Filters








11,219 Hits in 2.2 sec

Multiparty Session and Network Resource Control in the Context Casting (C-CAST) Project [chapter]

Augusto Neto, Susana Sargento, Evariste Logota, Josephine Antoniou, Filipe Pinto
2009 Lecture Notes in Computer Science  
In this paper, we propose an efficient architecture for context-aware multiparty session and network control which dynamically adapts to contexts' and networks' dynamics and maintains the connectivity  ...  In these environments, where groups may be created based on context, multicast takes a new lead to the communications environment.  ...  multiparty trees in dynamic context-aware environments, and assess its efficiency and scalability when compared to the mechanisms support in current networks.  ... 
doi:10.1007/978-3-642-02472-6_11 fatcat:arhdglvvurgm5b3yig2qzcniem

Architecture for context-aware multiparty delivery in mobile heterogeneous networks

Josephine Antoniou, Christophoros Christophorou, Christophe Janneteau, Mounir Kellil, Susana Sargento, Augusto Neto, Filipe Cabral Pinto, Nuno Filipe Carapeto, Jose Simoes
2009 2009 International Conference on Ultra Modern Telecommunications & Workshops  
We show that this architecture is able to provide personalized and multiparty services to the users, addressing their characteristics and preferences, and optimizing network support while mobility and  ...  This paper presents a context-aware architecture that provides delivery of multiparty services in heterogeneous and mobile environments.  ...  ACKNOWLEDGMENT This work has been supported by the European FP7 ICT project C-CAST [4] which aims at evolving mobile multimedia multicasting to exploit the increasing integration of mobile devices with  ... 
doi:10.1109/icumt.2009.5345483 dblp:conf/icumt/AntoniouCJKSNPCS09 fatcat:rucycszj6jc3vphncxkyqptl5a

Context-aware Control for Personalized Multiparty Sessions in Mobile Multihomed Systems

Jose Simoes, Susana Sargento, Josephina Antoniou, Christophoros Christophorou, Christophe Janneteau, Nuno Carapeto, Augusto Neto
2009 Proceedings of the 5th International Mobile Multimedia Communications Conference  
The paper diverges into the second by focusing on the user perceived Quality of Experience and efficient network support of real-time group communications, allowing dynamic adaptation of the multiparty  ...  delivery, group communications optimization and maximization of group member's overall satisfaction.  ...  an efficient transport service for group communications by hiding heterogeneity of underlying networks in terms of IP multicast capabilities or IPv4/v6 support.  ... 
doi:10.4108/icst.mobimedia2009.7468 dblp:conf/mobimedia/SimoesSACJCN09 fatcat:lomnkkvspjajbjuzg6iyscewvi

Privacy Preserved Collaborative Secure Multiparty Data Mining

Ravindra
2012 Journal of Computer Science  
and memory for privacy preservation.  ...  The need for privacy is sometimes due to law or can be motivated by business interests.  ...  cycles 4 3 Execution time for authenticated 6 m sec 2 m sec data sharing (Hundreds of Keys) Share Key Length (in bits) 16 12 Table 2 : 2 Efficiency of secured multiparty communication in  ... 
doi:10.3844/jcssp.2012.872.878 fatcat:eqrkgk676zfqrkiavars2kdfw4

Context Aware Multiparty Session Support for Adaptive Multicasting in Heterogeneous Mobile Networks [chapter]

Josephine Antoniou, Christian Riede, Filipe Cabral Pinto, Andreas Pitsillides
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
forming network-efficient groups, and in turn communicating the characteristics of these subgroups in the form of content stream descriptions to the media delivery function for obtaining the appropriate  ...  content for each subgroup.  ...  An evolved session manager functional entity is described supporting the establishment of context aware multiparty sessions in a heterogeneous environment in an efficient way.  ... 
doi:10.1007/978-3-642-01802-2_25 fatcat:pdruvmnxjzc63lhrqhyg7h7xm4

Context-Aware Self-optimization in Multiparty Converged Mobile Environments [chapter]

Josephine Antoniou, Christophoros Christophorou, Augusto Neto, Susana Sargento, Filipe Cabral Pinto, Nuno Filipe Carapeto, Telma Mota, Jose Simoes, Andreas Pitsillides
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In such scenario, efficient multiparty delivery depends upon the grouping operation (creation of a set of users to receive a given session), which must be done based on several parameters.  ...  The increase of networking complexity requires the design of new performance optimization schemes for delivering different types of sessions to users under different conditions.  ...  Multiparty Transport Overlay (MTO) -it provides a generic, scalable, and efficient transport service for group communications by applying the overlay paradigm at the transport layer.  ... 
doi:10.1007/978-3-642-11482-3_10 fatcat:22r4rgkzonfkde5whb7xumqnoi

Multiparty Call Control at the Network Edge

Ivaylo I. Atanasov, Evelina N. Pencheva, Denitsa L. Velkova, Ivaylo P. Asenov
2020 Elektronika ir Elektrotechnika  
Multiparty video calls are one of the key applications of 5G, and are efficient way to exchange ideas, knowledge, expertise, information, and so on.  ...  Network programmability is a key feature of fifth generation (5G) system which, in combination with cloud-based services, can support many use cases, including mission critical and healthcare communications  ...  V API RESOURCES AND SUPPORTED METHODS FOR MULTIPARTY COMMUNICATION CONTROL.  ... 
doi:10.5755/j01.eie.26.5.26007 fatcat:3y6om2hg3naf5fbvw2mfoduzsy

Survey on Secure Mining of Association Rules in Vertically Distributed Databases

P Kalaivani
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
In this Paper, we have shown the experiment results of Apriori Algorithm and Secure Multi Party Algorithm over vertically distributed databases for finding Frequent Item Sets and efficiency over computation  ...  Our protocol is based on Apriori Algorithm and Secure Multiparty Algorithm simulated over vertically distributed databases.  ...  In addition to that, it is simpler and is significantly more efficient in terms of communication cost, computational cost,and communication rounds.  ... 
doi:10.17762/ijritcc2321-8169.150355 fatcat:nf6djmf5wbaahlrlejf5ehf6fy

Facilitating the Implementation of Distributed Systems with Heterogeneous Interactions [chapter]

Salwa Kobeissi, Adnan Utayim, Mohamad Jaber, Yliès Falcone
2018 Lecture Notes in Computer Science  
HDBIP allows both multiparty and direct send/receive interactions that can be directly mapped to an underlying communication library.  ...  Then, we present a correct and efficient code generation from HDBIP to C++ implementation using Message Passing Interface (MPI). We present a non-trivial case study showing the effectiveness of HDBIP.  ...  The authors acknowledge the support of the University Research Board (URB) at American University of Beirut and the ICT COST (European Cooperation in Science and Technology) Action IC1402 Runtime Verification  ... 
doi:10.1007/978-3-319-98938-9_15 fatcat:fjl7lsc5lrbx3mdg5frvxdqbzq

IMS signalling for multiparty services based on network level multicast

Ivan Vidal, Ignacio Soto, Francisco Valera, Jaime Garcia, Arturo Azcorra
2007 2007 Next Generation Internet Networks  
IMS provides a framework that supports the negotiation of the next generation multimedia services with QoS requirements that are envisioned for 3G networks.  ...  This approach is not optimum, in terms of transmission efficiency.  ...  But this unicast approach is not optimum, in terms of transmission efficiency and scalability, for services that involve the participation of multiple users in a multiparty arrangement.  ... 
doi:10.1109/ngi.2007.371204 fatcat:trobyjaw2vdabovbrpb2xwsmre

An efficient simulation for quantum secure multiparty computation

Kartick Sutradhar, Hari Om
2021 Scientific Reports  
AbstractThe quantum secure multiparty computation is one of the important properties of secure quantum communication.  ...  The existing protocols have some security and efficiency issues because they use (n, n) threshold approach, where all the honest players need to perform the quantum multiparty summation protocol.  ...  Acknowledgements This work is partially supported by Indian Institute of technology (ISM) Dhanbad.  ... 
doi:10.1038/s41598-021-81799-z pmid:33500501 pmcid:PMC7838208 fatcat:zvavyczhjfaxznbxvp5pbsnmsy

Benefits of session types for software development

A. Laura Voinea, Simon J. Gay
2016 Proceedings of the 7th International Workshop on Evaluation and Usability of Programming Languages and Tools - PLATEAU 2016  
Session types are a formalism used to specify and check the correctness of communication based systems.  ...  We identify the hypotheses upon which session types have been designed and implemented, and attempt to clarify and formulate them in a more suitable manner for testing.  ...  Acknowledgments This research was supported by UK EPSRC grant "From Data Types to Session Types: A Basis for Concurrency and Distribution" (EP/K034413/1).  ... 
doi:10.1145/3001878.3001883 dblp:conf/oopsla/VoineaG16 fatcat:tffhzlj24naudhsupq7tz4pcse

Privacy-Preserving Analysis of Distributed Biomedical Data: Designing Efficient and Secure Multiparty Computations Using Distributed Statistical Learning Theory

Fida K Dankar, Nisha Madathil, Samar K Dankar, Sabri Boughorbel
2019 JMIR Medical Informatics  
This study aimed to develop usable and efficient SMC applications that meet the needs of the potential end-users and to raise general awareness about SMC as a tool that supports data sharing.  ...  these computations to form 1 estimator for the collective dataset, thus limiting communication to the final step and reducing complexity.  ...  The secure median algorithmThe complexity of the algorithm is 𝑛𝑝 T and total communication required is 2 messages per party, where each After receiving the overall feature selection vector, each party  ... 
doi:10.2196/12702 pmid:31033449 pmcid:PMC6658266 fatcat:tygorqhoc5f3bhuf3nw7di7fra

Secure Collaborative Supply-Chain Management

Florian Kerschbaum, Axel Schroepfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani
2011 Computer  
Cryptography research has proven that such a protocol exists for any efficiently computable function for any finite number of parties.  ...  It offers primitives for cryptographic operations, such as homomorphic encryption and secret sharing, as well as for synchronous and asynchronous communication.  ... 
doi:10.1109/mc.2011.224 fatcat:7umw3rvrd5fanaadlfuo7kbxe4

Towards a context-aware multi-party emergency coordination system framework

Steven C. Way, Yufei Yuan
2012 International Conference on Information Systems for Crisis Response and Management  
A framework for an emergency response system is proposed which is an extension of, but significantly different from, traditional group and distributed group support systems.  ...  These issues are addressed by incorporating context-aware, multi-agency relationship management, and multiparty coordination components into the framework for a context-aware multiparty coordination system  ...  GDSS/DGSS CAMPCS Objective Support group decision making Support multiparty coordination Users Predetermined group Large scale multiparty participation Decision Context Well defined Uncertain  ... 
dblp:conf/iscram/WayY12 fatcat:hwsvo33aqnhhbc6b2lojwrzuja
« Previous Showing results 1 — 15 out of 11,219 results