The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this talk I will explore one of the most relevant challenges for a decade to come: How to integrate the Internet of Things with software, people, and processes, considering modern Cloud Computing and the Internet of Things (IoT) with Big Data. I will present a fresh look at this problem, and examine how to integrate people, software services, and things with their data, into one novel resilient...
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
The problem of securely storing and processing a hierarchy of sensitive data is of paramount importance in many sectors, like Defense or Critical Infrastructures, just to name a few. Since years Industry and Academia have been involved in researches focused on multilevel security, formal languages, and new platform modeling frameworks. The Multiple Independent Levels of Security/Safety is a new paradigm...
In the present work, we developed approaches for effective control of traffic flow in the virtual data center, based on the methods used in the data mining and machine learning to more accurately classify and identify streams of cloud-based applications and network services.
Cloud services may suffer from outages, which interrupt customers' activities and result in economic losses. A linear model is proposed here to translate outages into economic losses, accounting for both the frequency and the duration of outages. Two tools, the exceedance loss probability and the Value-at-Risk, are employed to assess the maximum economic exposure of a customer. The use of both tools...
A major goal of current computer network security systems is to protect the network from outside attackers; however, protecting the network from its own users is still an unattended problem. In campus area networks, the risk of having internal attacks is high because of their topologies and the amount of users. This work proposes a new approach to identify whether a network user is having or not a...
The demands for standardized evaluation of user experience with multimedia services in mobile networks are constantly growing. Therefore, most of the standardization bodies are active in this domain. As a result, several standards for QoE prediction in video streaming systems have been introduced recently. One of them is ITU-T P.1201 with its Amendment n. 2, which has been developed for TCP-based...
Network Function Virtualization (NFV) and Software-Defined Networking (SDN) are two paradigms that have attracted much attention in the networking field. The first permits the implementation of Network Functions (NFs) on commodity servers located in datacenters. The second facilitates the management and routing of network flows by controllers. While recent work has mostly explored the use of NFV and...
In this paper, we present our smart-card-based access control system based on modern programmable smart cards. We propose an efficient and secure authentication protocol that is based on a zero-knowledge authentication method. Only users who prove the knowledge of private keys stored in smart cards are verified successfully. Our system provides also the tracebility and linkability of user entries...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
Our work presents an embedded webserver that can retrofit electronic electricity meters by transforming them into smart meters. The webserver receives data from up to 8 electronic electricity meters on UART and 1 meter on RS-232, then displays the information on a webpage. This device aims to update an Elster A100C electronic electricity meter in order to comply with Automatic Meter Reading requirements...
The new generation of virtualization is containerization. In this paper we measured the most common container techniques to determinate the performance of these techniques regarding computing power and network performance with industry standard measurement applications. We used these measurement results to compare them with native performance without any container techniques and with the Linux standard...
Recent advances in information communication technologies will yield new systems/devices for the visually impaired. To realize such systems/devices, location information is essential, especially for indoor application. This paper proposes an indoor location estimation method that uses cost-effective radio frequency nodes. The proposed method uses received signal strength values to estimate the distance...
Thermal comfort of person living in building with radiant floor heating is not usually perfect. There is usually absence of control system based on each single room. This work proposes a simple, promising, effective and cost-effective regulation system for radiant floor heating. Designed system is based on small wireless sensors placed in every room to measure the temperature and wirelessly send it...
A wavelength division multiplexing local area network with a separate control channel is considered in this paper. Key point of the study is the access rights over the WDM data channels in order to enhance the performance. Thus, an efficient access scheme that provides asymmetric rights to all the stations is proposed. Particularly, a synchronous transmission WDMA access algorithm is introduced that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.