177 Hits in 2.7 sec

Policy-agile encrypted networks via secure function computation

Rajesh Krishnan, Ravi Sundaram
a new advanced "black core" network while preserving confidentiality of the mission context and content.  ...  Recent developments in cryptography in the areas of secure multi-party function computation and homomorphic encryption enable new policy-agile encrypted networking capabilities.  ...  Preston Marshall for leading him to some of the key insights on rethinking security, especially for content-oriented networking.  ... 
doi:10.1109/milcom.2010.5679583 fatcat:xxgm3aplhndtde4pvhcdsfhw6y

Bringing pervasive embedded networks to the service cloud: A lightweight middleware approach

Iván Corredor, José F. Martínez, Miguel S. Familiar
2011 Journal of systems architecture  
The main part of our proposal is the Knowledge-Aware and Service-Oriented (KASO) Middleware that has been designed for pervasive embedded networks.  ...  In this research paper, an internetworking approach is proposed in order to address that important issue.  ...  The following sections do not aim to provide a comparison between our approach and other proposals that enable internetworking capabilities; rather, the objective is to present an original SOA-based proposal  ... 
doi:10.1016/j.sysarc.2011.04.005 fatcat:ewf5wpmnk5ayplbrdsv7k6awua

Semantic-Based Knowledge Dissemination and Extraction in Smart Environments

M. Ruta, F. Scioscia, E. Di Sciascio, D. Rotondi, S. Piccione
2013 2013 27th International Conference on Advanced Information Networking and Applications Workshops  
Features of the proposed approach are detailed and discussed w.r.t. the key requirements and research challenges of next-generation smart cities and factory automation.  ...  Logic-based standard and non-standard inference services can be exploited in matchmaking and negotiation for service/resource discovery and on-the-fly reasoning, as well as for large-scale analyses.  ...  ACKNOWLEDGMENTS The authors acknowledge partial support of EU ECTP 2012-14 project "GAIA: Generalized Automatic exchange of port Information Area", and EU FP7 Project IoT@Work (Grant Agreement N. 257367  ... 
doi:10.1109/waina.2013.249 dblp:conf/aina/RutaSSRP13 fatcat:d43rbifwmvd2dpjvegte4dxs5e

A development methodology to facilitate the integration of Smart Spaces into the Web of Things

Ivan Corredor, Josue Iglesias, Ana M. Bernardos, Jose R. Casar
2012 2012 IEEE International Conference on Pervasive Computing and Communications Workshops  
In this paper we propose a Resource-Oriented and Ontology-Driven Development (ROOD) methodology, based on Model Driven Architecture (MDA), to facilitate to any developer the development and deployment  ...  a diversity of devices to plug to Internet.  ...  ACKNOWLEDGMENT This work has been supported by the Spanish Ministry of Industry, Tourism and Commerce and the European Fund for Regional Development under grant TIN2011-28620-C02-02, the Ministry for Science  ... 
doi:10.1109/percomw.2012.6197626 dblp:conf/percom/CorredorIBC12 fatcat:yzwjgkmbancoxarw5pxq47uoka

Structural optimality and neurogenetic expression mediate functional dynamics in the human brain

Ioannis Pappas, Michael M. Craig, David K. Menon, Emmanuel A. Stamatakis
2020 Human Brain Mapping  
We used a game-theoretic model to identify such optimal connections in the structural connectome of 50 healthy individuals and subsequently used the optimal structural connections to predict resting-state  ...  Here we investigated the hypothesis that resting state functional connectivity and the manner in which it changes during tasks related to a set of underlying structural connections that promote optimal  ...  Despite having a low number of optimal intra-network connections, the DMN had the highest number of optimal internetwork connections.  ... 
doi:10.1002/hbm.24942 pmid:32027077 fatcat:b6ik4kiigzfj5guqz7vhgbgl5u

P2S: A Methodology to Enable Inter-organizational Process Design through Web Services [chapter]

Devis Bianchini, Cinzia Cappiello, Valeria De Antonellis, Barbara Pernici
2009 Lecture Notes in Computer Science  
We propose a methodology to support the designer of a business process in the identification of services that compose the process itself.  ...  The methodology is presented by means of a running example in a real case scenario.  ...  of Education, University and Research.  ... 
doi:10.1007/978-3-642-02144-2_28 fatcat:bxuj3kcjfjaeba3yfrlcyysqde

Optimizing the Retrieval of Pertinent Answers for NL Questions with the E-Librarian Service

Serge Linckels, Harald Sack, Christoph Meinel
2007 International Semantic Web Conference  
We present a running web-based system -the e-Librarian Service CHESt -that is able to match a user's question given in natural language to a selection of semantically pertinent learning objects based on  ...  Technologies for recording lectures have become readily available and the sheer number and size of such objects produced grows exponentially.  ...  The proposed algorithm for identifying the best cover relies on the computation of minimal transversals in a hypergraph.  ... 
dblp:conf/semweb/LinckelsSM07 fatcat:x63o63zlqbgzdfs2smaxtxsqzq

Visualizing Internetworked Argumentation [chapter]

Simon Buckingham Shum, Victoria Uren, Gangmin Li, John Domingue, Enrico Motta
2003 Computer Supported Cooperative Work  
Still at a relatively early stage, our project is bringing to bear on this challenge a networked representational environment (a digital library server based on an argumentation ontology (Buckingham Shum  ...  We start with some background needed to understand the rationale for this work, and refer the reader to other sources for more detailed treatments of technical and social issues.  ...  In contrast, we propose an ontology for scholarly discourse, primarily for humans to communicate through as a medium for publishing and discourse (although we envisage agents as protagonists and claim-makers  ... 
doi:10.1007/978-1-4471-0037-9_9 fatcat:pjcha5toajbrbhtr6sed6uljqu

On Ubiquitous Integrated Computing

Kari Anne Haaland Thorsen, Chunming Rong
2008 International Journal of Computer Science and Applications  
Extended use of sensors may generate vast amount of data, and efficient data filtering, integration and reasoning are needed to benefit from the expanded data collection.  ...  Sensor-data are captured and mapped onto a common (standardized) format where semantic web technologies enable seamless and invisible data-fusion.  ...  Actually, ad hoc networks can be considered as subset of WMN because they also provide a wireless backbone for internetworking the other mesh, ad hoc or infrastructure based networks such as Internet,  ... 
dblp:journals/ijcsa/ThorsenR08 fatcat:5wbzbd2u3rgtzbkpj5jsgqwzdy

Context-Aware Middleware for Multimedia Services in Heterogeneous Networks

Liang Zhou, Naixue Xiong, Lei Shu, Athanasios Vasilakos, Sang-Soo Yeo
2010 IEEE Intelligent Systems  
Acknowledgments Lei Shu's work related to this article was supported in part by the Lion project of Science Foundation Ireland under grant SFI/08/CE/ I1380 (Lion-2) and in part by the Grantin-Aid for Scientifi  ...  c Research (S)(21220002) of the Ministry of Education, Culture, Sports, Science, and Technology in Japan.  ...  The algorithms used for profi le matching should be loaded at runtime rather than a static part of the adaptation mechanism.  ... 
doi:10.1109/mis.2010.48 fatcat:eluipom3tzdibfonrr64uzo34i

Proposal of a clean slate network architecture for ubiquitous services provisioning

X. Sanchez-Loro, J. Casademont, J. Paradells, J. L. Ferrer, A. Vidal
2009 2009 First International Conference on Future Information Networks  
Although current layered network architectures (mainly TCP/IP stack) have enabled internetworking of lots of different devices and services, they are neither well-suited nor optimized for pervasive computing  ...  The architecture is designed to avoid hierarchical layering, so we propose a serviceoriented approach for a flow-oriented context-aware network architecture where communications are composed on the fly  ...  PROPOSAL OF A NEW NETWORK ARCHITECTURE Herein, we propose a new network architecture to deploy ubiquitous services in a "clean slate" environment.  ... 
doi:10.1109/icfin.2009.5339598 fatcat:wxyhf3yfmbca3dwz5iiy5ftt24

A Unified Software Architecture to Enable Cross-Layer Design in the Future Internet

Ilia Baldine, Manoj Vellala, Anjing Wang, George Rouskas, Rudra Dutta, Daniel Stevenson
2007 2007 16th International Conference on Computer Communications and Networks  
As part of our FIND project, we propose a software architecture for the future Internet that is designed to accommodate such interactions.  ...  We present a conceptual overview as well as high level software design and an early prototype implementation, and point out the strengths of our architecture.  ...  Flexibility is attained at the cost of a unified architecture. We propose a new network architecture that represents a departure from current philosophy and practice.  ... 
doi:10.1109/icccn.2007.4317792 dblp:conf/icccn/BaldineVWRDS07 fatcat:lkvdq2efz5a75errrm6vzqoeva

Technical sessions

2007 2007 12th IEEE Symposium on Computers and Communications  
We propose a solution based on pre-autheication which uses utillity-based optimal control to choose with which gateways to pre-authenticate over time.  ...  This paper proposes a new modeling framework for mobile ad-hoc networks that integrates all important functional characteristics of a MANET and is able to predict network Quality of Service (QoS) based  ...  Proposed QoS routing algorithms seek a multi-constrained optimal path, while traffic engineering algorithms aim at maximizing throughput and the number of admitted requests.  ... 
doi:10.1109/iscc.2007.4381657 fatcat:bn67vm2cvvehvmqqxew4r2xkbe

Towards a Minimal Core for Information-Centric Networking [chapter]

Kari Visala, Dmitrij Lagutin, Sasu Tarkoma
2013 Lecture Notes in Computer Science  
The question of whether there exists a minimal model for information-centric networking (ICN), that allows the bulk of features of various recent ICN architectures to be expressed as independent extensions  ...  This approach makes the experimentation of new features above and their implementation below faster and provides a possible evolutionary kernel for ICN.  ...  We claim that both the CCN and PURSUIT naming can be emulated on top of the IS and provide evidence for this in Sect. 6 by showing a partial concrete proposal.  ... 
doi:10.1007/978-3-642-38082-2_4 fatcat:lcrwcyvaabernj476phds5jxzu

Black boxes

Sasu Tarkoma, Dirk Trossen, Mikko Särelä
2008 Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08  
We study the concept of completeness of network topology and find it useful for understanding and optimizing publish/subscribe based network architectures.  ...  We view the network as a collection of black boxes, based on a set of recursive rendezvous functions.  ...  We would like to thank PSIRP partners for insightful discussions.  ... 
doi:10.1145/1403007.1403023 fatcat:skivdyqf7nccxbrmgu3n6nhfvu
« Previous Showing results 1 — 15 out of 177 results