Alpesh Ranchordas, Helder J. Araújo, Bruno P. Encarnação, Helder J. Araújo, S. Abdallah
{"title":"Brief contents","authors":"Alpesh Ranchordas, Helder J. Araújo, Bruno P. Encarnação, Helder J. Araújo, S. Abdallah","doi":"10.7591/9780801454592-001","DOIUrl":"https://doi.org/10.7591/9780801454592-001","url":null,"abstract":"Sometimes, the presence of objects difficult the observation of other neighboring objects. This is because part of the surface of an object occludes partially the surface of another, increasing the complexitiy in the recognition process. Therefore, the information which is acquired from scene to describe the objects is often incomplete and depends a great deal on the view point of the observation. Thus, when any real scene is observed, the regions and the boundaries which delimit and dissociate objects from others are not perceived easily. In this paper, a method to discern objects from others, delimiting where the surface of each object begins and finishes is presented. Really, here, we look for detecting the overlapping and occlusion zones of two or more objects which interact among each other in a same scene. This is very useful, on the one hand, to distinguish some objects from others when the features like texture colour and geometric form are not sufficient to separate them with a segmentation process. On the other hand, it is also important to identify occluded zones without a previous knowledge of the type of objects which are wished to recognize. The proposed approach is based on the detection of occluded zones by means of structured light patterns projected on the object surfaces in a scene. These light patterns determine certain discontinuities of the beam projections when they hit against the surfaces becoming deformed themselves. So that, such discontinuities are taken like zones of boundary of occlusion candidate regions.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel modular black-box architecture for secure vehicular networks","authors":"M'hamed Chammem, Mohamed Hamdi, N. Boudriga","doi":"10.5220/0002989400930103","DOIUrl":"https://doi.org/10.5220/0002989400930103","url":null,"abstract":"The emerging technology of vehicular communication systems (VCSs) raises a number of technical challenges that need to be addressed. Particularly, security ranks at the top of these challenges. In fact, the plethora of services that can be provided using VCSs introduces new communication scenarios that require special security services. This paper tackles the problems related to the storage of the evidences related to onboard security architectures. A special emphasis is made on the management of the events related to the features and history of the vehicle. In this context, a new black-box architecture is proposed. It consists in two basic modules: a main black-box and an auxiliary black-box. We show that this separation allows a better classification of the data records supported by the block-box. The interaction of the black-box with the other components of the VCS is also discussed. Due to the sensitivity of the event records, the input data flows pass necessarily through a security module which performs some key functions including event timestamping and security policy management. A specific public key infrastructure is also proposed to support our secure VCS architecture.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129695375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of TCP algorithms on hybrid wired/wireless LAN test-bed","authors":"A. Kotsiolis, C. Antonopoulos, S. Koubias","doi":"10.5220/0002981900730079","DOIUrl":"https://doi.org/10.5220/0002981900730079","url":null,"abstract":"This paper aims to provide comparative performance evaluation of various available TCP algorithms over a hybrid local area network comprising by, both wired and wireless sections. Although TCP originally was designed aiming to control internet traffic, LAN networks increasingly depend on new TCP protocol versions to provide congestion control, fairness and optimum resource utilization. Additionally wireless LANs' popularity increase exponentially. Based on the aforementioned observations, the objective of this paper is two-fold. Firstly, to present an adequate test-bed enabling, through a significant number of experiments, an accurate performance evaluation of five different TCP versions available by a typical Linux distribution. Secondly based on the conclusions extracted, propose efficient, yet low complexity modifications, able to improve network performance of the considered scenarios.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125727464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network in a box","authors":"F. Gagnon, B. Esfandiari, Tomas Dej","doi":"10.5220/0002891600550060","DOIUrl":"https://doi.org/10.5220/0002891600550060","url":null,"abstract":"VNEC (Virtual Network Experiment Controller) is an open source tool for specifying and executing network experiments in a virtual environment. The user first describes the network topology, and then provides the tasks that should be performed by the hosts, together with their execution order. Next, VNEC initializes the environment by configuring and powering on the corresponding virtual machines to match the desired network topology. Finally, commands are dispatched to the proper virtual machines in the specified order. VNEC can hence be used for many types of network experiments. This paper presents the architecture of VNEC and discusses its implementation.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of the TLS handshake in the context of embedded devices","authors":"Manuel Koschuch, Matthias Hudler, Michael Krüger","doi":"10.5220/0002983200350044","DOIUrl":"https://doi.org/10.5220/0002983200350044","url":null,"abstract":"With the strong advent of mobile and embedded devices communicating in a wireless way using the air inter-face, the need for secure connections, efficient en- and decryption and strong authentication becomes more and more pronounced. The Transport Layer Security (TLS) protocol provides a convenient and well researched way to establish a secure authenticated connection between 2 communicating parties. By utilizing Elliptic Curve Cryptography (ECC) instead of the more common RSA algorithms, asymmetric cryptography is feasible even for tiny integrated devices. However, when dealing with heavily resource constrained appliances, it does not suffice to speed up just the cryptography related computations, but to also keep the communication necessary to establish a secure connection to a minimum, in order not to drain the scarce energy resources of the small devices. In this work we give a thorough investigation of the communication overhead the TLS handshake requires when used in conjunction with elliptic curve cryptography, together with experimental results using our own library handcrafted to support ECC on embedded systems. The results give implementers a useful guide for weighing security versus performance and also justifies the need for new authentication methods, requiring less communication overhead.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure wearable and implantable body sensor networks in hazardous environments","authors":"Mohamed Hamdi, N. Boudriga, H. Abie, M. Denko","doi":"10.5220/0002988200850092","DOIUrl":"https://doi.org/10.5220/0002988200850092","url":null,"abstract":"The aim of Wearable and implantable monitoring devices is to collect relevant data from the application-related environment, and transmit this information to the outside world. Modern microelectronics create ever increasing opportunities, but it is still true that sensors form the weakest elements in the entire chain of data collection and processing. The difficulty of deploying smart body sensor networks is exacerbated by the hostile environments in which they are typically installed. In this paper, we propose a novel architecture for wearable and implantable body sensor systems that guarantees both real-time responsiveness and security. We rely on the wavelet packet transform to develop an intelligent session management scheme where a customizable frame structure allows multiplexing the set of sessions between the elementary sensors and the analysis center. We introduce a lightweight identity-based encryption protocol suitable for body smart sensor systems. We also present performance results using simulation experiments.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting multimedia applications in home networks using SIP and SLP","authors":"Min-Xiou Chen, Bing-Yang Lin, Wen-Yen Weng","doi":"10.5220/0002960300190024","DOIUrl":"https://doi.org/10.5220/0002960300190024","url":null,"abstract":"With increased communication bandwidth the demand for home network multimedia services is increasing. A ubiquitous environment has been proposed to greatly facilitate human daily life. Service Location Protocol (SLP) provides a dynamic way to search for the location of available services and service information in the environment. Session Initiation Protocol (SIP) is an application layer signaling protocol. SIP is used to create, modify and terminate multimedia sessions. We improved SIP to support streaming service, and discover the streaming service using SLP. A prototype implementation is built to show the implementation results of our prototype.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"48 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133089339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Base Station Application Optimizer","authors":"Ronit Nossenson","doi":"10.5220/0003022601190124","DOIUrl":"https://doi.org/10.5220/0003022601190124","url":null,"abstract":"Expectation and requirements for future wireless communication systems continue to grow and evolve. Long-Term Evolution (LTE) is a recent effort taken by cellular providers and equipment vendors to step into wireless broadband market. The key enhancements target an introduction of new all-IP architecture, enhanced link layer and radio access. In LTE, one of the recurring problems is the bottlenecked backhaul links, connecting the cell sites with the core network. The basic idea behind the Base Station Application Optimizer is to replace the traditional base station with a smart entity, capable of analyzing and optimizing the user data in the application level. In particular, such unit can prevent unnecessary data from travelling though the bottlenecked backhaul network. The benefits of such entity are reduced latency, jitter and network deployment costs.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128302959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NEMO: A network monitoring framework for high-performance computing","authors":"E. P. Calle","doi":"10.5220/0002968700610066","DOIUrl":"https://doi.org/10.5220/0002968700610066","url":null,"abstract":"The volume of data generated by the Large Hadron Collider (LHC), several PetaBytes (PB) per year, requires a distributed tier-organised structure of computing resources for mass storage and analysis. The complexity and diversity of the components of this structure (hardware, software and networks) require a control mechanism to guarantee high-throughput high-reliability computing services. NEMO is a monitoring framework that has been developed in one of the computing clusters that receive data from LHC and has been designed to measure and publish the state of a cluster resources, maximize performance and efficiency and guarantee the integrity of the cluster.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131732433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Svéda, O. Ryšavý, P. Matoušek, J. Ráb, Rudolf Cejka
{"title":"Security analysis of TCP/IP networks: An approach to automatic analysis of network security properties","authors":"M. Svéda, O. Ryšavý, P. Matoušek, J. Ráb, Rudolf Cejka","doi":"10.5220/0002838300050011","DOIUrl":"https://doi.org/10.5220/0002838300050011","url":null,"abstract":"This paper deals with an approach to security analysis of TCP/IP-based computer networks. The method developed stems from a formal model of network topology with changing link states, and deploys bounded model checking of network security properties supported by SAT-based decision procedure. Its implementation consists of a set of tools that provide automatic analysis of router configurations, network topologies, and states with respect to checked properties. While the paper aims at supporting a real practice, its form strives to be exact enough to explain the principles of the method in more detail.","PeriodicalId":165879,"journal":{"name":"2010 International Conference on Data Communication Networking (DCNET)","volume":"326-328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130891224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}