Universidad Politecnica de Valencia

Displaying 1-40 of 40 results

  • White Papers // Jul 2011

    Resilience-Driven Parameterisation of Ad Hoc Routing Protocols: Olsrd as a Case Study

    Ad hoc routing protocols are threatened by a variety of accidental and malicious faults that limit their use. Although a number of well-known strategies exist to enhance the performance and resilience of such type of protocols, their final effectiveness strongly relies on the usage of appropriate protocol configuration parameters. This...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    An Efficient Dynamic Resource Allocation Algorithm for Packet - Switched Communication Networks Based on Hopfield Neural Excitation Method

    Dynamic Resource Allocation (DRA) algorithms set up different connections over the same resources and perform a scheduling policy to distribute the resources usage. Recently, intelligent DRA techniques based on Hopfield Neural Networks computational methods have been proposed, showing their potential for solving this kind of complex optimization problems. However, the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    Configurable Node Density Generation With Application to Hotspots Modelling

    Mobility models are very relevant mainly when studying the performance of wireless systems by means of computer simulations. The main problem arises when deciding the best mobility model for a particular application. In some cases, it is very important to emulate hotspots or, in general, zones with different user (or...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    Using Performance, Energy Consumption, and Resilience Experimental Measures to Evaluate Routing Protocols for Ad Hoc Networks

    Ad hoc networks are gaining momentum in contexts of use where the rapid deployment of dynamic networks is critical. It is well-known that these networks are threatened by a variety of accidental and malicious faults. Despite this fact, there exist few critical studies quantifying and analyzing the impact of faults...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    A Semantic Layer for Embedded Sensor Networks

    Sensor Networks progressively assumed the critical role of bridges between the real world and information systems, through always more consolidated and efficient sensor technologies that enable advanced heterogeneous sensor grids. Sensor data is commonly used by advanced systems and intelligent applications in order to archive complex goals. Processes that build...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2011

    Coarse-Grained Resilience Benchmarking Using Logic Score of Preferences: Ad Hoc Networks as a Case Study

    Ad hoc networks are self-configuring multi-hop wireless networks whose routing protocols are extremely sensitive to the occurrence of accidental and malicious faults. However, the behaviour exhibited by such protocols varies from one to another. This paper motivates the importance of using resilience benchmarking strategies to evaluate, compare and select the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2011

    On Selecting Representative Faultloads to Guide the Evaluation of Ad Hoc Networks

    Ad hoc networks are threatened by a wide variety of accidental and malicious faults. This fact limits the practical exploitation of ad hoc networks. In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Feb 2011

    Patterns And Barriers For Innovation And R&D Cooperation Between Argentine And Spanish Firms

    This paper examines co-operative innovation and Research and Development (R&D) behaviour between Argentine and Spanish firms. Based on theoretical perspectives from the literature, the authors surveyed a sample of 540 Argentine and Spanish firms believed to have cooperated for technological innovation. They present empirical evidence based on 104 firms of...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Towards Benchmarking Routing Protocols in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) establish a new, quick and low-cost alternative to provide communications when deploying a fixed infrastructure that could result prohibitive in terms of either time or money. During last years, the specification of multi-hop routing protocols for WMNs has been promoted, leading to their recent exploitation in...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Understanding Knowledge Sharing In Organizations: Further Questions Of Research Through A Social Cognitive Perspective

    Enabling knowledge sharing among individuals in organizations is fundamental to innovation and organizational success. Nevertheless, despite receiving great attention among both academics and practitioners, knowledge sharing research is still searching for integrated framework. Recent literature reviews shows that most of the existing research has centered on a macro perspective, attaching...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Assessing the Effectiveness of IEEE 802.11e in Multi-Hop Mobile Network Environments

    The IEEE 802.11e technology is receiving much interest due to the promising enhancements it will offer to wireless local area networks in terms of QoS support. Until now, research has focused on single hop, access point based environments, which are the most common. In this paper, the authors review the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    CLOB: Communication Support for Efficient Replicated Database Recovery

    Replication protocols using an eager update propagation strategy commonly need a reliable broadcast service; i.e., a broadcast primitive with atomic delivery and, in some cases, also with total order. This communication service provides some appropriate features for the recovery tasks, although in some cases this will lead to partial blocking...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    On the Interaction Between IEEE 802.11e and Routing Protocols in Mobile Ad-Hoc Networks

    The upcoming IEEE 802.11e standard was developed to offer QoS capabilities to WLAN, offering significative improvements to multimedia traffic. MANETs will also benefit from this new technology since the most widely deployed and used wireless interfaces are IEEE 802.11 based. In this paper, the authors expose results relative to the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Using Distributed Admission Control to Support Multimedia Applications in MANET Environments

    MANET environments suffer from changing connectivity conditions and radio contention among stations that conform it. Despite the several on-going endeavors, no simple and effective solution has yet been offered that can be easily deployed and cope with real-life environments and restrictions. In this paper, the authors present a distributed admission...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Supporting Soft Real-Time Services in MANETs Using Distributed Admission Control and IEEE 802.11e Technology

    QoS support in MANETs is a hard and challenging task due to the intrinsic complexities of these networks. In this paper, the authors present a solution called DACME to support real-time services in MANETs based on distributed admission control. Using the IEEE 802.11e MAC technology as their basis for traffic...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Dec 2010

    The Overhead of Safe Broadcast Persistency

    Although the need of logging messages in secondary storage once they have been received has been stated in several papers that assumed a recoverable failure model, none of them analyzed the overhead implied by that logging in case of using reliable broadcasts in a group communication system guaranteeing virtual synchrony....

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    Transaction Consistency in the Cloud: Old Paradigms

    Initial distributed and replicated databases used some mechanisms and paradigms that were slowly replaced by new and more efficient techniques that make cluster-based databases successful. Recently, cloud computing environments appeared, demanding database solutions with higher availability and scalability than those offered by cluster-based systems. In this search for proper solutions,...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    Transaction Consistency in the Cloud: Old Paradigms Revisited

    Initial distributed and replicated databases used some mechanisms and paradigms that were slowly replaced by new and more efficient techniques that make cluster-based databases successful. Recently, cloud computing environments appeared, demanding database solutions with higher availability and scalability than those offered by cluster-based systems. In this search for proper solutions,...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Aug 2010

    Attack Injection to Support the Evaluation of Ad Hoc Networks

    The increasing emergence of mobile computing devices seamlessly providing wireless communication capabilities opens a wide range of new application domains for ad hoc networks. However, the sensitivity of ad hoc routing protocols to malicious faults (attacks) limits in practice their confident use in commercial products. This requires not only practical...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jul 2010

    On the Convergence Between Wireless Sensor Network and RFID: Industrial Environment

    The convergence between Wireless Sensor Network and RFID technology enables the development of flexible and integrated architectures that could currently represent a competitive solution for several application scenarios. This paper proposes an advanced heterogeneous wireless network designed for industrial environments: typical sensor applications (personal and environmental parameters monitoring), RFID based...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    A Requirements Engineering Approach for the Development of Multi-Agent Systems

    This paper presents RE4Gaia, which is a requirements modeling approach for the development of multi-agent systems that extend the Gaia methodology. The approach focuses on dealing with the organizational structure as a means to adequately capture and understand required roles and associated functions in the context of an organization prior...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    Secure Communications in Group-Based Wireless Sensor Networks

    Nowadays, Wireless Sensor Networks are a hot research topic in the scientific community. Researchers seek to maximize their autonomy while paying attention to their limited resources, few computing capacity and low energy consumption. Security mechanisms must be deployed in the architecture of almost all Wireless Sensor Networks. Several research papers...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    A New AntTree-Based Algorithm for Clustering Short-Text Corpora

    Research work on "Short-text clustering" is a very important research area due to the current tendency for people to use 'small-language', e.g. blogs, text-messaging and others. In some recent works, new bioinspired clustering algorithms have been proposed to deal with this difficult problem and novel uses of Internal Clustering Validity...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2010

    Key Factors for Attack Injection on MANETs: Towards Enhancing Experiment Representativeness

    Due to their unique characteristics, Mobile Ad hoc NETworks (MANETs) are exposed to different threats. Consequently, their confident use requires of the conception of methodologies to assess their dependability (specially in presence of attacks). Accordingly, the estimation of which factors impact significantly on the behavior of MANETs is an essential...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Dec 2009

    A Survey of Scalability Approaches for Reliable Causal Broadcasts

    Several applications of distributed systems need to be highly scalable. For achieving high availability and fault tolerance, such applications typically replicate their data. Due to the dynamics of growth and volatility of the customer markets of such applications, they need to be hosted by highly scalable and adaptive systems. In...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2009

    Schedulability Analysis and Performance Evaluation of WSAN

    The current trend in the development of Networked Control Systems (NCS) is the use of wireless networks to communicate the system nodes, which have been called Wireless Sensors and Actuators Networks (WSAN). This trend is principally to increase flexibility and reliability of these applications and to reduce the implementation cost....

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2009

    Computer-Aided Design of Substrate Integrated Waveguide Filters for Microwave and Millimeter-Wave Applications

    In this paper, a Computer-Aided Design (CAD) tool of Substrate Integrated Waveguide (SIW) filters for high frequency applications is described. Some synthesis techniques are successfully combined with a fast and accurate full-wave analysis method, thus designing several practical examples of in-line and cross-coupled SIW filters. Prototypes have been manufactured and...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2009

    An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks

    Ad hoc networks constitute a quick and cheap alternative to provide communications when deploying a fixed infrastructure could result prohibitive in terms of either time or money. Although the unique properties of ad hoc networks make them very sensitive to malicious faults (attacks), most of current research has focused on...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2009

    XtratuM: A Hypervisor for Safety Critical Embedded Systems

    XtratuM is a hypervisor designed to meet safety critical requirements. Initially designed for x86 architectures (version 2.0), it has been strongly redesigned for SPARC v8 architecture and especially for the to the LEON2 processor. Current version 2.2 includes all the functionalities required to build safety critical systems based on ARINC...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2009

    Attack Injection for Performance and Dependability Assessment of Ad Hoc Networks

    Ad hoc networks are wireless, self-configuring and self-maintaining networks that allow dispensing of fixed infrastructures by relying on nodes cooperation for providing packet routing. Their confident use claims for the existence of methodologies for assessing their performance and dependability attributes in the presence of malicious faults. Most of the work...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2009

    Towards Benchmarking the Performance and Dependability of Ad Hoc Networks in Presence of Attacks

    Ad hoc networks are multi-hop wireless networks where all nodes cooperatively maintain network connectivity without fixed infrastructures and centralized administration. Many researches have been focused so far on improving the performance, thus widening the application domain, of ad hoc networks. From a dependability viewpoint, these networks exhibit a natural ability...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2009

    Elucidating the Mashup Hype: Definition, Challenges, Methodical Guide and Tools for Mashups

    Mashups are a current hype that is attracting high interest by academia and industry now and in the next years. The idea behind a mashup is to create new content by reusing and combining existing content from heterogeneous sources. Advantages of mashups are that even people with no knowledge of...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2008

    Flexible Real-Time Embedded Architecture for Advanced Service Robots

    In most advanced real-time control applications such as service robots, the tasks have different criticality, flexible timing constraints and variable execution time. For instance, autonomous service robots perform their activities in dynamic environments, share resources and have to cooperate to fulfill their objectives. These changing environmental conditions produce a variability...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2008

    Towards Assessing the Resilience of Ad-Hoc Proactive Routing Protocols Against Dataflow Disruption Attacks

    Ad-hoc networks exploit the processing and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. The dependable use of such networks claims for new methodologies to evaluate their resilience in the presence of faults. This paper studies the impact of data flow disruption attacks on routing...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2008

    Providing Memory QoS Guarantees for Real-Time Applications

    Nowadays, systems often integrate a variety of applications whose service requirements are heterogeneous. Consequently, systems must be able to concurrently serve applications which rely on different constraints. This raises the problem of the dynamic distribution of the system resources (CPU, memory, network, etc.). Therefore, an integrated Quality of Service (QoS)...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Experimentation in Software Engineering: Bridging the Gap Between Educators and Researchers

    Currently, a great number of controlled experiments are being executed to evaluate the effectiveness of methods and/or techniques in academic environments. Most of these experiments have as the main objective to obtain reliable data that provide empirical evidence about the effectiveness of these methods or techniques, often ignoring the educational...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Real-Time Embedded Architecture for Advanced Service Robots

    In most advanced real-time control applications such as service robots, the tasks have different criticality, flexible timing constraints and variable execution time. For instance, autonomous service robots perform their activities in dynamic environments, share resources and have to cooperate to fulfill their objectives. These changing environmental conditions produce a variability...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Predicting Success in the Computer Science Degree Using ROC Analysis

    ROC Curves (Receiver Operating Characteristic) are remarkably useful in medical decision-making. Given a common measurable characteristic, with a continuous output in all the beings of a group, ROC curves determine a threshold on the values of the characteristic, which tries to predict the classification of beings into discrete classes. In...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Black Hole Attack Injection in Ad Hoc Networks

    Ad hoc networks exploit the processing, storage and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. Despite the promises offered by such networks, their industrial exploitation claims for methodologies to assess the level of security provided by resulting solutions. A first step towards that ambitious...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Dec 2010

    The Overhead of Safe Broadcast Persistency

    Although the need of logging messages in secondary storage once they have been received has been stated in several papers that assumed a recoverable failure model, none of them analyzed the overhead implied by that logging in case of using reliable broadcasts in a group communication system guaranteeing virtual synchrony....

    Provided By Universidad Politecnica de Valencia

  • White Papers // Dec 2009

    A Survey of Scalability Approaches for Reliable Causal Broadcasts

    Several applications of distributed systems need to be highly scalable. For achieving high availability and fault tolerance, such applications typically replicate their data. Due to the dynamics of growth and volatility of the customer markets of such applications, they need to be hosted by highly scalable and adaptive systems. In...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    Configurable Node Density Generation With Application to Hotspots Modelling

    Mobility models are very relevant mainly when studying the performance of wireless systems by means of computer simulations. The main problem arises when deciding the best mobility model for a particular application. In some cases, it is very important to emulate hotspots or, in general, zones with different user (or...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    An Efficient Dynamic Resource Allocation Algorithm for Packet - Switched Communication Networks Based on Hopfield Neural Excitation Method

    Dynamic Resource Allocation (DRA) algorithms set up different connections over the same resources and perform a scheduling policy to distribute the resources usage. Recently, intelligent DRA techniques based on Hopfield Neural Networks computational methods have been proposed, showing their potential for solving this kind of complex optimization problems. However, the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2009

    Schedulability Analysis and Performance Evaluation of WSAN

    The current trend in the development of Networked Control Systems (NCS) is the use of wireless networks to communicate the system nodes, which have been called Wireless Sensors and Actuators Networks (WSAN). This trend is principally to increase flexibility and reliability of these applications and to reduce the implementation cost....

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2009

    Computer-Aided Design of Substrate Integrated Waveguide Filters for Microwave and Millimeter-Wave Applications

    In this paper, a Computer-Aided Design (CAD) tool of Substrate Integrated Waveguide (SIW) filters for high frequency applications is described. Some synthesis techniques are successfully combined with a fast and accurate full-wave analysis method, thus designing several practical examples of in-line and cross-coupled SIW filters. Prototypes have been manufactured and...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2008

    Towards Assessing the Resilience of Ad-Hoc Proactive Routing Protocols Against Dataflow Disruption Attacks

    Ad-hoc networks exploit the processing and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. The dependable use of such networks claims for new methodologies to evaluate their resilience in the presence of faults. This paper studies the impact of data flow disruption attacks on routing...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2008

    Providing Memory QoS Guarantees for Real-Time Applications

    Nowadays, systems often integrate a variety of applications whose service requirements are heterogeneous. Consequently, systems must be able to concurrently serve applications which rely on different constraints. This raises the problem of the dynamic distribution of the system resources (CPU, memory, network, etc.). Therefore, an integrated Quality of Service (QoS)...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Black Hole Attack Injection in Ad Hoc Networks

    Ad hoc networks exploit the processing, storage and wireless communication capabilities of mobile devices to create spontaneous and low-cost self-configuring networks. Despite the promises offered by such networks, their industrial exploitation claims for methodologies to assess the level of security provided by resulting solutions. A first step towards that ambitious...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Feb 2011

    Patterns And Barriers For Innovation And R&D Cooperation Between Argentine And Spanish Firms

    This paper examines co-operative innovation and Research and Development (R&D) behaviour between Argentine and Spanish firms. Based on theoretical perspectives from the literature, the authors surveyed a sample of 540 Argentine and Spanish firms believed to have cooperated for technological innovation. They present empirical evidence based on 104 firms of...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Understanding Knowledge Sharing In Organizations: Further Questions Of Research Through A Social Cognitive Perspective

    Enabling knowledge sharing among individuals in organizations is fundamental to innovation and organizational success. Nevertheless, despite receiving great attention among both academics and practitioners, knowledge sharing research is still searching for integrated framework. Recent literature reviews shows that most of the existing research has centered on a macro perspective, attaching...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2009

    XtratuM: A Hypervisor for Safety Critical Embedded Systems

    XtratuM is a hypervisor designed to meet safety critical requirements. Initially designed for x86 architectures (version 2.0), it has been strongly redesigned for SPARC v8 architecture and especially for the to the LEON2 processor. Current version 2.2 includes all the functionalities required to build safety critical systems based on ARINC...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Real-Time Embedded Architecture for Advanced Service Robots

    In most advanced real-time control applications such as service robots, the tasks have different criticality, flexible timing constraints and variable execution time. For instance, autonomous service robots perform their activities in dynamic environments, share resources and have to cooperate to fulfill their objectives. These changing environmental conditions produce a variability...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Predicting Success in the Computer Science Degree Using ROC Analysis

    ROC Curves (Receiver Operating Characteristic) are remarkably useful in medical decision-making. Given a common measurable characteristic, with a continuous output in all the beings of a group, ROC curves determine a threshold on the values of the characteristic, which tries to predict the classification of beings into discrete classes. In...

    Provided By Universidad Politecnica de Valencia

  • White Papers // May 2008

    Experimentation in Software Engineering: Bridging the Gap Between Educators and Researchers

    Currently, a great number of controlled experiments are being executed to evaluate the effectiveness of methods and/or techniques in academic environments. Most of these experiments have as the main objective to obtain reliable data that provide empirical evidence about the effectiveness of these methods or techniques, often ignoring the educational...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    A Requirements Engineering Approach for the Development of Multi-Agent Systems

    This paper presents RE4Gaia, which is a requirements modeling approach for the development of multi-agent systems that extend the Gaia methodology. The approach focuses on dealing with the organizational structure as a means to adequately capture and understand required roles and associated functions in the context of an organization prior...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Oct 2008

    Flexible Real-Time Embedded Architecture for Advanced Service Robots

    In most advanced real-time control applications such as service robots, the tasks have different criticality, flexible timing constraints and variable execution time. For instance, autonomous service robots perform their activities in dynamic environments, share resources and have to cooperate to fulfill their objectives. These changing environmental conditions produce a variability...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jul 2010

    On the Convergence Between Wireless Sensor Network and RFID: Industrial Environment

    The convergence between Wireless Sensor Network and RFID technology enables the development of flexible and integrated architectures that could currently represent a competitive solution for several application scenarios. This paper proposes an advanced heterogeneous wireless network designed for industrial environments: typical sensor applications (personal and environmental parameters monitoring), RFID based...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2011

    Coarse-Grained Resilience Benchmarking Using Logic Score of Preferences: Ad Hoc Networks as a Case Study

    Ad hoc networks are self-configuring multi-hop wireless networks whose routing protocols are extremely sensitive to the occurrence of accidental and malicious faults. However, the behaviour exhibited by such protocols varies from one to another. This paper motivates the importance of using resilience benchmarking strategies to evaluate, compare and select the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Assessing the Effectiveness of IEEE 802.11e in Multi-Hop Mobile Network Environments

    The IEEE 802.11e technology is receiving much interest due to the promising enhancements it will offer to wireless local area networks in terms of QoS support. Until now, research has focused on single hop, access point based environments, which are the most common. In this paper, the authors review the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2009

    Attack Injection for Performance and Dependability Assessment of Ad Hoc Networks

    Ad hoc networks are wireless, self-configuring and self-maintaining networks that allow dispensing of fixed infrastructures by relying on nodes cooperation for providing packet routing. Their confident use claims for the existence of methodologies for assessing their performance and dependability attributes in the presence of malicious faults. Most of the work...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2009

    An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks

    Ad hoc networks constitute a quick and cheap alternative to provide communications when deploying a fixed infrastructure could result prohibitive in terms of either time or money. Although the unique properties of ad hoc networks make them very sensitive to malicious faults (attacks), most of current research has focused on...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    Transaction Consistency in the Cloud: Old Paradigms

    Initial distributed and replicated databases used some mechanisms and paradigms that were slowly replaced by new and more efficient techniques that make cluster-based databases successful. Recently, cloud computing environments appeared, demanding database solutions with higher availability and scalability than those offered by cluster-based systems. In this search for proper solutions,...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    CLOB: Communication Support for Efficient Replicated Database Recovery

    Replication protocols using an eager update propagation strategy commonly need a reliable broadcast service; i.e., a broadcast primitive with atomic delivery and, in some cases, also with total order. This communication service provides some appropriate features for the recovery tasks, although in some cases this will lead to partial blocking...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    A Semantic Layer for Embedded Sensor Networks

    Sensor Networks progressively assumed the critical role of bridges between the real world and information systems, through always more consolidated and efficient sensor technologies that enable advanced heterogeneous sensor grids. Sensor data is commonly used by advanced systems and intelligent applications in order to archive complex goals. Processes that build...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    Secure Communications in Group-Based Wireless Sensor Networks

    Nowadays, Wireless Sensor Networks are a hot research topic in the scientific community. Researchers seek to maximize their autonomy while paying attention to their limited resources, few computing capacity and low energy consumption. Security mechanisms must be deployed in the architecture of almost all Wireless Sensor Networks. Several research papers...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2010

    A New AntTree-Based Algorithm for Clustering Short-Text Corpora

    Research work on "Short-text clustering" is a very important research area due to the current tendency for people to use 'small-language', e.g. blogs, text-messaging and others. In some recent works, new bioinspired clustering algorithms have been proposed to deal with this difficult problem and novel uses of Internal Clustering Validity...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2009

    Elucidating the Mashup Hype: Definition, Challenges, Methodical Guide and Tools for Mashups

    Mashups are a current hype that is attracting high interest by academia and industry now and in the next years. The idea behind a mashup is to create new content by reusing and combining existing content from heterogeneous sources. Advantages of mashups are that even people with no knowledge of...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Sep 2010

    Transaction Consistency in the Cloud: Old Paradigms Revisited

    Initial distributed and replicated databases used some mechanisms and paradigms that were slowly replaced by new and more efficient techniques that make cluster-based databases successful. Recently, cloud computing environments appeared, demanding database solutions with higher availability and scalability than those offered by cluster-based systems. In this search for proper solutions,...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    On the Interaction Between IEEE 802.11e and Routing Protocols in Mobile Ad-Hoc Networks

    The upcoming IEEE 802.11e standard was developed to offer QoS capabilities to WLAN, offering significative improvements to multimedia traffic. MANETs will also benefit from this new technology since the most widely deployed and used wireless interfaces are IEEE 802.11 based. In this paper, the authors expose results relative to the...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Using Distributed Admission Control to Support Multimedia Applications in MANET Environments

    MANET environments suffer from changing connectivity conditions and radio contention among stations that conform it. Despite the several on-going endeavors, no simple and effective solution has yet been offered that can be easily deployed and cope with real-life environments and restrictions. In this paper, the authors present a distributed admission...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Supporting Soft Real-Time Services in MANETs Using Distributed Admission Control and IEEE 802.11e Technology

    QoS support in MANETs is a hard and challenging task due to the intrinsic complexities of these networks. In this paper, the authors present a solution called DACME to support real-time services in MANETs based on distributed admission control. Using the IEEE 802.11e MAC technology as their basis for traffic...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jan 2011

    Towards Benchmarking Routing Protocols in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) establish a new, quick and low-cost alternative to provide communications when deploying a fixed infrastructure that could result prohibitive in terms of either time or money. During last years, the specification of multi-hop routing protocols for WMNs has been promoted, leading to their recent exploitation in...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2011

    On Selecting Representative Faultloads to Guide the Evaluation of Ad Hoc Networks

    Ad hoc networks are threatened by a wide variety of accidental and malicious faults. This fact limits the practical exploitation of ad hoc networks. In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jun 2011

    Using Performance, Energy Consumption, and Resilience Experimental Measures to Evaluate Routing Protocols for Ad Hoc Networks

    Ad hoc networks are gaining momentum in contexts of use where the rapid deployment of dynamic networks is critical. It is well-known that these networks are threatened by a variety of accidental and malicious faults. Despite this fact, there exist few critical studies quantifying and analyzing the impact of faults...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Aug 2010

    Attack Injection to Support the Evaluation of Ad Hoc Networks

    The increasing emergence of mobile computing devices seamlessly providing wireless communication capabilities opens a wide range of new application domains for ad hoc networks. However, the sensitivity of ad hoc routing protocols to malicious faults (attacks) limits in practice their confident use in commercial products. This requires not only practical...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Jul 2011

    Resilience-Driven Parameterisation of Ad Hoc Routing Protocols: Olsrd as a Case Study

    Ad hoc routing protocols are threatened by a variety of accidental and malicious faults that limit their use. Although a number of well-known strategies exist to enhance the performance and resilience of such type of protocols, their final effectiveness strongly relies on the usage of appropriate protocol configuration parameters. This...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Mar 2010

    Key Factors for Attack Injection on MANETs: Towards Enhancing Experiment Representativeness

    Due to their unique characteristics, Mobile Ad hoc NETworks (MANETs) are exposed to different threats. Consequently, their confident use requires of the conception of methodologies to assess their dependability (specially in presence of attacks). Accordingly, the estimation of which factors impact significantly on the behavior of MANETs is an essential...

    Provided By Universidad Politecnica de Valencia

  • White Papers // Apr 2009

    Towards Benchmarking the Performance and Dependability of Ad Hoc Networks in Presence of Attacks

    Ad hoc networks are multi-hop wireless networks where all nodes cooperatively maintain network connectivity without fixed infrastructures and centralized administration. Many researches have been focused so far on improving the performance, thus widening the application domain, of ad hoc networks. From a dependability viewpoint, these networks exhibit a natural ability...

    Provided By Universidad Politecnica de Valencia