Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simu...
详细信息
ISBN:
(纸本)9781617387036
Vehicular Ad-hoc Networks are a very interesting self-organizing communication system that can make the traffic on our roads much safer. A lot of aspects of the behavior of these systems are studied using network simulation frameworks. While the upper communication layers of Vehicular Ad-hoc Networks are mainly simulated according to their specifications, in this paper we will highlight weak points in these simulations. They occur due the fact that the layers below the link layer are considered very rarely and are also almost neglected by the commonly used network simulation frameworks. This can potentially lead to inaccurate simulation results which can be fatal when studying safety relevant applications or application with real-time constraints. In this work in progress paper we are going to propose an approach to get this under control.
Routing in wireless multi-hop networks has been an active area of research over the last decade. Although, many test-beds were setup recently, the knowledge about the dynamic behavior of routing algorithms and the per...
详细信息
In classical real-time systems the resources for an application are allocated at system start so that every resource request can be fulfilled in future. This would lead to much internal waste of resources in the case ...
详细信息
The vision of the Internet of Things considers smart objects in the physical world as first-class citizens of the digital world. Especially IP technology and RESTful web services on smart objects promise simple intera...
详细信息
ISBN:
(纸本)9781450320030
The vision of the Internet of Things considers smart objects in the physical world as first-class citizens of the digital world. Especially IP technology and RESTful web services on smart objects promise simple interactions with Internet services in the Web of Things, e.g., for building automation or in e-health scenarios. Peer authentication and secure data transmission are vital aspects in many of these scenarios to prevent leakage of personal information and harmful actuating tasks. While standard security solutions exist for traditional IP networks, the constraints of smart objects demand for more lightweight security mechanisms. Thus, the use of certificates for peer authentication is predominantly considered impracticable. In this paper, we investigate if this assumption is valid. To this end, we present preliminary overhead estimates for the certificate-based DTLS handshake and argue that certificates - with improvements to the handshake - are a viable method of authentication in many network scenarios. We propose three design ideas to reduce the overheads of the DTLS handshake. These ideas are based on (i) pre-validation, (ii) session resumption, and (iii) handshake delegation. We qualitatively analyze the expected overhead reductions and discuss their applicability. Copyright 2013 ACM.
Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, office or shop. In many environments a spontaneous ...
详细信息
ISBN:
(纸本)9783885792482
Mobile indoor navigation systems guide users through buildings and premises by taking into account the current position of the user and a destination such as a room, office or shop. In many environments a spontaneous and also anonymous navigation is desirable e.g. at airports, hospitals or university campuses. However, many systems that have been proposed so far require the integration of a radio-based positioning system and access to other organization-specific systems, which results in a lot of things a user has to deal with before the navigation system can be used and which raises a lot of issues with respect to the location privacy of the user. In this paper we propose a mobile indoor navigation system that allows spontaneous navigation and that guarantees location privacy for the user. A pre-compiled compact representation for all the routes and navigation instructions in a building is the basis for an application that uses the built-in camera on the mobile device to derive the current position in the building from barcodes which are distributed all over the building. We show that the approach allows to navigate through a building with thousands of rooms and requires only little data on the device. Routes can be computed efficiently in O(1) on the device and the only infrastructure that is required are the barcodes which can be easily printed and installed at walls or already existing signs in the building.
A role paradigm conformance model (RPCM) called Typehole model was developed and implemented in Java. It does not use Is-role-of inheritance and is free from the object schizophrenia (OS) problem (OSP). An extended di...
详细信息
In mobile collaborative applications, collaborating agents can move across heterogeneous networks. The collaborating agents also keep changing their roles depending on the work to be performed at that time. I n such s...
详细信息
Optimized Link State Routing (OLSR) protocol is a leading proactive routing protocol for Mobile Ad-hoc Networks (MANETs). Since the OLSR protocol in its standard version does not support multi-path packet forwarding, ...
详细信息
The Field-Programmable Gate Arrays (FPGAs) computing architecture allows users to program and reconfigure hardware, providing flexibility and adaptability. FPGAs have garnered considerable attention in both academic r...
详细信息
System monitors need oracles to determine whether observed traces are acceptable. One method is to compare the observed traces to a formal model of the system. Unfortunately, such models are not always available - sof...
详细信息
ISBN:
(纸本)9781612081687
System monitors need oracles to determine whether observed traces are acceptable. One method is to compare the observed traces to a formal model of the system. Unfortunately, such models are not always available - software may be developed without generating a formal model, or the implementation deviates from the original specification. In previous work, we have proposed a learning algorithm to construct a formal model of the software from its test cases, thereby providing a means to transform test cases for offline testing into an oracle for monitoring. In this paper, we refine our learning algorithm with a set of state-merging rules that help to exploit the test cases for additional information. Using the additional information mined from the test cases, models can be learned from smaller test suites.
暂无评论