CNRS

Displaying 41-80 of 245 results

  • White Papers // Apr 2013

    Risk Indicators with Several Lines of Business: Comparison, Asymptotic Behavior and Applications to Optimal Reserve Allocation

    In a multi-dimensional risk model with dependent lines of business, the authors propose to allocate capital with respect to the minimization of some risk indicators. These indicators are sums of expected penal-ties due to the insolvency of a branch while the global reserve is either positive or negative. Explicit formulas...

    Provided By CNRS

  • White Papers // Mar 2013

    Attribute-based Mining Process for the Organization-Based Access Control Model

    Since the late 60's, different security access control models have been proposed. Their rationale is to conceive high level abstract concepts that permit to manage the security policies of organizations efficiently. However, enforcing these models is not a straightforward task, especially when they do not consider the reality of organizations...

    Provided By CNRS

  • White Papers // Mar 2013

    Optimizing QoS InWireless Sensors Networks Using a Caching Platform

    This paper addresses monitoring and surveillance applications using Wireless Sensors Networks (WSNs). In this context, several remote clients are interested in receiving the information collected by the nodes of a WSN. As WSN devices are most of the time constrained in energy and processing, the authors present a caching architecture...

    Provided By CNRS

  • White Papers // Feb 2013

    The Strength of Vicinity Annexation in Opportunistic Networking

    Most disruption-tolerant networking protocols available have focused on mere contact and inter-contact characteristics to make forwarding decisions. The authors propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. They investigate how the vicinity of a node evolves through time...

    Provided By CNRS

  • White Papers // Feb 2013

    Dynamically Adaptable NoC Router Architecture for Multiple Pixel Streams Applications

    Modern computing systems for vision have to support advanced image applications. They involve several heterogeneous pixel streams and they have to respect hard timing and area constraints. To face those challenges, an adaptable ring-based interconnection Network-on-Chip (NoC) has been recently proposed. This NoC is based on a new router architecture,...

    Provided By CNRS

  • White Papers // Jan 2013

    Predicting User Dissatisfaction With Internet Application Performance at End-Hosts

    The authors design predictors of user dissatisfaction with the performance of applications that use networking. Their approach combines user-level feedback with low level machine and networking metrics. The main challenges of predicting user dissatisfaction, that arises when networking conditions adversely affect applications, comes from the scarcity of user feedback and...

    Provided By CNRS

  • White Papers // Jan 2013

    A New Class of Hash-Chain Based Key Pre-Distribution Schemes for WSN

    In the last decade, the authors witness a proliferation of potential application domains of Wireless Sensor Networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity of the potential applications that are generally tightly related to the physical world...

    Provided By CNRS

  • White Papers // Jan 2013

    Optimal Design of Virtual Links in AFDX Networks

    The Avionics Full Duplex Switched Ethernet (AFDX) backbone constitutes one of the major technological breakthroughs in modern avionic architectures. This network is based on routing Ethernet frames through isolated data tunnels referred to as Virtual Links (VL). VLs can be thought of as multicast trees, each serving for data transmission...

    Provided By CNRS

  • White Papers // Jan 2013

    Farm Risk Management Between Normal Business Risk and Climatic/Market Shocks

    Farm risk management for income stabilization is on-going issue. An applied work has been performed to measure farm risk using a stochastic model. Risk management tools, with symmetric as well as asymmetric impacts, are then tested and compared through ad hoc statistics. Normal farm business risk can be efficiently managed...

    Provided By CNRS

  • White Papers // Jan 2013

    A Multiagent Approach for Modelling SMEs Mechatronic Supply Chains

    In this paper, the authors discuss about the application of multiagent system for modelling supply chains involving Small and Medium Enterprises (SMEs) in the mechatronic industry. This paper is a combination of two research scopes. The first one deals with the identification of the different concepts able to model the...

    Provided By CNRS

  • White Papers // Dec 2012

    A Multipath Routing Strategy to Prevent Flooding Disruption Attacks in Link State Routing Protocols for MANETs

    Multipath routing has been proposed to increase resilience against network failures or improve security in Mobile Ad-Hoc NETworks (MANETs). The Optimized Link State Routing (OLSR) protocol has been adopted by several multipath routing strategies. They implement Multi-Point Relay (MPRs) nodes as a flooding mechanism for distributing control information. Ideally, the...

    Provided By CNRS

  • White Papers // Dec 2012

    A Quality Based Approach for the Analysis and Design of Business Process Models

    In recent years, the problems related to modeling and improving business processes has been of growing interest. The scientific problem addressed in this paper consists in modeling and improving Business Process (BP) models quality. This problem is of growing interest as companies are realizing the undeniable impact of a better...

    Provided By CNRS

  • White Papers // Dec 2012

    Survey of Security Problems in Cloud Computing Virtual Machines

    Virtualization has become an attractive and widely used technology in today's computing. Indeed, the ability to share the resources of a single physical machine between several isolated Virtual Machines (VM) enabling a more optimized hardware utilization, as well as the easier management and migration of a virtual system compared to...

    Provided By CNRS

  • White Papers // Dec 2012

    GIS Based Service Oriented Architecture Approach for Electric Distribution

    In this age of technological advancements, the electricity distribution operators continuously seek new and innovative ways to create differentiation and increase profits. The customers do not have to wait infinitely to get the service for which they pay, and are ready to switch to service providers who deliver faster. So...

    Provided By CNRS

  • White Papers // Nov 2012

    A Hybrid Cross Entropy Algorithm for Solving Dynamic Transit Network Design Problem

    This paper proposes a hybrid multiagent learning algorithm for solving the dynamic simulation-based bi-level network design problem. The objective is to determine the optimal frequency of a multimodal transit network, which minimizes total users' travel cost and operation cost of transit lines. The problem is formulated as a bi-level programming...

    Provided By CNRS

  • White Papers // Nov 2012

    Knowledge Intensive Business Services and Long Term Growth

    This paper is to (re)assess the relationship between Knowledge Intensive Business Services (KIBS) and the economic growth. Taking into account various conflicting relationships between KIBS and growth, the authors build a multi agent-based system involving industrial firms, consumer-services firms, consumers, KIBS firms and a banking system. Their main result is...

    Provided By CNRS

  • White Papers // Oct 2012

    Lattice-Based Wyner-Ziv Coding for Parallel Gaussian Two-Way Relay Channels

    Parallel two-way relay channel models a cooperative communication scenario where a relay helps two terminals to exchange their messages over independent Gaussian channels. For the single channel case, the authors have shown previously that lattice-based physical layer network coding achieves the same rate as compress-and-forward scheme with a random coding...

    Provided By CNRS

  • White Papers // Oct 2012

    Efficient Compilation of .NET Programs for Embedded Systems

    Compiling under the Closed-World Assumption (CWA) has been shown to be an appropriate way for implementing object-oriented languages such as Java on low-end embedded systems. In this paper, the authors explore the implications of using whole program optimizations such as Rapid Type Analysis (RTA) and coloring on programs targeting the...

    Provided By CNRS

  • White Papers // Sep 2012

    Finite Dimensional Nested Lattices Based Wyner-Ziv Coding for Two-Way Relay Channel

    Two-Way Relay Channel (TWRC) models a cooperative communication situation performing duplex transmission via a relay station. For this channel, the authors have shown previously that a lattice-based physical layer network coding strategy achieves, at the limit of arbitrarily large dimension, the same rate as that offered by the random coding-based...

    Provided By CNRS

  • White Papers // Sep 2012

    Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge

    Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic datasets for user-profiling to hunt out network attacks. Despite being opposite in nature, both approaches share a common downside: they require the knowledge provided by an...

    Provided By CNRS

  • White Papers // Sep 2012

    Reducing the Risks Faced by Small Businesses: The Lifecycle Concept

    The deployment of a comprehensive risk management approach within an SME (Small or Medium-sized Enterprise) requires reconsideration of enduring preconceptions. However, it also calls for a description and explanation of their idiosyncrasies, in relation to their specific needs and expectations, which change over time. It is therefore appropriate to use...

    Provided By CNRS

  • White Papers // Sep 2012

    The Contribution of the Life Cycle Concept to Reduced Vulnerabilities in Small Businesses

    This paper lies in the deployment of a comprehensive risk management approach within an SME (Small or Medium-sized Enterprise) which calls for a description and explanation of their idiosyncrasies, in relation to their specific needs and expectations, which change over time. It describes the evolution of the business using the...

    Provided By CNRS

  • White Papers // Sep 2012

    A Packing Model to Estimate VANET Capacity

    In IEEE 802.11p VANET networks the transmission scheduling is distributed and asynchronous. The number of simultaneous transmitters is thus closely related to the CSMA/CA mechanism which limits the spatial reuse of the channel. The capacity is bounded by a constant C whatever the number of nodes and the type of...

    Provided By CNRS

  • White Papers // Sep 2012

    A Cache Management Strategy to Replace Wear Leveling Techniques for Embedded Flash Memory

    Prices of NAND flash memories are falling drastically due to market growth and fabrication process mastering while research efforts from a technological point of view in terms of endurance and density are very active. NAND flash memories are becoming the most important storage media in mobile computing and tend to...

    Provided By CNRS

  • White Papers // Sep 2012

    Establishing Enterprise Business Context (eBC) for Service Policy Decision in Mobile Broadband Networks

    Empowering the enterprise to control their own session policy for mobile broadband is not only necessary for consumerization, but for the enterprise to control costs and protect corporate network resources. The authors propose a practical method of establishing dynamically enterprise-Business-Context (eBC) status to determine whether or not the enterprise should...

    Provided By CNRS

  • White Papers // Sep 2012

    An Efficient Hierarchical Dual Cache System for NAND Flash Memories

    NAND flash memories are the most important storage media in mobile computing and tend to be less confined to this area. Nevertheless, it is not mature enough to allow a widespread use. This is due to poor write operations' performance caused by its internal intricacies. The major constraint of such...

    Provided By CNRS

  • White Papers // Sep 2012

    Mapping SPARQL Query to Temporal Logic Query Based on N?SMV Model Checker to Query Semantic Graphs

    The RDF (W3C standard for meta-modeling) language is the most frequently used to represent the semantic graphs. This conversion aims checking the semantic graphs that have numerous errors of interpretation with the model checker NSMV in order to verify the consistency of the data. The SPARQL query language is the...

    Provided By CNRS

  • White Papers // Sep 2012

    Analysis of Sum-Weight-Like Algorithms for Averaging in Wireless Sensor Networks

    Distributed estimation of the average value over a Wireless Sensor Network has recently received a lot of attention. Most papers consider single variable sensors and communications with feedback (e.g. peer-to-peer communications). However, in order to use efficiently the broadcast nature of the wireless channel, communications without feedback are advocated. To...

    Provided By CNRS

  • White Papers // Aug 2012

    Multi-Source Cooperative Communications Using Low-Density Parity-Check Product Codes

    In this paper, the authors investigate the performance of Low-Density Parity-Check (LDPC) product codes in a multisource relay network where multiple sources transmit data to a same destination with the help of a noisy relay. They consider an LDPC product code resulting from the concatenation of Multiple Serially Concatenated Multiple...

    Provided By CNRS

  • White Papers // Aug 2012

    System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion

    The Reverse-Engineering (RE) is a real threat on high-value electronic circuits. Many unitary solutions have been proposed to make RE difficult. Most of them are low-level, and thus costly to design and to implement. In this paper, the authors investigate alternative solutions that attempt to deny the possibility of RE...

    Provided By CNRS

  • White Papers // Aug 2012

    Wyner-Ziv Lattice Coding for Two-Way Relay Channel

    A Two-Way Relay Channel (TWRC) in which duplex transmission between two users via a relay station is considered. A physical layer network coding strategy based on compress-and-forward relaying scheme for the TWRC is proposed. In the underlying coding strategy, the authors use nested lattices for Wyner-Ziv coding and decoding. The...

    Provided By CNRS

  • White Papers // Aug 2012

    Rigorous System Level Modeling and Analysis of Mixed HW/SW Systems

    A grand challenge in complex embedded systems design is developing methods and tools for modeling and analyzing the behavior of an application software running on multicore or distributed platforms. The authors propose a rigorous method and a tool chain that allows obtaining a faithful model representing the behavior of a...

    Provided By CNRS

  • White Papers // Jul 2012

    A Study of Microbial Flora and MRSA Harboured by Mobile Phones of Health Care Personnel

    Mobile phones are increasingly being used by health care workers in day today life. They come in contact with various surfaces while carrying out health care activities and are thus likely to get contaminated by variety of organisms. This paper was carried out to know the microbial flora harbored by...

    Provided By CNRS

  • White Papers // Jul 2012

    Lattice Signatures Without Trapdoors

    The versatility of lattice-based cryptography has elevated it to the status of a promising potential alternative to cryptography based on standard security assumptions such as factoring and discrete log. But before lattices can become a viable replacement for number-theoretic schemes, it is crucial to have efficient lattice-based constructions of the...

    Provided By CNRS

  • White Papers // Jul 2012

    Integrating Corporate Social Responsibility at the Start-Up Level: Constraint or Catalyst for Opportunity Identification?

    This paper examines the issue of integrating CSR at the start-up level with the aim of increasing the firm's ability to identify new opportunities. Both a constraint and an occasion to strengthen the company's legitimacy and competitive advantage, CSR principles and practices are a key vehicle for opportunity identification and...

    Provided By CNRS

  • White Papers // Jun 2012

    Implicit Tensor-Mass Solver on the GPU

    The realist and interactive simulation of deformable objects has become a challenge in computer graphics. For this, the tensor-mass model enables local solving of mechanical equations, making it easier to handle local control, like collisions, tool interaction, etc. In this paper, the authors propose the GPU implementation of this model...

    Provided By CNRS

  • White Papers // Jun 2012

    R-MOM: A Component-Based Framework for Interoperable and Adaptive Asynchronous Middleware Systems

    Systems of Systems (SoS) are composed of subsystems such as distributed, information technology, real-time and embedded systems. Among distributed systems, Message-Oriented Middleware (MOM) is used by SoS in order to share status information from system elements (component, service, etc.). Often several different MOM technologies are used in one SoS, then...

    Provided By CNRS

  • White Papers // Jun 2012

    Design and Logistics IT Federation Through Product Lifecycle Support Standard

    Wide diffusion of methodologies and software relevant to Product Lifecycle Management (PLM) in industrial companies faces heterogeneity of IT systems. Especially, the lack of interoperability between Product Data Management (PDM) systems, that drive virtual product development, and Enterprise Resource Planning (ERP), which manages real product, cannot lead to a coherent...

    Provided By CNRS

  • White Papers // Jun 2012

    Bridging The Gap Between Organisational Needs And ERP Functionality

    The authors argue that ERP installations are difficult to align to specific requirements of the enterprise because of the low level at which ERP functionality is described. They raise this level from a functional description to a goal-oriented one. They use SAP R/3 to illustrate this. A SAP goal expresses...

    Provided By CNRS

  • White Papers // Jun 2012

    Business Process Modeling for Developing Process Oriented IT Systems

    Information system developers are challenged to develop systems that should meet the requirements of modern organizations. By promoting the enterprise-wide integration, the paradigm of Business Process Management contrasts with traditional information system development, which was suffered, but also crystallized, the vertical division of the enterprise activities. In addition, the paradigms...

    Provided By CNRS

  • White Papers // Jan 2009

    PLATINE: DVB-S2/RCS Enhanced Testbed for Next Generation Satellite Networks

    Emulation is a cost effective and efficient tool to perform performances evaluation and innovative access and network techniques validation. Its ability to interconnect real equipments with real applications provides excellent demonstrations means. The main problem is to overcome the emulation weakness which is the accuracy of the model reproducing the...

    Provided By CNRS

  • White Papers // Feb 2009

    Deference Mechanisms Significantly Increase the MAC Delay of Slotted CSMA/CA

    Slotted CSMA/CA is an algorithm proposed by IEEE 802.15.4 in order to deal with the contention of energy constrained nodes. Slotted CSMA/CA is used during a limited time interval, included in a superframe. Two specific mechanisms defer the transmissions that would occur towards the end of the contention period. Multiple...

    Provided By CNRS

  • White Papers // Aug 2011

    Tensor-Based Link Prediction in Intermittently Connected Wireless Networks

    Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in...

    Provided By CNRS

  • White Papers // Sep 2009

    Blind Identification of MISO-FIR Channels

    In this paper, the authors address the problem of determining the order of MISO channels by means of a series of hypothesis tests based on scalar statistics. Using estimated 4th-order output cumulants, they exploit the sensitiveness of a Chi-square test statistic to the non Gaussianity of a stochastic process. This...

    Provided By CNRS

  • White Papers // Sep 2011

    A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

    The authors propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. They base their role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, they prove...

    Provided By CNRS

  • White Papers // Oct 2010

    A Route-Aware MAC for Wireless Multihop Networks With a Convergecast Traffic Pattern

    The MAC layer for multihop wireless networks has drawn considerable research attention in the last few years. The authors focus here on the wireless multihop networks with a converge-cast traffic pattern: the whole traffic is destined to a sink/gateway. They propose first to select a k-tree core, i.e. a sub-tree...

    Provided By CNRS

  • White Papers // Nov 2011

    Distributed Estimation of the Maximum Value Over a Wireless Sensor Network

    This paper focuses on estimating the maximum of the initial measures in a Wireless Sensor Network. Two different algorithms are studied : the random gossip, relying on pair-wise exchanges between the nodes, and the broadcast in which each sensor sends its value to all its neighbors; both are asynchronous and...

    Provided By CNRS

  • White Papers // Sep 2008

    On the Error Exponents for Detecting Randomly Sampled Noisy Diffusion Processes

    This paper deals with the detection of a continuous random process described by an Ornstein-Uhlenbeck (O-U) stochastic differential equation. Randomly spaced sensors or equivalently a random time sampler which deliver noisy samples of the process are used for this detection. Two types of tests are considered: either H0 refers to...

    Provided By CNRS

  • White Papers // Jan 2012

    On the Asymptotic Analysis of Mutual Information of MIMO Rician Correlated Channels

    The analysis of mutual information and capacity of block fading MIMO static channels has generated considerable interest since the seminal work of Telatar in 1995. The vast majority of these works have addressed the case of Rayleigh MIMO channels. Despite its importance, the context of Rician MIMO channels seems to...

    Provided By CNRS

  • White Papers // Jan 2012

    Closed - Form Error Probability of Network - Coded Cooperative Wireless Networks With Channel - Aware Detectors

    In this paper, the authors propose a simple analytical methodology to study the performance of multi-source multi-relay cooperative wireless networks with network coding at the relay nodes and Maximum-Likelihood (ML-) optimum channel-aware detectors at the destination. Channel-aware detectors are a broad class of receivers that account for possible decoding errors...

    Provided By CNRS

  • White Papers // Apr 2010

    GeneSyst: a Tool to Reason about Behavioral Aspects of B Event Specifications. Application to Security Properties

    In this paper, the authors present a method and a tool to build symbolic labelled transition systems from B specifications. The tool, called GeneSyst, can take into account refinement levels and can visualize the decomposition of abstract states in concrete hierarchical states. The resulting symbolic transition system represents all the...

    Provided By CNRS

  • White Papers // Apr 2010

    Security Policy Enforcement Through Refinement Process

    In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. The authors argue that it is possible to build a for-mal link between concrete and abstract terms, which can be dynamically computed from...

    Provided By CNRS

  • White Papers // May 2012

    Streaming Multimedia Over WMSNs: An Online Multipath Routing Protocol

    Routing has become an important challenge to Wireless Multimedia Sensor Networks (WMSNs) from the standpoint of supporting multimedia applications due to the constraints on energy and computational capabilities of sensor nodes, and acquiring of the global network knowledge for disseminating packets to nodes. In this paper, the authors propose an...

    Provided By CNRS

  • White Papers // Nov 2012

    A Hybrid Cross Entropy Algorithm for Solving Dynamic Transit Network Design Problem

    This paper proposes a hybrid multiagent learning algorithm for solving the dynamic simulation-based bi-level network design problem. The objective is to determine the optimal frequency of a multimodal transit network, which minimizes total users' travel cost and operation cost of transit lines. The problem is formulated as a bi-level programming...

    Provided By CNRS

  • White Papers // Jan 2011

    Connectivity in Multi-Channel Multi-Interface Wireless Mesh Networks

    The authors can improve the performance of wireless mesh networks by using multiple interfaces tuned to non-overlapping channels. A Channel and Interface Assignment (CIA) decides when to switch interfaces and which channel to use. Surprisingly, the impact of CIAs on connectivity has received little attention so far. In this paper,...

    Provided By CNRS

  • White Papers // May 2011

    Implementation of a WSNet Module to Simulate the IEEE 802.15.4 Beacon-Enabled Mode in Multihop Topologies

    In this paper, the authors describe their implementation of the beacon-enabled mode in IEEE 802.15.4. They implemented both the Beacon-Only Period (BOP) and the superframe scheduling techniques to support multihop topologies. These techniques permit to reduce the number of collisions, and they implemented very simple collision avoidance scheduling. This implementation...

    Provided By CNRS

  • White Papers // Jan 2011

    Power Control and Clustering in Wireless Sensor Networks

    The use of the Wireless Sensor Networks (WSNs) should be increasing in different fields (scientist, logistic, military and health, etc.). However, the sensor's size is an important limitation in term of energetic autonomy, and thus of lifetime because battery must be very small. This is the reason why, today, research...

    Provided By CNRS

  • White Papers // Jan 2011

    A Survey on Energy-Efficient Communications

    In this paper, the authors review the literature on physical layer energy-efficient communications. The most relevant and recent works are mainly centered around two frameworks: the pragmatic and the information theoretical approaches. Both of them aim at finding the best transmit and/or receive policies which maximize the number of bits...

    Provided By CNRS

  • White Papers // Apr 2009

    Multiband-OFDM: A New Physical Layer Proposal for Ultra-Wide-Band Communications

    This paper investigates the Multi-Band OFDM (MB-OFDM) based PHYsical (PHY) layer proposal for IEEE 802.15.3a working group on short-range high data-rate Ultra-Wide-Band (UWB) communications. An overview of the MB-OFDM PHY layer architecture with its various parameters is presented and the optimal choice of critical parameters is discussed. Next, the authors...

    Provided By CNRS

  • White Papers // May 2009

    Synchronous Modeling and Validation of Priority Inheritance Schedulers

    Architecture Description Languages (ADLs) allow embedded systems to be described as assemblies of hardware and software components. It is attractive to use such a global modelling as a basis for early system analysis. However, in such descriptions, the applicative software is often abstracted away, and is supposed to be developed...

    Provided By CNRS

  • White Papers // Oct 2010

    Static Analysis by Abstract Interpretation of Embedded Critical Software

    Formal methods are increasingly used to help ensuring the correctness of complex, critical embedded software systems. The authors show how sound semantic static analyses based on Abstract Interpretation may be used to check properties at various levels of a software design: from high level models to low level binary code....

    Provided By CNRS

  • White Papers // Jun 2009

    Networks Become Navigable as Nodes Move and Forget

    The authors propose a dynamic process for network evolution, aiming at explaining the emergence of the small world phenomenon, i.e., the statistical observation that any pair of individuals are linked by a short chain of acquaintances computable by a simple decentralized routing algorithm, known as greedy routing. Their model is...

    Provided By CNRS

  • White Papers // Feb 2012

    Combining SysML and AADL for the Design, Validation and Implementation of Critical Systems

    The realization of critical systems goes through multiple phases of specification, design, integration, validation, and testing. It starts from high-level sketches down to the final product. Model-Based Design has been acknowledged as a good conveyor to capture these steps. Yet, there is no universal solution to represent all activities. Two...

    Provided By CNRS

  • White Papers // Dec 2010

    The Complexity of Security Studies in NFC Payment System

    If the authors compare the security problem of a face-to-face contactless card payment process with a mobile phone NFC payment process, they may easily consider that the latter is far more difficult to study. Indeed, the more partners from different organizations involved in the process there are, the more complex...

    Provided By CNRS

  • White Papers // Oct 2009

    Future High Speed In-Vehicle PLC Networks

    This paper deals with Power Line Communication in vehicle (PLC). PLC is a very promising communication solution in order to offer future in-vehicle applications without increasing wiring harnesses. The authors join recent additional measurements which have been carried out using modified indoor PLC modems. These PLC modems are based on...

    Provided By CNRS

  • White Papers // Aug 2009

    NADA - Network Anomaly Detection Algorithm

    This paper deals with a new iterative Network Anomaly Detection Algorithm - NADA, which is threefold: it accomplishes the detection, classification and identification of traffic anomalies. The authors' approach goes one step further than others since it fully provides all information required to limit the extent of anomalies by locating...

    Provided By CNRS

  • White Papers // Feb 2012

    A Lattice-Based Traitor Tracing Scheme

    A traitor tracing scheme is a multi-receiver encryption scheme where malicious receiver coalitions aiming at building pirate decryption devices are deterred by the existence of a tracing algorithm: using the pirate decryption device, the tracing algorithm can recover at least one member of the malicious coalition. All existing traitor tracing...

    Provided By CNRS

  • White Papers // Jan 2012

    Detecting and Profiling TCP Connections Experiencing Abnormal Performance

    The authors study functionally correct TCP connections - normal set-up, data transfer and tear-down - that experience lower than normal performance in terms of delay and throughput. Several factors, including packet loss or application behavior, may lead to such abnormal performance. They present a methodology to detect TCP connections with...

    Provided By CNRS

  • White Papers // Sep 2011

    Asymetric Pavlovian Populations

    Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pair-wise according to some rules that update their...

    Provided By CNRS

  • White Papers // May 2009

    Population Protocols That Correspond to Symmetric Games

    Population protocols have been introduced by Angluin et al. as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact pair-wise according to some rules that update their...

    Provided By CNRS

  • White Papers // Sep 2010

    HostView: Annotating End-Host Performance Measurements With User Feedback

    Network disruptions can adversely impact a users' web browsing, cause video/audio interruptions, or render web sites and services unreachable. Such problems are frustrating to Internet users, who are oblivious to the underlying problems, but completely exposed to the service degradations. Ideally users' end systems would have diagnostic tools that can...

    Provided By CNRS

  • White Papers // Jul 2009

    A Congestion Control Framework for Handling Video Surveillance Traffics on WSN

    This paper focuses on congestion control but while previous works considered scalar sensor nodes which only report events in the size of a few bytes, the authors are addressing congestion control for information-intensive flows such as video flows for surveillance applications in pervasive wireless multimedia sensor networks. The proposed framework...

    Provided By CNRS

  • White Papers // Dec 2009

    Typing Rule-Based Transformations Over Topological Collections

    Pattern-matching programming is an example of a rule-based programming style developed in functional languages. This programming style is intensively used in dialects of ML but is restricted to algebraic data-types. This restriction limits the field of application. However, as shown at RULE'02, case-based function definitions can be extended to more...

    Provided By CNRS

  • White Papers // Dec 2008

    Modeling and Integrating Aspects Into Component Architectures

    Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that address pervasive dependability concerns such as error detection and recovery tend to crosscut application architecture and thus understanding and changing their descriptions can be difficult. Separating these features at...

    Provided By CNRS

  • White Papers // Mar 2012

    Diversity, Coding, and Multiplexing Trade - Off of Network - Coded Cooperative Wireless Networks

    In this paper, the authors study the performance of network - coded cooperative diversity systems with practical communication constraints. More specifically, they investigate the interplay between diversity, coding, and multiplexing gain when the relay nodes do not act as dedicated repeaters, which only forward data packets transmitted by the sources,...

    Provided By CNRS

  • White Papers // Mar 2012

    A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Motivated by the benefits of small world networks, the authors propose a self-organization framework for wireless ad hoc networks. They investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, they identify crucial design issues for algorithm design....

    Provided By CNRS

  • White Papers // Oct 2009

    Effect of Packet Loss on the Quality of Control of a Networked-Mobile Robot

    This paper describes a wireless network based control of a Khepera mobile robot moving in a WLAN distributed infrastructure. Due to the dependence of Quality of Control (QoC) over network Quality of Service (QoS), a simulation is performed for packet losses and compared to actual results in the lab environment....

    Provided By CNRS

  • White Papers // Mar 2012

    Achieving Small World Properties Using Bio-Inspired Techniques in Wireless Networks

    It is highly desirable and challenging for a wireless ad hoc network to have self-organization properties in order to achieve network wide characteristics. Studies have shown that Small World properties, primarily low average path length and high clustering coefficient, are desired properties for networks in general. However, due to the...

    Provided By CNRS

  • White Papers // Sep 2011

    Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

    The paper presents a simple probabilistic analysis of the energy consumption in preamble sampling MAC protocols. The authors validate the analytical results with simulations. They compare the classical MAC protocols (B-MAC and X-MAC) with LA-MAC, a method proposed in a companion paper. Their analysis highlights the energy savings achievable with...

    Provided By CNRS

  • White Papers // Apr 2012

    A Performance Comparison of FBMC Modulation Schemes With Short Perfect Reconstruction Filters

    In this paper, the authors study the performance of Filter Bank based Multi-Carrier (FBMC) transmission systems over doubly-dispersive channels. FBMC generalizes traditional Orthogonal Frequency-Division Multiplexing (OFDM) schemes, allowing a non-rectangular sub-channel pulse shape in the time domain. This approach leads to a better spectral containment that improves interference mitigation in...

    Provided By CNRS