A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Deterministic Meeting of Sniffing Agents in the Plane
[chapter]
2016
Lecture Notes in Computer Science
Two mobile agents, starting at arbitrary, possibly different times from arbitrary locations in the plane, have to meet. ...
We consider two models of estimation. In both models an agent reads its sensor at the moment of its appearance in the plane and then at the end of each move. ...
We are interested in deterministic algorithms for the task of meeting. ...
doi:10.1007/978-3-319-48314-6_14
fatcat:ctnbcwvpnzeubpisov6oalf26y
Deterministic meeting of sniffing agents in the plane
[article]
2017
arXiv
pre-print
Two mobile agents, starting at arbitrary, possibly different times from arbitrary locations in the plane, have to meet. ...
We consider two models of estimation. In both models an agent reads its sensor at the moment of its appearance in the plane and then at the end of each move. ...
We are interested in deterministic algorithms for the task of meeting. ...
arXiv:1709.06217v1
fatcat:3pghgspz2zdrhoaptouha3abn4
A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid
2021
Electronics
This survey collects vulnerabilities of the communication in the smart grid and reveals security mechanisms introduced by international electrotechnical commission (IEC) 62351-6 and how to apply them to ...
, deterministic, and Ethernet-based. ...
physical layers that meet the communication requirements of a substation. ...
doi:10.3390/electronics10161881
fatcat:wbgcf7skercvddghfprs66tlvm
Secure and dependable software defined networks
2016
Journal of Network and Computer Applications
All the hype surrounding the SDNs is predominantly because of its centralized management functionality, the separation of the control plane from the data forwarding plane, and enabling innovation through ...
Finally, in an effort to anticipate secure and dependable SDNs, we present the ongoing open security issues, challenges and future research directions. ...
Fortifying SDN agents The security of the SDN agent is important because it constitutes the data plane environment To compromise a strong entity, such as the SDN controller, an attacker may reach the target ...
doi:10.1016/j.jnca.2015.11.012
fatcat:m5ekztakunbzxgkuk6gfp23j3e
Reins to the Cloud: Compromising Cloud Systems via the Data Plane
[article]
2017
arXiv
pre-print
In particular, it forces us to revisit today's assumption that the data plane can only be compromised by a sophisticated attacker: we show that compromising the data plane of modern computer networks can ...
Our work highlights the need to accommodate the data plane(s) in our threat models. ...
ACKNOWLEDGEMENTS The authors would like to express their gratitude towards the German Bundesamt für Sicherheit in der Informationstechnik, for sparking the authors' interest in SDN security. ...
arXiv:1610.08717v2
fatcat:ofa6z6ik7ffojcpojqvmrdblvq
Lupine Sensibilities: Dynamically Embodied Intersubjectivity between Humans and Refugee Wolves
2019
Refract An Open Access Visual Studies Journal
At the same time, I recognize that these scientific fields are generally based in positivist philosophy and sometimes imply that they have ascended to some epistemological plane of detached and pure objectivity ...
by, social life." 12 By returning agency to persons, this view avoids the overly deterministic aspects of Merleau-Ponty's thought while retaining the radical potential of an embodied consciousness that ...
doi:10.5070/r72145860
fatcat:cwnopbz3ordt3jxzyawk6mwlby
From places to paths:Learning for Sustainability, teacher education and a philosophy of becoming
2015
Environmental Education Research
The purpose of this paper is to explore what thinking with a philosophy of 'becoming' might produce in terms of conceptualising Learning for Sustainability (LfS), a recent development in Scottish educational ...
This assemblage creates lines of flight for considering practice, including making explicit the expressivity of communication in course descriptor/teaching/learning relationships; highlighting the place ...
Acknowledgements The authors wish to thank all those involved in the editorial process as well as the peerreviewers whose diligent and constructive reading greatly enhanced this paper. ...
doi:10.1080/13504622.2015.1057554
fatcat:2nd6wi42tbflfkcknwtqloxb2e
Designing the 5G network infrastructure: a flexible and reconfigurable architecture based on context and content information
2018
EURASIP Journal on Wireless Communications and Networking
We present the Flex5Gware network architecture, designed to meet the above requirements. ...
We terminate our paper by discussing how the Flex5Gware architecture aims at influencing future system standardization and leveraging the benefits of some key 5G networking enablers described in the paper ...
Competing interests The authors declare that they have no competing interests. ...
doi:10.1186/s13638-018-1215-1
fatcat:e2hykqxpvzagbn6lupzbnezltq
D2.1 Definition and Description of the 6G BRAINS Primary Use Cases and Derivation of User Requirements
2021
Zenodo
The most challenging use cases build the basis for our requirements analysis summarized in this document in form of technical use case descriptions, derived user requirements, KPI specifications, as well ...
Wireless connectivity is an important enabler for many modern applications in various segments. The need for further improvement of wireless communication technologies is still very large. ...
requirements from the network point of view and to derive a set of KPIs that meet most of the primary use cases needs. ...
doi:10.5281/zenodo.5185388
fatcat:ttwmlpnqzjcnvi2lnamsnzglyi
Delivery of 5G Services Indoors - the wireless wire challenge and solutions
2021
Zenodo
The delivery of 5G services to these spaces has to consider the specificities of the indoor environments, in which the radio propagation characteristics are different and in the case of deep indoor scenarios ...
Finally in the residential space we can observe a strong trend for wireless connectivity of appliances and devices in the home. ...
In case of considering a deployment where the programmability of the Data Plane is centralised in the SDN controller, then an OpenFlow agent is required to perform the programmability of the hardware rules ...
doi:10.5281/zenodo.4280749
fatcat:ykuzcuhr4za2hpzma5by5spm24
Role of Device Identification and Manufacturer Usage Description in IoT security: A Survey
2021
IEEE Access
One of the major steps forward in this direction is the development of the Manufacturer Usage Description (MUD) standard that defines the role of a device within the network. ...
The ongoing diversity and the sheer increase in the number of connected IoT devices have crumpled security efforts. ...
ACKNOWLEDGMENT The authors of this research would like to thank the anonymous reviewers for the valuable comments and constructive suggestions, and their insights to improve the quality of the manuscript ...
doi:10.1109/access.2021.3065123
fatcat:5gofmkoawbccvhum5zuo3i7vya
Wi-Fi Meets ML: A Survey on Improving IEEE 802.11 Performance with Machine Learning
[article]
2022
arXiv
pre-print
The complexity is further increased in the case of dense deployments and coexistence in shared bands. ...
To this end, we analyze over 250 papers in the field, providing readers with an overview of the main trends. ...
Then, considering the goal of minimizing latency, a on-demand channel bonding (DCB) algorithm that uses DRL, along with a multi-agent deep deterministic policy gradient (MADDPG) for training, to find suitable ...
arXiv:2109.04786v3
fatcat:ny55qfhsnfduzcxyve5mylpr2m
Edge computing for 5G networks - white paper
2020
Zenodo
Moreover, the white paper provides an in-depth analysis of Edge solutions that have been selected, deployed and validated by 17 different EU funded 5G PPP projects. ...
, c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem. ...
Towards that end, making stateful data plane algorithms programmable, complementing the programmable forwarding plane solutions, can be beneficial in terms of meeting QoS requirements (e.g., low latency ...
doi:10.5281/zenodo.3698117
fatcat:zjbuceqquzfchcylpgacwgxjpa
Edge computing for 5G networks - white paper
2020
Zenodo
Moreover, the white paper provides an in-depth analysis of Edge solutions that have been selected, deployed and validated by 17 different EU funded 5G PPP projects. ...
, c) a discussion about the role of security, and d) an analysis of several business aspects around the Edge ecosystem. ...
Towards that end, making stateful data plane algorithms programmable, complementing the programmable forwarding plane solutions, can be beneficial in terms of meeting QoS requirements (e.g., low latency ...
doi:10.5281/zenodo.4555780
fatcat:sg62p5agq5c75hsbr2hyb4vkqe
Surveying pervasive public safety communication technologies in the context of terrorist attacks
2020
Physical Communication
In contrast, one of the fundamental issues in most of the unpredictable emergency scenarios, especially in terrorist attacks, is the slow response time, as it is observed that, even after many hours, police ...
The economic losses are huge; Belgium suffered losses up to 1 billion USD in 2016 [5]; in the same year the estimated loss in Paris region was of 858 million USD [6]. ...
Further, the 3GPP meeting for the integration of D2D services into IoT was discussed in [82] , which would meet the requirements of longer battery life and better connectivity of IoT devices in close ...
doi:10.1016/j.phycom.2020.101109
fatcat:s74tzgwo6rfmbjyfqnytrdxece
« Previous
Showing results 1 — 15 out of 174 results