondary networks trying to get an available channel, there arises a game theoretic competition where they want to get the channel for themselves by...
Directional antennas are largely employed in wireless networks due to their capability of increasing spatial reuse of the wireless channel with respect to the classical omnidirectional systems. In this context. the use of Smart Antenna Systems (SAS) are providing a strong increasing impact in digital wireless communication systems. Because of their many benefits, this kind of systems are extremely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.