University of Trento

Displaying 1-40 of 45 results

  • White Papers // Aug 2012

    CrowdER: Crowdsourcing Entity Resolution

    In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution...

    Provided By University of Trento

  • White Papers // Apr 2012

    Towards Business Processes Orchestrating the Physical Enterprise With Wireless Sensor Networks

    The industrial adoption of Wireless Sensor Networks (WSNs) is hampered by two main factors. First, there is a lack of integration of WSNs with business process modeling languages and back-ends. Second, programming WSNs is still challenging as it is mainly performed at the operating system level. To this end, the...

    Provided By University of Trento

  • White Papers // Apr 2012

    Adaptive Workflow Management in the Cloud - Towards a Novel Platform as a Service

    In this paper, a novel workflow platform as a service is presented. The paper describes how existing components of adaptive workflow technology are integrated and extended towards a cloud platform on which individual users as well as small business enterprises may model, execute and adapt workflows without the need to...

    Provided By University of Trento

  • White Papers // Feb 2012

    What Does Model-Driven Data Acquisition Really Achieve in Wireless Sensor Networks?

    Model-driven data acquisition techniques aim at reducing the amount of data reported, and therefore the energy consumed, in Wireless Sensor Networks (WSNs). At each node, a model predicts the sampled data; when the latter deviate from the current model, a new model is generated and sent to the data sink....

    Provided By University of Trento

  • White Papers // Jan 2012

    Time-Driven Switching Blocking Analysis: A Single Node Case

    This paper presents a closed-form time-domain analysis of the blocking probability of Time-Driven Switching (TDS) for the single node case. In this work blocking is defined as the occurrence in which transmission resources are available in both inlet and outlet, but there is no schedule. The main constraints for finding...

    Provided By University of Trento

  • White Papers // Dec 2011

    Privacy in the Pervasive Era: A Distributed Firewall Approach

    This paper presents a novel protocol for the support of audio/video streaming in a vehicular network. The protocol is based on localization and timing, both of them obtained via satellite positioning. Transmissions are coordinated to entirely avoid collisions. The protocol is evaluated using an innovative semi-analytic technique based on stochastic...

    Provided By University of Trento

  • White Papers // Aug 2011

    Composition Theorems without Pre-Established Session Identifiers

    Canetti's universal composition theorem and the joint state composition theorems are useful and widely employed tools for the modular design and analysis of cryptographic protocols. However, these theorems assume that parties participating in a protocol session have pre-established a unique Session ID (SID). While the use of such SIDs is...

    Provided By University of Trento

  • White Papers // Jul 2011

    Cloudy Weather for P2P, With a Chance of Gossip

    Peer-To-Peer (P2P) and cloud computing, two of the Internet trends of the last decade, hold similar promises: the (virtually) infinite availability of computing and storage resources. But there are important differences: the cloud provides highly-available resources, but at a cost; P2P resources are for free, but their availability is shaky....

    Provided By University of Trento

  • White Papers // May 2011

    Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study

    In this paper, the authors present new insights into central properties of voting systems, namely verifiability, privacy, and coercion-resistance. They demonstrate that the combinations of the two forms of verifiability considered in the literature - individual and universal verifiability - are, unlike commonly believed, insufficient to guarantee overall verifiability. They...

    Provided By University of Trento

  • White Papers // May 2011

    Group Monitoring in Mobile Wireless Sensor Networks

    The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of livestock, the care giving to people that are not self-sufficient. Human- or animal-borne wireless devices can be used to detect the joining...

    Provided By University of Trento

  • White Papers // May 2011

    Towards the Integration of Knowledge Organization Systems With the Linked Data Cloud

    In representing the shared view of all the people involved, building a Knowledge Organization System (KOS) from scratch is extremely costly, and it is therefore fundamental to reuse existing resources. This can be done by progressively extending the KOS with knowledge coming from similar KOS and by promoting interoperability among...

    Provided By University of Trento

  • White Papers // Jan 2011

    Supporting Publication and Subscription Confidentiality in Pub/Sub Networks

    The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to interested applications through a network of brokers. Subscriber applications express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being...

    Provided By University of Trento

  • White Papers // Jan 2011

    Planning and Monitoring Web Service Composition

    The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, and maintenance of complex services. This paper exploits techniques based on the "Planning as Model Checking" approach to automatically compose web services and synthesize...

    Provided By University of Trento

  • White Papers // Jan 2011

    Clean Answers Over Dirty Databases: A Probabilistic Approach

    The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such tuples, the merging or elimination of duplicates can be a difficult task that relies on ad-hoc and often manual solutions. The authors propose...

    Provided By University of Trento

  • White Papers // Jan 2011

    Managing Wireless HotSpots: The Unify Approach

    This paper presents and discusses user, account, and traffic management in a WLAN based HotSpot. The HotSpot is a large WLAN infrastructure at the Faculty of Science of the University of Trento that uses a novel access management architecture named Uni-Fy developed at the University of Trento, and where roughly...

    Provided By University of Trento

  • White Papers // Jan 2011

    Passive Real-Time Localization Through Wireless Sensor Networks

    Localization and tracking play a key role in several applications both civilian and military. The growing needs of remote monitoring private and public areas caused a fast development of wireless and pervasive systems. In such a framework, the availability of low-power devices integrating on-board processing and wireless communication stimulated several...

    Provided By University of Trento

  • White Papers // Jan 2011

    Optimized Design of a Multi-Function/Multi-Band Antenna for Automotive Rescue Systems

    The development of efficient automotive accident management systems requires the design of complex multi-function antennas enabling different wireless services (e.g., localization, voice and data communications, emergency calls, etc...). Starting from different specifications (electrical, mechanical, and aerodynamic), the design of a multifunction antenna must consider, in addition to the usual antenna...

    Provided By University of Trento

  • White Papers // Jan 2011

    Synthesis and Optimization of Pre-Fractal Multiband Antennas

    The growing demand of electronic products employing several wireless standards for data exchange, working in different frequency bands, requires the adoption of multi-band components and devices. In this framework one of the most critical issue is the design of the radiating device since the development of a single antenna working...

    Provided By University of Trento

  • White Papers // Dec 2010

    Characterizing User Behavior and Network Load on a Large-Scale Wireless Mesh Network

    Wireless mesh networks represent a promising paradigm to provide a scalable infrastructure for Internet access in metropolitan areas. In this paper, a large-scale wireless mesh testbed deployed in three cities in the Trentino region is described and experimentation results obtained from the public use of the testbed are reported and...

    Provided By University of Trento

  • White Papers // Nov 2010

    GREENET - An Early Stage Training Network in Enabling Technologies for Green Radio

    In this paper, the authors describe GREENET (an early stage training network in enabling technologies for green radio), which is a new project recently funded by the European Commission under the auspices of the 2010 Marie Curie People Programme. Through the recruitment and personalized training of 17 Early Stage Researchers...

    Provided By University of Trento

  • White Papers // Nov 2010

    MUSTER: Adaptive Energy-Aware Multi-Sink Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly proposed for applications characterized by many-to-many communication, where multiple sources report their data to multiple sinks. Unfortunately, mainstream WSN collection protocols are generally designed to account for a single sink and, dually, WSN multicast protocols optimize communication from a single source. In this paper,...

    Provided By University of Trento

  • White Papers // Nov 2010

    Performance Analysis of Wireless Ad-Hoc Network Based on EDCA IEEE802.11e

    IEEE 802.11e is the enhanced version of the IEEE 802.11 MAC dedicated to provide Quality of Service of wireless network. It supports QoS by the service differentiation and prioritization mechanism. Data traffic receives different priority based on QoS requirements. Fundamentally, applications are divided into four Access Categories (AC). Each AC...

    Provided By University of Trento

  • White Papers // Jun 2010

    GRAPES: A Generic Environment for P2P Streaming

    Practical implementation of new P2P streaming systems require a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic...

    Provided By University of Trento

  • White Papers // Apr 2010

    Two-Layered Architecture for Peer-to-Peer Concept Search

    Peer-to-peer search is an alternative to address the scalability concerns regarding centralized search, due to its inherent scalability in terms of computational resources. Concept search is an information retrieval approach which is based on retrieval models and data structures of syntactic search, but which searches for concepts rather than words...

    Provided By University of Trento

  • White Papers // Apr 2010

    Emulating Multi-Hop Wireless Networks Over a Planetary Scale Testbed

    The most commonly used technique to evaluate novel solutions is to leverage on simulation studies which are largely based on a simplified model of the system behavior. Such an approach provides an approximate evaluation of the system's performances, which can be potentially far away from the behavior on a real...

    Provided By University of Trento

  • White Papers // Apr 2010

    Architectures and Cross-Layer Design for Cognitive Networks

    Network evolution towards self-aware autonomous adaptive networking attempts to overcome the inefficiency of configuring and managing networks, which leads to performance degradation. In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed. This created a new paradigm in networking, known as cognitive...

    Provided By University of Trento

  • White Papers // Mar 2010

    Cognitive Information Service: Basic Principles and Implementation of a Cognitive Inter-Node Protocol Optimization Scheme

    Cognitive networks are becoming extremely popular in the network domain. This paper proposes a novel concept in cognitive network management and protocol configuration, where any protocol of the TCP/IP protocol reference model can be extended to dynamically tune its configuration parameters based on "Immediate past" performance. The approach is focused...

    Provided By University of Trento

  • White Papers // Mar 2010

    Reasoning About Contextual Requirements for Mobile Information Systems: A Goal-Based Approach

    Mobile information systems are characterized by their ability to adapt to varying contexts. There is a strong relationship between the requirements of a mobile information system and its operational context. On the one hand, context can be considered to determine the requirements, the alternatives that can be adopted to satisfy...

    Provided By University of Trento

  • White Papers // Feb 2010

    Reviewing Peer Review: A Quantitative Analysis of Peer Review

    In this paper, the authors focus on the analysis of peer reviews and reviewers behavior in a number of different review processes. More specifically, they report on the development, definition and rationale of a theoretical model for peer review processes to support the identification of appropriate metrics to assess the...

    Provided By University of Trento

  • White Papers // Feb 2010

    Contextual Goal Models

    In emerging computing paradigms, such as mobile, ubiquitous, and pervasive computing, the relation between context and requirements is evident. Context might be a main factor to determine the set of requirements relevant to a system, the alternatives that can be adopted to meet these requirements, and the quality of each...

    Provided By University of Trento

  • White Papers // Feb 2010

    A Goal-Based Framework for Contextual Requirements Modeling and Analysis

    Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerging computing paradigms, such as ambient, pervasive and ubiquitous computing, where it is essential to monitor and adapt to an inherently varying context. Besides...

    Provided By University of Trento

  • White Papers // Jan 2010

    When Security Meets Software Engineering: A Case of Modelling

    Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems...

    Provided By University of Trento

  • White Papers // Nov 2009

    WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an...

    Provided By University of Trento

  • White Papers // Oct 2009

    Cognitive Link Layer for Wireless Local Area Networks

    Several attempts have been made to optimize a link layer of wireless local area networks. Most of them focus on one parameter at a time and propose optimizing approaches which rely on network state information usually not directly available at network nodes. In this paper, the authors propose a cognitive...

    Provided By University of Trento

  • White Papers // Aug 2009

    Achieving Performance and Robustness in P2P Streaming Systems

    This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of the authors' knowledge, the...

    Provided By University of Trento

  • White Papers // Aug 2009

    Security and Privacy Issues in P2P Streaming Systems: A Survey

    Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other 'Side' properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the...

    Provided By University of Trento

  • White Papers // Jul 2009

    Receiver-Driven Queue Management for Achieving RTT-Fairness in Wi-Fi Networks

    In this paper, the authors introduce a novel queue management technique for the buffer space at the base station of infrastructure 802.11 networks that considers mobile user's receiving characteristics. The maximum amount of the base station buffer that can be used by a given flow is updated proportionally to RTT,...

    Provided By University of Trento

  • White Papers // Jun 2009

    Simulating BDI-Based Wireless Sensor Networks

    Autonomic systems merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing complex distributed systems. Wireless Sensor Networks (WSN) represent such systems, and may benefit from autonomic system designs that target distributed nodes in diverse and changing environments that...

    Provided By University of Trento

  • White Papers // May 2009

    Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as these phases cover...

    Provided By University of Trento

  • White Papers // Apr 2009

    The "Credit-cost Channel" Of Monetary Policy. A Theoretical Assessment

    Drawing on the modern literature on the monetary transmission mechanisms with capital market imperfections, this paper presents a model of the "Credit-cost channel" of monetary policy. The thrust of the model is that firms' reliance on bank loans ("Credit channel") may make aggregate supply sensitive to bank interest rates ("Cost...

    Provided By University of Trento

  • White Papers // Jan 2010

    When Security Meets Software Engineering: A Case of Modelling

    Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems...

    Provided By University of Trento

  • White Papers // Jan 2011

    Planning and Monitoring Web Service Composition

    The ability to automatically compose web services, and to monitor their execution, is an essential step to substantially decrease time and costs in the development, integration, and maintenance of complex services. This paper exploits techniques based on the "Planning as Model Checking" approach to automatically compose web services and synthesize...

    Provided By University of Trento

  • White Papers // Nov 2010

    Performance Analysis of Wireless Ad-Hoc Network Based on EDCA IEEE802.11e

    IEEE 802.11e is the enhanced version of the IEEE 802.11 MAC dedicated to provide Quality of Service of wireless network. It supports QoS by the service differentiation and prioritization mechanism. Data traffic receives different priority based on QoS requirements. Fundamentally, applications are divided into four Access Categories (AC). Each AC...

    Provided By University of Trento

  • White Papers // Jan 2011

    Supporting Publication and Subscription Confidentiality in Pub/Sub Networks

    The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publisher applications generate events that are sent to interested applications through a network of brokers. Subscriber applications express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being...

    Provided By University of Trento

  • White Papers // Jan 2011

    Clean Answers Over Dirty Databases: A Probabilistic Approach

    The detection of duplicate tuples, corresponding to the same real-world entity, is an important task in data integration and cleaning. While many techniques exist to identify such tuples, the merging or elimination of duplicates can be a difficult task that relies on ad-hoc and often manual solutions. The authors propose...

    Provided By University of Trento

  • White Papers // Apr 2010

    Two-Layered Architecture for Peer-to-Peer Concept Search

    Peer-to-peer search is an alternative to address the scalability concerns regarding centralized search, due to its inherent scalability in terms of computational resources. Concept search is an information retrieval approach which is based on retrieval models and data structures of syntactic search, but which searches for concepts rather than words...

    Provided By University of Trento

  • White Papers // Jun 2010

    GRAPES: A Generic Environment for P2P Streaming

    Practical implementation of new P2P streaming systems require a lot of coding and is often tedious and costly, slowing down the technology transfer from the research community to real users. GRAPES aims at relieving this burden, and speed-up application development, by providing a set of open-source components conceived as basic...

    Provided By University of Trento

  • White Papers // Feb 2010

    Reviewing Peer Review: A Quantitative Analysis of Peer Review

    In this paper, the authors focus on the analysis of peer reviews and reviewers behavior in a number of different review processes. More specifically, they report on the development, definition and rationale of a theoretical model for peer review processes to support the identification of appropriate metrics to assess the...

    Provided By University of Trento

  • White Papers // Mar 2010

    Reasoning About Contextual Requirements for Mobile Information Systems: A Goal-Based Approach

    Mobile information systems are characterized by their ability to adapt to varying contexts. There is a strong relationship between the requirements of a mobile information system and its operational context. On the one hand, context can be considered to determine the requirements, the alternatives that can be adopted to satisfy...

    Provided By University of Trento

  • White Papers // Feb 2010

    Contextual Goal Models

    In emerging computing paradigms, such as mobile, ubiquitous, and pervasive computing, the relation between context and requirements is evident. Context might be a main factor to determine the set of requirements relevant to a system, the alternatives that can be adopted to meet these requirements, and the quality of each...

    Provided By University of Trento

  • White Papers // Feb 2010

    A Goal-Based Framework for Contextual Requirements Modeling and Analysis

    Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerging computing paradigms, such as ambient, pervasive and ubiquitous computing, where it is essential to monitor and adapt to an inherently varying context. Besides...

    Provided By University of Trento

  • White Papers // Jul 2011

    Cloudy Weather for P2P, With a Chance of Gossip

    Peer-To-Peer (P2P) and cloud computing, two of the Internet trends of the last decade, hold similar promises: the (virtually) infinite availability of computing and storage resources. But there are important differences: the cloud provides highly-available resources, but at a cost; P2P resources are for free, but their availability is shaky....

    Provided By University of Trento

  • White Papers // Jan 2011

    Managing Wireless HotSpots: The Unify Approach

    This paper presents and discusses user, account, and traffic management in a WLAN based HotSpot. The HotSpot is a large WLAN infrastructure at the Faculty of Science of the University of Trento that uses a novel access management architecture named Uni-Fy developed at the University of Trento, and where roughly...

    Provided By University of Trento

  • White Papers // Mar 2009

    Application-Aware Dynamic Retransmission Control in Mobile Cellular Networks

    This paper proposes an application-aware cross-layer approach between application/transport layers on the mobile terminal and link layer at the wireless base station to enable dynamic control on the strength of per-packet error protection for multimedia and data transfers. Specifically, in the context of cellular networks, the proposed scheme allows to...

    Provided By University of Trento

  • White Papers // Jul 2009

    Receiver-Driven Queue Management for Achieving RTT-Fairness in Wi-Fi Networks

    In this paper, the authors introduce a novel queue management technique for the buffer space at the base station of infrastructure 802.11 networks that considers mobile user's receiving characteristics. The maximum amount of the base station buffer that can be used by a given flow is updated proportionally to RTT,...

    Provided By University of Trento

  • White Papers // Apr 2010

    Emulating Multi-Hop Wireless Networks Over a Planetary Scale Testbed

    The most commonly used technique to evaluate novel solutions is to leverage on simulation studies which are largely based on a simplified model of the system behavior. Such an approach provides an approximate evaluation of the system's performances, which can be potentially far away from the behavior on a real...

    Provided By University of Trento

  • White Papers // Apr 2009

    The "Credit-cost Channel" Of Monetary Policy. A Theoretical Assessment

    Drawing on the modern literature on the monetary transmission mechanisms with capital market imperfections, this paper presents a model of the "Credit-cost channel" of monetary policy. The thrust of the model is that firms' reliance on bank loans ("Credit channel") may make aggregate supply sensitive to bank interest rates ("Cost...

    Provided By University of Trento

  • White Papers // Mar 2009

    HyperCBR: Large-Scale Content-Based Routing in a Multidimensional Space

    Content-Based Routing (CBR) is becoming increasingly popular as a building block for distributed applications. CBR differs from classical routing paradigms as messages are routed based on their content rather than their destination address, which fosters decoupling and flexibility in the application's distributed architecture. However, most available systems realize CBR by...

    Provided By University of Trento

  • White Papers // Nov 2009

    WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an...

    Provided By University of Trento

  • White Papers // May 2011

    Group Monitoring in Mobile Wireless Sensor Networks

    The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of livestock, the care giving to people that are not self-sufficient. Human- or animal-borne wireless devices can be used to detect the joining...

    Provided By University of Trento

  • White Papers // Nov 2010

    MUSTER: Adaptive Energy-Aware Multi-Sink Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are increasingly proposed for applications characterized by many-to-many communication, where multiple sources report their data to multiple sinks. Unfortunately, mainstream WSN collection protocols are generally designed to account for a single sink and, dually, WSN multicast protocols optimize communication from a single source. In this paper,...

    Provided By University of Trento

  • White Papers // Jun 2009

    Simulating BDI-Based Wireless Sensor Networks

    Autonomic systems merge advancements in the field of multi-agent software design, dynamic analysis, and decentralized control in order to assist designers in constructing complex distributed systems. Wireless Sensor Networks (WSN) represent such systems, and may benefit from autonomic system designs that target distributed nodes in diverse and changing environments that...

    Provided By University of Trento

  • White Papers // Apr 2009

    Efficient Coverage Optimization in Energy-Constrained Wireless Sensor Networks

    The authors consider the problem of optimizing the area coverage of a wireless sensor network under energy consumption constraints. Following existing approaches, they use a mixed integer linear program formulation. They then show how to use partitioning techniques, developed in the context of VLSI place and route, to decompose the...

    Provided By University of Trento

  • White Papers // Jan 2011

    Passive Real-Time Localization Through Wireless Sensor Networks

    Localization and tracking play a key role in several applications both civilian and military. The growing needs of remote monitoring private and public areas caused a fast development of wireless and pervasive systems. In such a framework, the availability of low-power devices integrating on-board processing and wireless communication stimulated several...

    Provided By University of Trento

  • White Papers // May 2011

    Towards the Integration of Knowledge Organization Systems With the Linked Data Cloud

    In representing the shared view of all the people involved, building a Knowledge Organization System (KOS) from scratch is extremely costly, and it is therefore fundamental to reuse existing resources. This can be done by progressively extending the KOS with knowledge coming from similar KOS and by promoting interoperability among...

    Provided By University of Trento

  • White Papers // Jan 2011

    Optimized Design of a Multi-Function/Multi-Band Antenna for Automotive Rescue Systems

    The development of efficient automotive accident management systems requires the design of complex multi-function antennas enabling different wireless services (e.g., localization, voice and data communications, emergency calls, etc...). Starting from different specifications (electrical, mechanical, and aerodynamic), the design of a multifunction antenna must consider, in addition to the usual antenna...

    Provided By University of Trento

  • White Papers // May 2009

    Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology

    Security Requirements Engineering is an emerging field which lies at the crossroads of Security and Software Engineering. Much research has focused on this field in recent years, spurred by the realization that security must be dealt with in the earliest phases of the software development process as these phases cover...

    Provided By University of Trento

  • White Papers // Feb 2012

    What Does Model-Driven Data Acquisition Really Achieve in Wireless Sensor Networks?

    Model-driven data acquisition techniques aim at reducing the amount of data reported, and therefore the energy consumed, in Wireless Sensor Networks (WSNs). At each node, a model predicts the sampled data; when the latter deviate from the current model, a new model is generated and sent to the data sink....

    Provided By University of Trento

  • White Papers // Aug 2012

    CrowdER: Crowdsourcing Entity Resolution

    In the last years there has been a considerable increase in the availability of continuous sensor measurements in a wide range of application domains, such as Location-Based Services (LBS), medical monitoring systems, manufacturing plants and engineering facilities to ensure efficiency, product quality and safety, hydrologic and geologic observing systems, pollution...

    Provided By University of Trento

  • White Papers // Apr 2010

    Architectures and Cross-Layer Design for Cognitive Networks

    Network evolution towards self-aware autonomous adaptive networking attempts to overcome the inefficiency of configuring and managing networks, which leads to performance degradation. In order to optimize network operations, the introduction of self-awareness, self-management, and self-healing into the network was proposed. This created a new paradigm in networking, known as cognitive...

    Provided By University of Trento

  • White Papers // Dec 2010

    Characterizing User Behavior and Network Load on a Large-Scale Wireless Mesh Network

    Wireless mesh networks represent a promising paradigm to provide a scalable infrastructure for Internet access in metropolitan areas. In this paper, a large-scale wireless mesh testbed deployed in three cities in the Trentino region is described and experimentation results obtained from the public use of the testbed are reported and...

    Provided By University of Trento

  • White Papers // Mar 2010

    Cognitive Information Service: Basic Principles and Implementation of a Cognitive Inter-Node Protocol Optimization Scheme

    Cognitive networks are becoming extremely popular in the network domain. This paper proposes a novel concept in cognitive network management and protocol configuration, where any protocol of the TCP/IP protocol reference model can be extended to dynamically tune its configuration parameters based on "Immediate past" performance. The approach is focused...

    Provided By University of Trento

  • White Papers // Oct 2009

    Cognitive Link Layer for Wireless Local Area Networks

    Several attempts have been made to optimize a link layer of wireless local area networks. Most of them focus on one parameter at a time and propose optimizing approaches which rely on network state information usually not directly available at network nodes. In this paper, the authors propose a cognitive...

    Provided By University of Trento

  • White Papers // Jan 2011

    Synthesis and Optimization of Pre-Fractal Multiband Antennas

    The growing demand of electronic products employing several wireless standards for data exchange, working in different frequency bands, requires the adoption of multi-band components and devices. In this framework one of the most critical issue is the design of the radiating device since the development of a single antenna working...

    Provided By University of Trento

  • White Papers // Apr 2012

    Towards Business Processes Orchestrating the Physical Enterprise With Wireless Sensor Networks

    The industrial adoption of Wireless Sensor Networks (WSNs) is hampered by two main factors. First, there is a lack of integration of WSNs with business process modeling languages and back-ends. Second, programming WSNs is still challenging as it is mainly performed at the operating system level. To this end, the...

    Provided By University of Trento

  • White Papers // Dec 2011

    Privacy in the Pervasive Era: A Distributed Firewall Approach

    This paper presents a novel protocol for the support of audio/video streaming in a vehicular network. The protocol is based on localization and timing, both of them obtained via satellite positioning. Transmissions are coordinated to entirely avoid collisions. The protocol is evaluated using an innovative semi-analytic technique based on stochastic...

    Provided By University of Trento

  • White Papers // Aug 2009

    Achieving Performance and Robustness in P2P Streaming Systems

    This paper present a thorough and homogeneous comparison of chunk and peer selection strategies suitable for mesh-based, live, P2P streaming applications. Strategies are studied in a context of push protocols, and it is shown that none of the schedulers analyzed, which are, to the best of the authors' knowledge, the...

    Provided By University of Trento

  • White Papers // Aug 2009

    Security and Privacy Issues in P2P Streaming Systems: A Survey

    Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other 'Side' properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the...

    Provided By University of Trento

  • White Papers // Jan 2012

    Time-Driven Switching Blocking Analysis: A Single Node Case

    This paper presents a closed-form time-domain analysis of the blocking probability of Time-Driven Switching (TDS) for the single node case. In this work blocking is defined as the occurrence in which transmission resources are available in both inlet and outlet, but there is no schedule. The main constraints for finding...

    Provided By University of Trento

  • White Papers // Nov 2010

    GREENET - An Early Stage Training Network in Enabling Technologies for Green Radio

    In this paper, the authors describe GREENET (an early stage training network in enabling technologies for green radio), which is a new project recently funded by the European Commission under the auspices of the 2010 Marie Curie People Programme. Through the recruitment and personalized training of 17 Early Stage Researchers...

    Provided By University of Trento