1,138 research outputs found

    PRIVED: a Privacy Model for Heterogeneous Mobile Networks

    Get PDF
    We propose a network-oriented privacy model (PRIVED) composed by a well deïŹned information model, using events, information sets and relationships to deïŹne the conceptual privacy relationships that can occur in the network. We propose formal rules and a network instantiation, using linkability and correlation as the main tools for network applicability. We also use the model to determine the best approaches towards privacy protection in the network, resulting in a vertical/horizontal network privacy dichotomy

    Connectivity-Enforcing Hough Transform for the Robust Extraction of Line Segments

    Full text link
    Global voting schemes based on the Hough transform (HT) have been widely used to robustly detect lines in images. However, since the votes do not take line connectivity into account, these methods do not deal well with cluttered images. In opposition, the so-called local methods enforce connectivity but lack robustness to deal with challenging situations that occur in many realistic scenarios, e.g., when line segments cross or when long segments are corrupted. In this paper, we address the critical limitations of the HT as a line segment extractor by incorporating connectivity in the voting process. This is done by only accounting for the contributions of edge points lying in increasingly larger neighborhoods and whose position and directional content agree with potential line segments. As a result, our method, which we call STRAIGHT (Segment exTRAction by connectivity-enforcInG HT), extracts the longest connected segments in each location of the image, thus also integrating into the HT voting process the usually separate step of individual segment extraction. The usage of the Hough space mapping and a corresponding hierarchical implementation make our approach computationally feasible. We present experiments that illustrate, with synthetic and real images, how STRAIGHT succeeds in extracting complete segments in several situations where current methods fail.Comment: Submitted for publicatio

    Experimentation with MANETs of Smartphones

    Full text link
    Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications on top of ad-hoc smartphone networks for experimentation purposes, and introduce a taxonomy to classify them. We present AdHocDroid, an Android package that creates an IP-level MANET of (rooted) Android smartphones, and make it publicly available to the community. AdHocDroid supports standard TCP/IP applications, providing real smartphone IEEE 802.11 MANET and the capability to easily change the routing protocol. We tested our framework on several smartphones and a laptop. We validate the MANET running off-the-shelf applications, and reporting on experimental performance evaluation, including network metrics and battery discharge rate.Comment: 6 pages, 7 figures, 1 tabl

    FastM: Design and Evaluation of a Fast Mobility Mechanism for Wireless Mesh Networks

    Get PDF
    Although there is a large volume of work in the literature in terms of mobility approaches for Wireless Mesh Networks, usually these approaches introduce high latency in the handover process and do not support realtime services and applications. Moreover, mobility is decoupled from routing, which leads to inefficiency to both mobility and routing approaches with respect to mobility. In this paper we present a new extension to proactive routing protocols using a fast mobility extension, FastM, with the purpose of increasing handover performance in Wireless Mesh Networks. With this new extension, a new concept is created to integrate information between neighbor wireless mesh routers, managing locations of clients associated to wireless mesh routers in a certain neighborhood, and avoiding packet loss during handover. The proposed mobility approach is able to optimize the handover process without imposing any modifications to the current IEE 802.11 MAC protocol and use unmodified clients. Results show the improved efficiency of the proposed scheme: metrics such as disconnection time, throughput, packet loss and control overhead are largely improved when compared to previous approaches. Moreover, these conclusions apply to mobility scenarios, although mobility decreases the performance of the handover approach, as expected

    Quasi-omniscient networks: scenarios on context capturing and new services through wireless sensor networks

    Get PDF
    This paper addresses future scenarios for the telecommunications field, addressing the impact of three important research trends in computer networks: Context, Sensors and Wireless Networks. The proposed scenarios clearly highlight the possible synergies between the defined areas, and describe the role of Users and Network Operators in order to achieve the described goals. The potential danger of an over-encompassing network is identified, with a brief discussion on the challenges associated to the implementation of such a knowledge-aware communications network. The paper finalizes presenting a classification on the typical scenarios to be expected, and highlighting the associated challenges. It also presents a proposal on a scalable network infrastructure for Context processing

    Catalogue of unexpected interactions between aspects

    Get PDF
    Tese de mestrado integrado. Engenharia Informåtica e Computação. Faculdade de Engenharia. Universidade do Porto. 200

    Integration of service, network and system management: current and forthcoming trends

    Get PDF
    A major problem that industry is being faced with is related to the miscellaneous of management requirements and to the explosion of management information. Network and systems management often make use of different tools and technologies. The introduction of Quality of Service in the Internet will bring increased needs for efficient service management approaches in the network. The integration of these different kinds of management approaches into a common framework is critical for the future development of the Internet and intranets. This paper exploits the usage of software agents acting as mediators between different management protocols and data and assuring transparent integration of those dissimilar solutions

    Physical behavior of eigenvalues and singular values in matrix decompositions

    Get PDF
    An apposite as well as realistic treatment of eigenvalue and singular value problems are potentially of interest to a wide variety of people, including among others, design engineers, theoretical physicists, classical applied mathematics and numerical analysis who yearn to carry out research in the matrix field. In real world, it is extensively used but at sometimes scantily understood. This paper focuses on building a solid perception of eigenvalue as well as singular value with their substantial meanings. The main goals of this paper are to present an intuitive experience of both eigenvalue and singular value in matrix decompositions throughout a discussion by largely building on ideas from linear algebra and will be proficiently to gain a better perceptive of their physical meanings from graphical representation
    • 

    corecore