Filters








38 Hits in 5.1 sec

EZ: Towards Efficient Asynchronous Protocol Gateway Construction [chapter]

Yérom-David Bromberg, Floréal Morandat, Laurent Réveillère, Gaël Thomas
2013 Lecture Notes in Computer Science  
In this paper, we are providing a framework called EZ that enables to generate gateways for either C or Java platform without requiring from developers any substantial understanding of either relevant  ...  Gateways, that are able to translate one protocol to another, appear to be a key enabler of the future of IoT but present a cumbersome challenge for many developers.  ...  .C #include<stdio.h> void main(int argc, char** argv){ } .java Developer C EZ-gateway over libasync Java EZ-gateway over JVM C asynchronous runtime Message Extraction (Protocol A)  ... 
doi:10.1007/978-3-642-38541-4_13 fatcat:f3brbtwc7rdx5cva44cyq4yzpu

Design and Evaluation of a Distributed Security Framework for the Internet of Things

Kelechi G. Eze, Cajetan M. Akujuobi
2022 Journal of Signal and Information Processing  
The paper is the design and construction of a decentralized IoT security framework, with the goal of making emerging IoT systems more resilient to attacks and supporting complex communication and resource  ...  Hence, evaluation of the system is performed based on computational and memory efficiency, security, and scalability.  ...  Standards are essential to make different IoT devices and protocols work together efficiently, ensuring interoperability and security.  ... 
doi:10.4236/jsip.2022.131001 fatcat:pwjt65phyre3vc7lar2xdjkz6u

A New Congestion Control Approach on TFRC Over Wired and Wireless Networks

Amit Kumar
2012 IOSR Journal of Computer Engineering  
This is because of its more struggles towards preciseness and extra overhead of maintaining more sets for construction of Call Graph.  ...  In the fraud detection protocol, gateways report accumulated ticket records to the TA periodically instead of in real time.  ... 
doi:10.9790/0661-0140108 fatcat:2wgiadro4jgnfmf4utpsk3jkbm

Modal Analysis of Electric sail

Todd D. Lillian
2021 Acta Astronautica  
Sustaining the Gateway properly will require a productive and efficient operation of it.  ...  PEGASIS Protocol The PEGASIS (Power Efficient GAthering in Sensor Information Systems) protocol was proposed right after the LEACH protocol at the Aerospace Corporation Lab by Lindsey and Raghavendra  ...  Another finite element model constructed was one with the simulated payload separation system added between the PAF and the load introduction structure as shown in Figure 13 .  ... 
doi:10.1016/j.actaastro.2021.05.003 fatcat:haxb75tn2bd7xp43hw6hv4mlya

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R.J. Fontaine, Avgoustinos Filippoupolitis, Etienne Roesch
2018 Computers & security  
/netw. accessibility Gateway architecture  ...  That is because it is at the same time an efficient communication protocol and a good mechanism for evaluating proximity through signal strength (especially Bluetooth Low Energy).  ...  with implantable and wearable medical devices [106] , and toward psychological well-being.  ... 
doi:10.1016/j.cose.2018.07.011 fatcat:cq6g7sb5uvaavoth4myqadhmau

27th Annual Computational Neuroscience Meeting (CNS*2018): Part Two

2018 BMC Neuroscience  
Acknowledgements Ensemble modeling was performed on the Neuroscience Gateway Portal [4]. This work is supported by the CMBC Interdisciplinary Neuroscience Pilot Research Fund at Emory University.  ...  EZ.  ...  the clinically annotated EZ.  ... 
doi:10.1186/s12868-018-0451-y fatcat:afgrjlnjgjarldkuwo3e2pt5sm

Development of Global Geographical Coverage Area for Terrestrial Networks Internetworked with Leo Satellite Network

V. O. C. Eke, A. N. Nzeako
2014 Communications and Network  
This network uses fast packet switching technology based on Asynchronous Transfer Mode (ATM) developments [9] .  ...  Both ISLs enable the communication between two users in different footprints with not more than two ground gateways being necessary.  ...  ( ) Arc EZ inradians Km e r xθ θ = (4) The diameter of the instantaneous coverage region is given by: [ ] 2Arc EZ 2 Km e r xθ = (5) And the coverage angle at the centre of the earth is given by: 2x  ... 
doi:10.4236/cn.2014.64025 fatcat:czkvjppdxbf6vjvplz46non5ru

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
We then discuss several techniques and platforms that facilitate the efficient deployment of deep learning onto mobile systems.  ...  In addition, the connectivity of mobile devices, routers, base stations, gateways, and so on can naturally construct a directed graph, where entities are represented as vertices, the links between them  ...  This opens a new research direction toward embedding machine learning towards greening cellular networks. C.  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde

Restricted dynamic Steiner trees for scalable multicast in datagram networks

E. Aharoni, R. Cohen
1998 IEEE/ACM Transactions on Networking  
Another important property of the protocol is that the established trees are efficient.  ...  Internet employs the distance vector multicast routing protocol (DVMRP) [9] in order to construct a shortest-path tree for every multicast {source, group} pair.  ... 
doi:10.1109/90.700892 fatcat:lcx5ipn6wfc6th65ofqtjxikty

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Check: yP +eZ = (ae+r)P +eZ = aeP + rP + (−eaP ) = rP = X The Okamoto Identification Protocol based on ECDLP Another option for secure identification is Okamoto's identification protocol.  ...  This layer based classification of security protocols can help towards a more clear understanding of WSN security and better protocol design.  ...  Introduction While the wireless devices are coming to the offices and houses, the need for strong secure transport protocols seems to be one of the most important issues in the communications standards  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
We then discuss several techniques and platforms that facilitate the efficient deployment of deep learning onto mobile systems.  ...  In addition, the connectivity of mobile devices, routers, base stations, gateways, and so on can naturally construct a directed graph, where entities are represented as vertices, the links between them  ...  This opens a new research direction toward embedding machine learning towards greening cellular networks. C.  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research [article]

Frederik Hauser, Marco Häberle, Daniel Merling, Steffen Lindner, Vladimir Gurevich, Florian Zeiger, Reinhard Frank, Michael Menth
2021 arXiv   pre-print
Programming protocol-independent packet processors (P4) has emerged as the currently most widespread abstraction, programming language, and concept for data plane programming.  ...  The authors introduce a header stack to specify the processing of the packet towards its destination. That header stack is constructed and pushed onto the packet by the source node.  ...  Ez-Segway [185] facilitates updating by including data plane devices in the update process.  ... 
arXiv:2101.10632v3 fatcat:ci4hkca5ibdzpatgowhzqcqzvm

A Single-Cell Biochemistry Approach Reveals PAR Complex Dynamics during Cell Polarization

Daniel J. Dickinson, Francoise Schwager, Lionel Pintard, Monica Gotta, Bob Goldstein
2017 Developmental Cell  
Sullivan-Brown for constructing the NMY-2::mKate2 strain; Jacques Boisvert, Jonas Dorn, Daniel Ensign, Khuloud Jaqaman, Paul Maddox, Frédéric Moisy, Vijay Pande, Eize J.  ...  for helpful discussions; Nancy Allbritton, Matthew DiSalvo and Yuli Wang for training in microfabrication and access to their equipment; Luke Lavis for providing JaneliaFluor dyes; Mark Slabodnick for constructing  ...  PAR3N wild-type and mutant constructs are fused to the GAL4 activation domain (prey plasmid).  ... 
doi:10.1016/j.devcel.2017.07.024 pmid:28829947 pmcid:PMC5575849 fatcat:i3dz3m3feva63miy4trr5g3vsu

Ultrasound Indoor Positioning System Based on a Low-Power Wireless Sensor Network Providing Sub-Centimeter Accuracy

Carlos Medina, José Segura, Ángel De la Torre
2013 Sensors  
The ZigBee protocol enables managing the network efficiently by implementing several strategies to reduce the power consumption of the system and extend the battery life of the nodes.  ...  This node works as a gateway between the user application and the network nodes.  ... 
doi:10.3390/s130303501 pmid:23486218 pmcid:PMC3658758 fatcat:wsrhcu7zs5dinb37vujfijpkza

Dynamic Mission Planning for Communication Control in Multiple Unmanned Aircraft Teams

Andrew N. Kopeikin, Sameera S. Ponda, Luke B. Johnson, Jonathan P. How
2013 Unmanned Systems  
Wireless channel frequencies are efficiently assigned.  ...  In the bundle construction process, each agent compares its ability to do a task with its local bid space A = {Sij, ...  ... 
doi:10.1142/s2301385013500039 fatcat:vqka7eioirc5rjqelb36rc6j5u
« Previous Showing results 1 — 15 out of 38 results