CNRS

Displaying 1-40 of 229 results

  • White Papers // Aug 2014

    Impromptu Deployment of Wireless Relay Networks: Experiences Along a Forest Trail

    The authors are motivated by the problem of impromptu or as-you-go deployment of wireless sensor networks. As an application example, a person, starting from a sink node, walks along a forest trail, makes link quality measurements (with the previously placed nodes) at equally spaced locations, and deploys relays at some...

    Provided By CNRS

  • White Papers // Aug 2014

    A POMDP Solution to Antenna Selection for PER Minimization

    In this paper, the problem of receive Antenna Selection (AS) is considered, in a multiple antenna communication system having a single Radio Frequency (RF) chain at the receiver. The AS is performed on a per-packet basis, and AS decisions are based on noisy estimates of the channel gains obtained using...

    Provided By CNRS

  • White Papers // May 2014

    Large Pages May Be Harmful on NUMA Systems

    Application virtual address space is divided into pages, each requiring a virtual-to-physical translation in the page table and the TLB. Large working sets, common among modern applications, necessitate a lot of translations, which increases memory consumption and leads to high TLB and page fault rates. To address this problem, recent...

    Provided By CNRS

  • White Papers // Apr 2014

    Modeling the Temperature Bias of Power Consumption for Nanometer-Scale CPUs in Application Processors

    The authors introduce and experimentally validate a new macro-level model of the CPU temperature/power relationship within nanometer-scale application processors or system-on-chips. By adopting a holistic view, this model is able to take into account many of the physical effects that occur within such systems. Together with two algorithms described in...

    Provided By CNRS

  • White Papers // Mar 2014

    POSH: Paris OpenSHMEM A High-Performance OpenSHMEM Implementation for Shared Memory Systems

    The drive toward many-core architectures has been tremendous during the last decade. Along with this trend, the community has been searching, investigating and looking for programming models that provide both control on the data locality and flexibility of the data handling. In this paper, the authors present the design and...

    Provided By CNRS

  • White Papers // Mar 2014

    Searching for Sinks of Henon Map Using a Multiple-Precision GPU Arithmetic Library

    Today, GPUs represent an important hardware development platform for many problems in dynamical systems, where massive parallel computations are needed. Besides that, many numerical studies of chaotic dynamical systems require a computing precision higher than common Floating Point (FP) formats. One such application is locating invariant sets for chaotic dynamical...

    Provided By CNRS

  • White Papers // Feb 2014

    Query Processing for SPARQL Federations with Data Replication

    Data replication and deployment of local SPARQL endpoints improve scalability and availability of public SPARQL endpoints, making the consumption of Linked Data a reality. This solution requires synchronization and specific query processing strategies to take advantage of replication. However, existing replication aware techniques in federations of SPARQL endpoints do not...

    Provided By CNRS

  • White Papers // Feb 2014

    Retrospective Spectrum Access Protocol: A Payoff-based Learning Algorithm for Cognitive Radio Networks

    Decentralized Cognitive Radio Networks (CRNs) require efficient channel access protocols to enable cognitive Secondary Users (SUs) to access the primary channels in an opportunistic way without any coordination. In this paper, the authors develop a distributed retrospective spectrum access protocol that can orient the network towards a socially efficient and...

    Provided By CNRS

  • White Papers // Feb 2014

    Revisiting the Learned Clauses Database Reduction Strategies

    In this paper, the authors revisit an important issue of CDCL-based SAT solvers, namely the learned clauses database management policies. Their motivation takes its source from a simple observation on the remarkable performances of both random and size-bounded reduction strategies. They first derive a simple reduction strategy, called Size-Bounded Randomized...

    Provided By CNRS

  • White Papers // Jan 2014

    Control of Multiple Remote Servers for Quality-Fair Delivery of Multimedia Contents

    This paper proposes a control scheme for the quality-fair delivery of several encoded video streams to mobile users sharing a common wireless resource. Video quality fairness, as well as similar delivery delays is targeted among streams. The proposed controller is implemented within some aggregator located near the bottleneck of the...

    Provided By CNRS

  • White Papers // Jan 2014

    Formal Modeling and Evaluation of Stateful Service-based Business Process Elasticity in the Cloud

    Cloud environments are being increasingly used for deploying and executing business processes and particularly Service-based Business Processes (SBPs). One of the expected features of cloud environments is elasticity at different levels. It is obvious that provisioning of elastic platforms is not sufficient to provide elasticity of the deployed business process....

    Provided By CNRS

  • White Papers // Jan 2014

    Timing Analysis of an Embedded Memory: SPSMALL

    In this paper, the authors verify the timing consistency of an embedded memory, named SPSMALL: given a transistor-level description of the memory and its interface specification (a datasheet that specifies the timing constraints to be satisfied by the memory), formally prove that the implementation satisfies the specification. This paper proposes...

    Provided By CNRS

  • White Papers // Jan 2014

    Using CTL Formulae as Component Abstraction in a Design and Verification Flow

    In this paper, the authors take place in the context of hardware modular verification by model checking. Although this latest is not adequate to verify very complex systems, it has been successfully used for medium-sized systems. More precisely, model-checking techniques are well-suited for protocols verification. The verification of global properties...

    Provided By CNRS

  • White Papers // Jan 2014

    A Tool for Automatic Detection of Deadlock in Wormhole Networks on Chip

    Networks-on-Chip (NoC) is a critical part of System-on-Chip (SoC). Indeed, the growing size of SoC including many components requires the use of distributed network. The authors present an extension of Duato's necessary and sufficient condition a routing function must satisfy in order to be deadlock-free, to support environment constraints inducing...

    Provided By CNRS

  • White Papers // Dec 2013

    Multi-Hop Counter Based Data Dissemination Protocol for Communicating Materials

    The communicating material is a new paradigm of Internet of Things. It is designed to perform efficient product control and ensure an information continuum all along the product life cycle. Therefore, storage of life cycle information and data dissemination in communicating materials are very important issues. This paper provides a...

    Provided By CNRS

  • White Papers // Dec 2013

    Privacy Preserving Minimal Observability for Composite Transactional Services

    For complex services composed of many (component) services, logging is an integral middleware aspect, especially for providing transactions and monitoring. In the event of a failure, the log allows one to deduce the cause of failure (diagnosis) and recover by compensating the executed services (atomicity). However, for heterogeneous services with...

    Provided By CNRS

  • White Papers // Dec 2013

    Formally Proved Security of Assembly Code Against Power Analysis

    In the authors keynote speech at CHES 2004, kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. This failure is due to the fact that...

    Provided By CNRS

  • White Papers // Nov 2013

    On the Semantics of Object-Oriented Data Structures and Path Expressions

    UML/OCL is perceived as the de-facto standard for specifying object-oriented models in general and data models in particular. Since recently, all data types of UML/OCL comprise two different exception elements: invalid (\"Bottom\" in semantics terminology) and null (for \"Non-existing element\"). This paper has far-reaching consequences on both the logical and...

    Provided By CNRS

  • White Papers // Nov 2013

    Tackling Real-Time Signal Processing Applications on Shared Memory Multicore Architectures Using XPU

    General-purpose shared memory multi-core architectures are becoming widely available. They are likely to stand as attractive alternatives to more specialized processing architectures such as FPGA and DSP-based platforms to perform real-time digital signal processing. In this paper, the authors show how they can ease parallelism expression on shared memory multi-core...

    Provided By CNRS

  • White Papers // Nov 2013

    Efficient Multi-GPU Algorithm for All-Pairs Shortest Paths

    The shortest-path problem is a fundamental computer science problem with applications in diverse areas such as transportation, robotics, network routing, and VLSI design. The problem is to find paths of minimum weight between pairs of nodes in edge-weighted graphs, where the weight of a path p is defined as the...

    Provided By CNRS

  • White Papers // Nov 2013

    A Survey of RDB to RDF Translation Approaches and Tools

    Relational databases scattered over the web are generally opaque to regular web crawling tools. To address this concern, many RDB-to-RDF approaches have been proposed over the last years. In this paper, the authors propose a detailed review of RDB-to-RDF methods and tools, considering end-to-end projects that delivered operational tools. The...

    Provided By CNRS

  • White Papers // Oct 2013

    A Geometrical Approach for Power Optimization in Relay-Based Cellular Networks

    Relays are considered as a feasible way to increase coverage and capacity of cellular networks. However, optimization of relay-enhanced networks is still a matter of research. This paper proposes a simple geometrical approach to derive the optimal long-term relay downlink transmit power with the aim of maximizing the average spectral...

    Provided By CNRS

  • White Papers // Oct 2013

    On the Validity of Flow-level TCP Network Models for Grid and Cloud Simulations

    Researchers in the area of grid/cloud computing perform many of their experiments using simulations that must capture network behavior. In this context, packet-level simulations, which are widely used to study network protocols, are too costly given the typical large scales of simulated systems and applications. An alternative is to implement...

    Provided By CNRS

  • White Papers // Oct 2013

    Embedded Data on Intelligent Products - Impact on Real-Time Applications

    New challenges and opportunities arise with the Internet of Things (IoT), making it possible to link any objects of the real world with the virtual one. In recent years, IoT has become increasingly popular in industrial applications (e.g. for the inclusion of data related to the product history). It might...

    Provided By CNRS

  • White Papers // Sep 2013

    Fact Checking and Analyzing the Web

    Tools for authoring electronic content and sharing it through the Internet are very widely adopted by now. First blogs, and then social networks, grew more or less in parallel with the major media providers' move towards allowing users to record their opinions next to the papers. These technical means to...

    Provided By CNRS

  • White Papers // Sep 2013

    Leveraging Ontologies upon a Holistic Privacy-aware Access Control Model

    Access control is a crucial concept in both ICT security and privacy, providing for the protection of system resources and personal data. The increasing complexity of nowadays systems has led to a vast family of solutions fostering comprehensive access control models, with the ability to capture a variety of parameters...

    Provided By CNRS

  • White Papers // Sep 2013

    Query Rewriting for Rule Mining in Databases

    Promoting declarative approaches in data mining is a long standing theme. This paper goes into this direction by proposing a well-founded logical query language, SafeRL, allowing the expression of a wide variety of \"Rules\" to be discovered against the data. SafeRL extends and generalizes functional dependencies in databases to new...

    Provided By CNRS

  • White Papers // Sep 2013

    Visual Analysis of Complex Networks for Business Intelligence with Gephi

    The recent availability of a vast amount of data from Online Social Networks (OSN) and from the Web has opened promising perspectives for the field of Business Intelligence (BI), in particular for the monitoring of brand e-reputation and for the management of customer relationships. Platforms which combine data mining algorithms...

    Provided By CNRS

  • White Papers // Jul 2013

    Pre- and Post-Scheduling Memory Allocation Strategies on MPSoCs

    In this paper, the authors introduce and assesses a new method to allocate memory for applications implemented on a shared memory Multi-Processor System-on-Chip (MPSoC). This method first consists of deriving, from a Synchronous Data-Flow (SDF) algorithm description, a Memory Exclusion Graph (MEG) that models all the memory objects of the...

    Provided By CNRS

  • White Papers // Jul 2013

    Towards a Secure Identity Management in Smartphone Environments

    Mobile network operators are providing identification and authentication means to their subscribers through SIM-cards. IDentity Management (IDM) is a hot topic today for mobile network operators and service providers, especially when the terminal is a Smartphone. This paper addresses the encountered security issues of Smartphone's to support identity management. Then...

    Provided By CNRS

  • White Papers // Jul 2013

    Deduction Soundness: Prove One, Get Five for Free

    Most computational soundness theorems deal with a limited number of primitives, thereby limiting their applicability. The notion of deduction soundness of cortier and warinschi (CCS'11) aims to facilitate soundness theorems for richer frameworks via composition results: deduction soundness extends, generically, with asymmetric encryption and public data structures. Unfortunately, that paper...

    Provided By CNRS

  • White Papers // Jul 2013

    Scheduling Analysis from Architectural Models of Embedded Multi-Processor Systems

    As embedded systems need more and more computing power, many products require hardware platforms based on multiple processors. In case of real-time constrained systems, the use of scheduling analysis tools is mandatory to validate the design choices, and to better use the processing capacity of the system. To this end,...

    Provided By CNRS

  • White Papers // Jul 2013

    An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies

    As network attacks become more complex, defence strategies must provide means to handle more flexible and dynamic requirements. The Multiprotocol Label Switching (MPLS) standard is a promising method to properly handle suspicious flows participating in such network attacks. Tasks such as alert data extraction, and MPLS routers configuration present an...

    Provided By CNRS

  • White Papers // Jul 2013

    Surveying Collaborative and Content Management Platforms for Enterprise

    The continuous increasing of the information quantity in enterprises encourages the adoption of an Enterprise Content Management (ECM) that evolves as an integrated approach to information management. By observing the trend toward adoption of Web based collaboration tools in the enterprise, the authors focus, in this paper, on ECM platforms...

    Provided By CNRS

  • White Papers // Jul 2013

    Security for Future Networks : a Prospective Study of AAIs

    The future internet will rely heavily on virtualization and cloud networking. The project security for future networks proposes the design of a framework providing secure identification and authentication, secure data transfer and secure virtualized infrastructure. In this paper, the authors present a comparative study should examine some models and frameworks...

    Provided By CNRS

  • White Papers // Jun 2013

    Fast and Efficient FPGA Implementation of Connected Operators

    The Connected Component Tree (CCT)-based operators play a central role in the development of new algorithms related to image processing applications such as pattern recognition, video-surveillance or motion extraction. The CCT construction, being a time consuming task (about 80% of the application time), these applications remain far-off mobile embedded systems....

    Provided By CNRS

  • White Papers // Jun 2013

    Blind Calibration in Compressed Sensing Using Message Passing Algorithms

    In this paper the authors study the so-called blind calibration, i.e. when the training signals that are available to perform the calibration are sparse but unknown. They extend the Approximate Message Passing (AMP) algorithm used in CS to the case of blind calibration. In the calibration-AMP, both the gains on...

    Provided By CNRS

  • White Papers // Jun 2013

    Knowledge Harvesting For Business Intelligence

    Over the past few years and with the continuous and rapid growth of information volume, information access and knowledge management, in the enterprises and on the web have become challenging. With the growth rate of information volume, information access and knowledge management in enterprises has become challenging. This paper aims...

    Provided By CNRS

  • White Papers // Jun 2013

    Symmetry Breaking for Multi-Criteria Mapping and Scheduling on Multicores

    Multiprocessor mapping and scheduling is a long-old difficult problem. In this paper the authors propose a new methodology to perform mapping and scheduling along with buffer memory optimization using an SMT solver. They target split-join graphs, a formalism inspired by Synchronous Data-Flow (SDF) which provides a compact symbolic representation of...

    Provided By CNRS

  • White Papers // May 2013

    PiMM: Parameterized and Interfaced Dataflow Meta-Model for MPSoCs Runtime Reconfiguration

    Dataflow models of computation are widely used for the specification, analysis, and optimization of Digital Signal Processing (DSP) applications. In this paper, a new meta-model called PiMM is introduced to address the important challenge of managing dynamics in DSP-oriented representations. PiMM extends a dataflow model by introducing an explicit parameter...

    Provided By CNRS

  • White Papers // Sep 2011

    Energy Evaluation of Preamble Sampling MAC Protocols for Wireless Sensor Networks

    The paper presents a simple probabilistic analysis of the energy consumption in preamble sampling MAC protocols. The authors validate the analytical results with simulations. They compare the classical MAC protocols (B-MAC and X-MAC) with LA-MAC, a method proposed in a companion paper. Their analysis highlights the energy savings achievable with...

    Provided By CNRS

  • White Papers // Mar 2012

    Achieving Small World Properties Using Bio-Inspired Techniques in Wireless Networks

    It is highly desirable and challenging for a wireless ad hoc network to have self-organization properties in order to achieve network wide characteristics. Studies have shown that Small World properties, primarily low average path length and high clustering coefficient, are desired properties for networks in general. However, due to the...

    Provided By CNRS

  • White Papers // Mar 2012

    Diversity, Coding, and Multiplexing Trade - Off of Network - Coded Cooperative Wireless Networks

    In this paper, the authors study the performance of network - coded cooperative diversity systems with practical communication constraints. More specifically, they investigate the interplay between diversity, coding, and multiplexing gain when the relay nodes do not act as dedicated repeaters, which only forward data packets transmitted by the sources,...

    Provided By CNRS

  • White Papers // Mar 2012

    A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Motivated by the benefits of small world networks, the authors propose a self-organization framework for wireless ad hoc networks. They investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, they identify crucial design issues for algorithm design....

    Provided By CNRS

  • White Papers // Dec 2009

    Typing Rule-Based Transformations Over Topological Collections

    Pattern-matching programming is an example of a rule-based programming style developed in functional languages. This programming style is intensively used in dialects of ML but is restricted to algebraic data-types. This restriction limits the field of application. However, as shown at RULE'02, case-based function definitions can be extended to more...

    Provided By CNRS

  • White Papers // Apr 2012

    A Performance Comparison of FBMC Modulation Schemes With Short Perfect Reconstruction Filters

    In this paper, the authors study the performance of Filter Bank based Multi-Carrier (FBMC) transmission systems over doubly-dispersive channels. FBMC generalizes traditional Orthogonal Frequency-Division Multiplexing (OFDM) schemes, allowing a non-rectangular sub-channel pulse shape in the time domain. This approach leads to a better spectral containment that improves interference mitigation in...

    Provided By CNRS

  • White Papers // Oct 2009

    Effect of Packet Loss on the Quality of Control of a Networked-Mobile Robot

    This paper describes a wireless network based control of a Khepera mobile robot moving in a WLAN distributed infrastructure. Due to the dependence of Quality of Control (QoC) over network Quality of Service (QoS), a simulation is performed for packet losses and compared to actual results in the lab environment....

    Provided By CNRS

  • White Papers // Feb 2012

    Push-and-Track: Saving Infrastructure Bandwidth Through Opportunistic Forwarding

    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. At the same time, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, the authors propose Push-and-track, a content dissemination framework that harnesses...

    Provided By CNRS

  • White Papers // Feb 2012

    Localized Load-Aware Geographic Routing in Wireless Ad Hoc Networks

    Wireless ad hoc networks are collections of wireless nodes (usually battery powered) that communicate with each other using radio frequency without a fixed infrastructure or centralized control. They are reorganized to have great potentials in a broad range of applications in disaster relief, conference, and battlefield environments, for example. One...

    Provided By CNRS

  • White Papers // Dec 2010

    Improving Clustering Techniques in Wireless Sensor Networks Using Thinning Process

    The authors propose a rapid cluster formation algorithm using a thinning technique : rC-MHP(rapid Clustering inspired from Matern Hard-Core Process). In order to prove its performance, it is compared with a well known cluster formation heuristic: Max-Min. Experimental results show that rC-MHP outperforms Max-Min in terms of messages needed to...

    Provided By CNRS

  • White Papers // Sep 2010

    A Multi-Level Hierarchical Game-Theoretical Approach for Cognitive Networks

    Over the past decade, more and more research works have been devoted to study decentralized or distributed wireless networks. There are many relevant concepts such as cognitive radio, unlicensed bands, ad hoc networks, scalable resource allocation and control policies, which play an important role in this development. In this paper,...

    Provided By CNRS

  • White Papers // Sep 2010

    Joint Power Control-Allocation for Green Cognitive Wireless Networks Using Mean Field Theory

    The purpose of this paper is to show how key concepts from control theory, game theory, and mean field theory can be exploited to design joint control-allocation policies in cognitive wireless networks. One of the key features of the proposed approach is that transmitters (which are assumed to be cognitive...

    Provided By CNRS

  • White Papers // Feb 2012

    Semidefinite Characterisation of Invariant Measures for One-Dimensional Discrete Dynamical Systems

    Using recent results on measure theory and algebraic geometry, the authors show how semi-definite programming can be used to construct invariant measures of one-dimensional discrete dynamical systems (iterated maps on a real interval). In particular they show that both discrete measures (corresponding to finite cycles) and continuous measures (corresponding to...

    Provided By CNRS

  • White Papers // Sep 2012

    An Efficient Hierarchical Dual Cache System for NAND Flash Memories

    NAND flash memories are the most important storage media in mobile computing and tend to be less confined to this area. Nevertheless, it is not mature enough to allow a widespread use. This is due to poor write operations' performance caused by its internal intricacies. The major constraint of such...

    Provided By CNRS

  • White Papers // Sep 2012

    Mapping SPARQL Query to Temporal Logic Query Based on N?SMV Model Checker to Query Semantic Graphs

    The RDF (W3C standard for meta-modeling) language is the most frequently used to represent the semantic graphs. This conversion aims checking the semantic graphs that have numerous errors of interpretation with the model checker NSMV in order to verify the consistency of the data. The SPARQL query language is the...

    Provided By CNRS

  • White Papers // Jan 2010

    Cluster-Tree Based Energy Efficient Protocol for Wireless Sensor Networks

    Wireless sensor networks are conceived to monitor a certain application or physical phenomena and are supposed to function for several years without any human intervention for maintenance. Thus, the main issue in sensor networks is often to extend the lifetime of the network by reducing energy consumption. When the network...

    Provided By CNRS

  • White Papers // Dec 2011

    Probe and Pray: Using UPnP for Home Network Measurements

    Network measurement practitioners increasingly focus their interest on understanding and debugging home networks. The Universal Plug and Play (UPnP) technology holds promise as a highly efficient way to collect and leverage measurement data and configuration settings available from UPnP-enabled devices found in home networks. Unfortunately, UPnP proves less available and...

    Provided By CNRS

  • White Papers // May 2012

    Computer-Assisted Machine-to-Human Protocols for Authentication of a RAM-Based Embedded System

    Mobile readers used for optical identification of manufactured products can be tampered in different ways: with hardware Trojan or by powering up with fake configuration data. How a human verifier can authenticate the reader to be handled for goods verification ? In this paper, two cryptographic protocols are proposed to...

    Provided By CNRS

  • White Papers // Aug 2012

    System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan Insertion

    The Reverse-Engineering (RE) is a real threat on high-value electronic circuits. Many unitary solutions have been proposed to make RE difficult. Most of them are low-level, and thus costly to design and to implement. In this paper, the authors investigate alternative solutions that attempt to deny the possibility of RE...

    Provided By CNRS

  • White Papers // May 2012

    Energy-Efficient Data Collection in WSN: A Sink-Oriented Dynamic Backbone

    In wireless sensor networks, energy efficiency is generally achieved by turning off some capabilities from a subset of deployed sensors. The set of active nodes must therefore meet the application requirements (e.g. area coverage and data redundancy) while remaining fully connected to allow further data collection. Here, the authors focus...

    Provided By CNRS

  • White Papers // May 2012

    Non-Parametric Multiple-Antenna Blind Spectrum Sensing by Predicted Eigenvalue Threshold

    In this paper, the authors consider the problem of sensing a primary user in a cognitive radio network by employing multiple antennas at the secondary user. Among the many spectrum sensing methods, the Predicted Eigen-value Threshold (PET) based method is a promising non-parametric blind method that can reliably detect the...

    Provided By CNRS

  • White Papers // Jan 2013

    A New Class of Hash-Chain Based Key Pre-Distribution Schemes for WSN

    In the last decade, the authors witness a proliferation of potential application domains of Wireless Sensor Networks (WSN). Therefore, a host of research works have been conducted by both academic and industrial communities. Nevertheless, given the sensitivity of the potential applications that are generally tightly related to the physical world...

    Provided By CNRS

  • White Papers // Jan 2013

    Optimal Design of Virtual Links in AFDX Networks

    The Avionics Full Duplex Switched Ethernet (AFDX) backbone constitutes one of the major technological breakthroughs in modern avionic architectures. This network is based on routing Ethernet frames through isolated data tunnels referred to as Virtual Links (VL). VLs can be thought of as multicast trees, each serving for data transmission...

    Provided By CNRS

  • White Papers // Feb 2013

    The Strength of Vicinity Annexation in Opportunistic Networking

    Most disruption-tolerant networking protocols available have focused on mere contact and inter-contact characteristics to make forwarding decisions. The authors propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. They investigate how the vicinity of a node evolves through time...

    Provided By CNRS

  • White Papers // Mar 2013

    Optimizing QoS InWireless Sensors Networks Using a Caching Platform

    This paper addresses monitoring and surveillance applications using Wireless Sensors Networks (WSNs). In this context, several remote clients are interested in receiving the information collected by the nodes of a WSN. As WSN devices are most of the time constrained in energy and processing, the authors present a caching architecture...

    Provided By CNRS

  • White Papers // Oct 2012

    Efficient Compilation of .NET Programs for Embedded Systems

    Compiling under the Closed-World Assumption (CWA) has been shown to be an appropriate way for implementing object-oriented languages such as Java on low-end embedded systems. In this paper, the authors explore the implications of using whole program optimizations such as Rapid Type Analysis (RTA) and coloring on programs targeting the...

    Provided By CNRS

  • White Papers // Feb 2012

    Enabling Sleep Mode in Backbone IP-Networks: A Criticality-Driven Tradeoff

    The energy consumption of network devices, and, as a consequence, of communication networks, is generally independent from their level of utilization, which results in a waste of energy when the network is lightly loaded. Ideally the consumption of a network should be proportional to the amount of traffic it conveys....

    Provided By CNRS

  • White Papers // May 2012

    A Self-Regulating Protocol for Efficient Routing in Mobile Delay Tolerant Networks

    In this paper, the authors present a novel routing protocol for mobile delay tolerant networks, called Community-based Adaptive Spray (CAS). How to maximize routing performance (delivery ratio) and minimize resource consumption (number of message copies) is a common goal in these networks. Their protocol considers the following two aspects toward...

    Provided By CNRS

  • White Papers // Jun 2012

    Implicit Tensor-Mass Solver on the GPU

    The realist and interactive simulation of deformable objects has become a challenge in computer graphics. For this, the tensor-mass model enables local solving of mechanical equations, making it easier to handle local control, like collisions, tool interaction, etc. In this paper, the authors propose the GPU implementation of this model...

    Provided By CNRS

  • White Papers // Mar 2012

    An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks

    In mobile Delay Tolerant Networks (DTNs), messages are routed in a mobility-assisted manner. Therefore, the willingness of nodes to relay messages for other nodes plays a significant role in the routing process. Moreover, since the resources in mobile devices are generally limited, carriers of mobile devices may be unwilling to...

    Provided By CNRS

  • White Papers // Apr 2012

    A Privacy Preserving Prediction-Based Routing Protocol for Mobile Delay Tolerant Networks

    A prediction-based routing protocol for mobile delay tolerant networks works by forwarding a message from one intermediate node to another if the latter has higher probability of encountering the destination node. However, this process compromises the privacy of the nodes by revealing their mobility patterns. In this paper, the authors...

    Provided By CNRS

  • White Papers // Jun 2012

    A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model

    Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from the recipient user. A privacy preserving reputation protocol protects users by hiding their individual feedback and revealing only the reputation score. The authors present a privacy preserving reputation protocol for the malicious adversarial model....

    Provided By CNRS

  • White Papers // Jun 2010

    Simulation of Active Products Cooperation for Active Security Management

    Wireless Sensor Networks (WSNs) are a new paradigm of telecommunication networks. WSNs are designed to perform efficient data collection and environment monitoring, among other applications. This paper presents an approach of modelling and simulation of cooperation between active products that are equipped with a platform of sensor networks and ambient...

    Provided By CNRS

  • White Papers // Sep 2009

    JPEG2000-Based Data Hiding and Its Application to 3D Visualization

    This first decade of twenty-first century is witnessing revolution in the form of memory and network speeds as well as computing efficiencies. Simultaneously, the platform and client diversity base is also expanding, with powerful workstations on one extreme and handheld portable device, like smart-phones on the other. The range of...

    Provided By CNRS

  • White Papers // Apr 2010

    Experimental Measurements of Host Identity Protocol for Mobile Nodes' Networks

    The Internet user nowadays is no longer the same one as decades ago. Recent unprecedented growth of the mobile technology market, devices support for more than one of a myriad of technologies and operators, and the need to communicate from anywhere and at any time are the challenges of nowadays...

    Provided By CNRS

  • White Papers // Oct 2010

    Advanced List Scheduling Heuristic for Task Scheduling With Communication Contention for Parallel Embedded Systems

    Modern embedded systems tend to use multiple cores or processors for processing parallel applications. This paper indeed aims at task scheduling with communication contention for parallel embedded systems and proposes three advanced techniques to improve the list scheduling heuristic. Five groups of node levels (two existing groups and three new...

    Provided By CNRS

  • White Papers // Apr 2011

    Data Collection and Management Solution for Wireless Sensor Networks

    Wireless Sensors Networks (WSN) use can be very interesting in agricultural and environmental data collection. The first WSN generations operated in a continuous data stream mode which generates high energy consumption. This paper presents a new WSN platform that limits data exchanges and has an increased lifetime. All of its...

    Provided By CNRS

  • White Papers // Nov 2009

    Estimating Maximum and Minimum Delays for Wireless Discrete Networked Control Systems

    The automation architecture consists of actuators, sensors, Programmable Logic Controllers (PLC) and monitoring systems. Some research focuses on how to replace the communication between those entities from wired to wireless communication taking in consideration the industrial constraints, given the advantages of this kind of communication. To study the performance of...

    Provided By CNRS

  • White Papers // Nov 2012

    A Hybrid Cross Entropy Algorithm for Solving Dynamic Transit Network Design Problem

    This paper proposes a hybrid multiagent learning algorithm for solving the dynamic simulation-based bi-level network design problem. The objective is to determine the optimal frequency of a multimodal transit network, which minimizes total users' travel cost and operation cost of transit lines. The problem is formulated as a bi-level programming...

    Provided By CNRS

  • White Papers // May 2012

    On the Optimal Scheduling in Pull-Based Real-Time P2P Streaming Systems: Layered and Non-Layered Streaming

    During the last decade, the authors witnessed a rapid growth in deployment of pull-based P2P streaming applications. In these applications, each node selects some other nodes as its neighbors and requests streaming data from them. This scheme allows eliminating data redundancy and recovering from data loss, but it pushes the...

    Provided By CNRS