The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing paradigm provides an alternative and economical service for resource-constrained clients to perform large-scale data computation. Since large matrix determinant computation (DC) is ubiquitous in the fields of science and engineering, a first step is taken in this paper to design a protocol that enables clients to securely, verifiably, and efficiently outsource DC to a malicious cloud...
Ectopic activation and conduction may give rise to arrhythmias when a diseased myocardial substrate exists. Electrophysiological mapping studies that record electrical properties of the heart in sinus rhythm may fail to uncover pro-arrhythmic substrates that are triggered by ectopy. In this study we use simulation and experimental models of clinical, trackable, loop catheters to interrogate regions...
In this paper a new task model is proposed for scheduling analysis of dependent tasks in radio stations that embed a TDMA communication protocol. TDMA is a channel access protocol that allows several stations to communicate in a same network, by dividing time into several time slots. Tasks handling the TDMA radio protocol are scheduled in a manner to be compliant with the TDMA configuration: task...
Message Sequence Graphs (MSGs) form a popular model often used for the documentation of telecommunication protocols. They consist of typical scenarios of message exchanges depicted as partial-orders of events that lead from one control state to another. On the other hand Petri nets are a well-known formalism for distributed or parallel systems based on the notion of token game. Both approaches profit...
This paper proposes an approximate method, equivalent access intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, we take into account in our analysis the impacts of empty transmit buffers on the interactions...
Interest in traffic classification has dramatically grown in the past few years in both industry and academia. As more and more applications are encrypting the payloads and not to use well-known ports, traditional traffic classification methods such as transport-layer protocol ports based ones can not accurately and efficiently deal with these applications. In this paper we investigate the problem...
Multi agent systems with autonomous interaction, negotiation and learning capabilities can efficiently model social behavior of individuals participating in a social network. A central problem in a social network is to identify the nodes that actively participate in the expansion of the net both physically and functionally. Several metrics have already been proposed to identify those hot spots. The...
Modeling and implementing auction systems using agent technology is a common practice because agents can assume various roles and their behavior will be determined as a result of negotiation. However, emergent behavior is a hurdle. Mechanisms must be in place to make sure that agents participating in the auction systems won't behave in an unintended way. Detecting emergent behaviors in the design...
This paper proposes and explores an interaction protocol for incorporating helpful behavior into agent teamwork. In the proposed Mutual Assistance Protocol (MAP), an agent can directly assist a teammate who requests help, provided that the two agents jointly determine, based on their individual beliefs, that the expected outcome of the help act is in the interest of the team. This distributed decision...
Particle Swarm Optimisation (PSO) implementations are commonly ad hoc creations, despite the high degree of similarity between variants of the algorithm. Although a “canonical” form of the algorithm is generally understood, differences in the execution of the experiment may produce unique results. It is valuable to establish a common understanding of the informational representation and execution...
Many wireless protocols (including 802.11 definitions) consider fragmentation a valuable approach to minimise the number of transmissions which are lost due to errors. Deciding the optimum size of the fragments is a problem that has been deeply studied in literature. In this paper we consider a different perspective: we propose a Markovian queueing model capable of predicting important performance...
Information analysis and communication play significant roles in decision making, especially in battle grounds and situations where national security is under threat. In many situations when information in consideration is sensitive/confidential, it is in our best interests to analyze and share only needed information to minimize the potential of security breach regarding other irrelevant but sensitive...
We present an extension of the model checker PRISM for (general purpose) graphics processing units (GPUs). The extension is based on parallel algorithms for probabilistic model checking which are tuned for GPUs. In particular, we parallelize the parts of the algorithms that boil down to linear algebraic operations, like solving systems of linear equations and matrix vector multiplication. These computations...
Besides safe navigation (e.g., warning of approaching vehicles), car to car communications will enable a host of new applications, ranging from offlce-on-the-wheel support to entertainment. One of the most promising applications is content distribution among drivers such as multi-media files and software updates. Content distribution in vehicular networks is a challenge due to network dynamics and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.