Filters








174 Hits in 4.9 sec

Deterministic Meeting of Sniffing Agents in the Plane [chapter]

Samir Elouasbi, Andrzej Pelc
2016 Lecture Notes in Computer Science  
Two mobile agents, starting at arbitrary, possibly different times from arbitrary locations in the plane, have to meet.  ...  We consider two models of estimation. In both models an agent reads its sensor at the moment of its appearance in the plane and then at the end of each move.  ...  We are interested in deterministic algorithms for the task of meeting.  ... 
doi:10.1007/978-3-319-48314-6_14 fatcat:ctnbcwvpnzeubpisov6oalf26y

Deterministic meeting of sniffing agents in the plane [article]

Samir Elouasbi, Andrzej Pelc
2017 arXiv   pre-print
Two mobile agents, starting at arbitrary, possibly different times from arbitrary locations in the plane, have to meet.  ...  We consider two models of estimation. In both models an agent reads its sensor at the moment of its appearance in the plane and then at the end of each move.  ...  We are interested in deterministic algorithms for the task of meeting.  ... 
arXiv:1709.06217v1 fatcat:3pghgspz2zdrhoaptouha3abn4

A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid

Jesús Lázaro, Armando Astarloa, Mikel Rodríguez, Unai Bidarte, Jaime Jiménez
2021 Electronics  
This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to  ...  , deterministic, and Ethernet-based.  ...  physical layers that meet the communication requirements of a substation.  ... 
doi:10.3390/electronics10161881 fatcat:wbgcf7skercvddghfprs66tlvm

Secure and dependable software defined networks

Adnan Akhunzada, Abdullah Gani, Nor Badrul Anuar, Ahmed Abdelaziz, Muhammad Khurram Khan, Amir Hayat, Samee U. Khan
2016 Journal of Network and Computer Applications  
All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through  ...  Finally, in an effort to anticipate secure and dependable SDNs, we present the ongoing open security issues, challenges and future research directions.  ...  Fortifying SDN agents The security of the SDN agent is important because it constitutes the data plane environment To compromise a strong entity, such as the SDN controller, an attacker may reach the target  ... 
doi:10.1016/j.jnca.2015.11.012 fatcat:m5ekztakunbzxgkuk6gfp23j3e

Reins to the Cloud: Compromising Cloud Systems via the Data Plane [article]

Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid
2017 arXiv   pre-print
In particular, it forces us to revisit today's assumption that the data plane can only be compromised by a sophisticated attacker: we show that compromising the data plane of modern computer networks can  ...  Our work highlights the need to accommodate the data plane(s) in our threat models.  ...  ACKNOWLEDGEMENTS The authors would like to express their gratitude towards the German Bundesamt für Sicherheit in der Informationstechnik, for sparking the authors' interest in SDN security.  ... 
arXiv:1610.08717v2 fatcat:ofa6z6ik7ffojcpojqvmrdblvq

Lupine Sensibilities: Dynamically Embodied Intersubjectivity between Humans and Refugee Wolves

Austin D. Hoffman
2019 Refract An Open Access Visual Studies Journal  
At the same time, I recognize that these scientific fields are generally based in positivist philosophy and sometimes imply that they have ascended to some epistemological plane of detached and pure objectivity  ...  by, social life." 12 By returning agency to persons, this view avoids the overly deterministic aspects of Merleau-Ponty's thought while retaining the radical potential of an embodied consciousness that  ... 
doi:10.5070/r72145860 fatcat:cwnopbz3ordt3jxzyawk6mwlby

From places to paths:Learning for Sustainability, teacher education and a philosophy of becoming

David A.G. Clarke, Jamie Mcphie
2015 Environmental Education Research  
The purpose of this paper is to explore what thinking with a philosophy of 'becoming' might produce in terms of conceptualising Learning for Sustainability (LfS), a recent development in Scottish educational  ...  This assemblage creates lines of flight for considering practice, including making explicit the expressivity of communication in course descriptor/teaching/learning relationships; highlighting the place  ...  Acknowledgements The authors wish to thank all those involved in the editorial process as well as the peerreviewers whose diligent and constructive reading greatly enhanced this paper.  ... 
doi:10.1080/13504622.2015.1057554 fatcat:2nd6wi42tbflfkcknwtqloxb2e

Designing the 5G network infrastructure: a flexible and reconfigurable architecture based on context and content information

Dario Sabella, Pablo Serrano, Giovanni Stea, Antonio Virdis, Ilenia Tinnirello, Fabrizio Giuliano, Domenico Garlisi, Panagiotis Vlacheas, Panagiotis Demestichas, Vasilis Foteinos, Nikolaos Bartzoudis, Miquel Payaró
2018 EURASIP Journal on Wireless Communications and Networking  
We present the Flex5Gware network architecture, designed to meet the above requirements.  ...  We terminate our paper by discussing how the Flex5Gware architecture aims at influencing future system standardization and leveraging the benefits of some key 5G networking enablers described in the paper  ...  Competing interests The authors declare that they have no competing interests.  ... 
doi:10.1186/s13638-018-1215-1 fatcat:e2hykqxpvzagbn6lupzbnezltq

D2.1 Definition and Description of the 6G BRAINS Primary Use Cases and Derivation of User Requirements

Alexander Artemenko, Yue Zhang, Uwe Wostradowski, John Cosmas, Qi Wang, Jose M. Alcaraz Calero, Enrique Chirivella Perez, Pablo Salva Garcia, Ruben Ricart Sanchez, Bruno Parreira, Marco Araújo, Israel Koffmann (+4 others)
2021 Zenodo  
The most challenging use cases build the basis for our requirements analysis summarized in this document in form of technical use case descriptions, derived user requirements, KPI specifications, as well  ...  Wireless connectivity is an important enabler for many modern applications in various segments. The need for further improvement of wireless communication technologies is still very large.  ...  requirements from the network point of view and to derive a set of KPIs that meet most of the primary use cases needs.  ... 
doi:10.5281/zenodo.5185388 fatcat:ttwmlpnqzjcnvi2lnamsnzglyi

Delivery of 5G Services Indoors - the wireless wire challenge and solutions

Adam Kapovits, Anastasius Gavras, John Cosmas, Mir Ghoraishi, Xi Li, Yue Zhang
2021 Zenodo  
The delivery of 5G services to these spaces has to consider the specificities of the indoor environments, in which the radio propagation characteristics are different and in the case of deep indoor scenarios  ...  Finally in the residential space we can observe a strong trend for wireless connectivity of appliances and devices in the home.  ...  In case of considering a deployment where the programmability of the Data Plane is centralised in the SDN controller, then an OpenFlow agent is required to perform the programmability of the hardware rules  ... 
doi:10.5281/zenodo.4280749 fatcat:ykuzcuhr4za2hpzma5by5spm24

Role of Device Identification and Manufacturer Usage Description in IoT security: A Survey

Noman Mazhar, Rosli Salleh, Muhammad Zeeshan, M. Muzaffar Hameed
2021 IEEE Access  
One of the major steps forward in this direction is the development of the Manufacturer Usage Description (MUD) standard that defines the role of a device within the network.  ...  The ongoing diversity and the sheer increase in the number of connected IoT devices have crumpled security efforts.  ...  ACKNOWLEDGMENT The authors of this research would like to thank the anonymous reviewers for the valuable comments and constructive suggestions, and their insights to improve the quality of the manuscript  ... 
doi:10.1109/access.2021.3065123 fatcat:5gofmkoawbccvhum5zuo3i7vya

Wi-Fi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning [article]

Szymon Szott, Katarzyna Kosek-Szott, Piotr Gawłowicz, Jorge Torres Gómez, Boris Bellalta, Anatolij Zubow, Falko Dressler
2022 arXiv   pre-print
The complexity is further increased in the case of dense deployments and coexistence in shared bands.  ...  To this end, we analyze over 250 papers in the field, providing readers with an overview of the main trends.  ...  Then, considering the goal of minimizing latency, a on-demand channel bonding (DCB) algorithm that uses DRL, along with a multi-agent deep deterministic policy gradient (MADDPG) for training, to find suitable  ... 
arXiv:2109.04786v3 fatcat:ny55qfhsnfduzcxyve5mylpr2m

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
Moreover, the white paper provides an in-depth analysis of Edge solutions that have been selected, deployed and validated by 17 different EU funded 5G PPP projects.  ...  , c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem.  ...  Towards that end, making stateful data plane algorithms programmable, complementing the programmable forwarding plane solutions, can be beneficial in terms of meeting QoS requirements (e.g., low latency  ... 
doi:10.5281/zenodo.3698117 fatcat:zjbuceqquzfchcylpgacwgxjpa

Edge computing for 5G networks - white paper

David Artuñedo Guillen, Bessem Sayadi, Pascal Bisson, Jean Phillippe Wary, Håkon Lonsethagen, Carles Antón, Antonio de la Oliva, Alexandros Kaloxylos, Valerio Frascolla
2020 Zenodo  
Moreover, the white paper provides an in-depth analysis of Edge solutions that have been selected, deployed and validated by 17 different EU funded 5G PPP projects.  ...  , c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem.  ...  Towards that end, making stateful data plane algorithms programmable, complementing the programmable forwarding plane solutions, can be beneficial in terms of meeting QoS requirements (e.g., low latency  ... 
doi:10.5281/zenodo.4555780 fatcat:sg62p5agq5c75hsbr2hyb4vkqe

Surveying pervasive public safety communication technologies in the context of terrorist attacks

Ali Masood, Davide Scazzoli, Navuday Sharma, Yannick Le Moullec, Rizwan Ahmad, Luca Reggiani, Maurizio Magarini, Muhammad Mahtab Alam
2020 Physical Communication  
In contrast, one of the fundamental issues in most of the unpredictable emergency scenarios, especially in terrorist attacks, is the slow response time, as it is observed that, even after many hours, police  ...  The economic losses are huge; Belgium suffered losses up to 1 billion USD in 2016 [5]; in the same year the estimated loss in Paris region was of 858 million USD [6].  ...  Further, the 3GPP meeting for the integration of D2D services into IoT was discussed in [82] , which would meet the requirements of longer battery life and better connectivity of IoT devices in close  ... 
doi:10.1016/j.phycom.2020.101109 fatcat:s74tzgwo6rfmbjyfqnytrdxece
« Previous Showing results 1 — 15 out of 174 results