1,138 research outputs found
PRIVED: a Privacy Model for Heterogeneous Mobile Networks
We propose a network-oriented privacy model (PRIVED) composed by a well deïŹned information model, using events, information sets and relationships to deïŹne the conceptual privacy relationships that can occur in the network. We propose formal rules and a network instantiation, using
linkability and correlation as the main tools for network applicability. We also use the model to determine the best approaches towards privacy protection in the network, resulting in a vertical/horizontal
network privacy dichotomy
Connectivity-Enforcing Hough Transform for the Robust Extraction of Line Segments
Global voting schemes based on the Hough transform (HT) have been widely used
to robustly detect lines in images. However, since the votes do not take line
connectivity into account, these methods do not deal well with cluttered
images. In opposition, the so-called local methods enforce connectivity but
lack robustness to deal with challenging situations that occur in many
realistic scenarios, e.g., when line segments cross or when long segments are
corrupted. In this paper, we address the critical limitations of the HT as a
line segment extractor by incorporating connectivity in the voting process.
This is done by only accounting for the contributions of edge points lying in
increasingly larger neighborhoods and whose position and directional content
agree with potential line segments. As a result, our method, which we call
STRAIGHT (Segment exTRAction by connectivity-enforcInG HT), extracts the
longest connected segments in each location of the image, thus also integrating
into the HT voting process the usually separate step of individual segment
extraction. The usage of the Hough space mapping and a corresponding
hierarchical implementation make our approach computationally feasible. We
present experiments that illustrate, with synthetic and real images, how
STRAIGHT succeeds in extracting complete segments in several situations where
current methods fail.Comment: Submitted for publicatio
Experimentation with MANETs of Smartphones
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging
technology for scenarios in which IEEE 802.11 or cellular communications are
either infeasible, inefficient, or cost-ineffective. Smartphones are the most
adequate network nodes in many of these scenarios, but it is not
straightforward to build a network with them. We extensively survey existing
possibilities to build applications on top of ad-hoc smartphone networks for
experimentation purposes, and introduce a taxonomy to classify them. We present
AdHocDroid, an Android package that creates an IP-level MANET of (rooted)
Android smartphones, and make it publicly available to the community.
AdHocDroid supports standard TCP/IP applications, providing real smartphone
IEEE 802.11 MANET and the capability to easily change the routing protocol. We
tested our framework on several smartphones and a laptop. We validate the MANET
running off-the-shelf applications, and reporting on experimental performance
evaluation, including network metrics and battery discharge rate.Comment: 6 pages, 7 figures, 1 tabl
FastM: Design and Evaluation of a Fast Mobility Mechanism for Wireless Mesh Networks
Although there is a large volume of work in the literature in terms of mobility approaches for Wireless Mesh Networks, usually these approaches introduce high latency in the handover process and do not support realtime services and applications. Moreover, mobility is decoupled from routing, which leads to inefficiency to both mobility and routing approaches with respect to mobility. In this paper we present a new extension to proactive routing protocols using a fast mobility extension, FastM, with the purpose of increasing handover performance in Wireless Mesh Networks. With this new extension, a new concept is created to integrate information between neighbor wireless mesh routers, managing locations of clients associated to wireless mesh routers in a certain neighborhood, and avoiding packet loss during handover. The proposed mobility approach is able to optimize the handover process without imposing any modifications to the current IEE 802.11 MAC protocol and use unmodified clients. Results show the improved efficiency of the proposed scheme: metrics such as disconnection time, throughput, packet loss and control overhead are largely improved when compared to previous approaches. Moreover, these conclusions apply to mobility scenarios, although mobility decreases the performance of the handover approach, as expected
Quasi-omniscient networks: scenarios on context capturing and new services through wireless sensor networks
This paper addresses future scenarios for the telecommunications field, addressing the impact of three important research trends in computer networks: Context, Sensors and Wireless Networks. The proposed scenarios clearly highlight the possible synergies between the defined areas, and describe the role of Users and Network Operators in order to achieve the described goals. The potential danger of an over-encompassing network is identified, with a brief discussion on the challenges associated to the implementation of such a knowledge-aware communications network. The paper finalizes presenting a classification on the typical scenarios to be expected, and highlighting the associated challenges. It also presents a proposal on a scalable network infrastructure for Context processing
Catalogue of unexpected interactions between aspects
Tese de mestrado integrado. Engenharia Informåtica e Computação. Faculdade de Engenharia. Universidade do Porto. 200
Integration of service, network and system management: current and forthcoming trends
A major problem that industry is being faced with is
related to the miscellaneous of management
requirements and to the explosion of management
information. Network and systems management often
make use of different tools and technologies. The
introduction of Quality of Service in the Internet will
bring increased needs for efficient service
management approaches in the network. The
integration of these different kinds of management
approaches into a common framework is critical for
the future development of the Internet and intranets.
This paper exploits the usage of software agents
acting as mediators between different management
protocols and data and assuring transparent
integration of those dissimilar solutions
Physical behavior of eigenvalues and singular values in matrix decompositions
An apposite as well as realistic treatment of eigenvalue and singular value problems are potentially of interest to a wide variety of people, including among others, design engineers, theoretical physicists, classical applied mathematics and numerical analysis who yearn to carry out research in the matrix field. In real world, it is extensively used but at sometimes scantily understood. This paper focuses on building a solid perception of eigenvalue as well as singular value with their substantial meanings. The main goals of this paper are to present an intuitive experience of both eigenvalue and singular value in matrix decompositions throughout a discussion by largely building on ideas from linear algebra and will be proficiently to gain a better perceptive of their physical meanings from graphical representation
- âŠ