By Topic

Future Internet Communications (CFIC), 2013 Conference on

Date 15-16 May 2013

Filter Results

Displaying Results 1 - 14 of 14
  • Author index

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Message from CFIC coimbra 2013 chairs

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (134 KB) | HTML iconHTML
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Retrial queue of BMAP/PH/N type with customers balking, impatience and non-persistence

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    We consider a multi-server retrial queueing system with the Batch Markovian Arrival Process and phase type service time distribution. Such a quite general queueing system suits for modeling, e.g., modern wireless communication networks. We assume that arriving customers, which do not succeed to start the service immediately upon arrival due to the lack of available servers, may leave the system fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical characterisation of multi-path content delivery in Content Centric Networks

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Content Centric Networking (CCN) is an evolving paradigm in networking where communications are based on named content rather than the named hosts model of today's networks. Though CCN is capable of multi-path communications by design, no work has been done to characterise multi-path content transfers in CCN with an analytical model. In this work, we have developed an analytical model to evaluate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mitigating brute-force attacks on Bloom-filter based forwarding

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (361 KB) | HTML iconHTML

    The in-packet Bloom filter forwarding mechanism is a source routing approach used in Information-centric networking (ICN). This mechanism is vulnerable to brute-force attacks that can be used for distributed denial-of-service (DDoS) attacks and unsolicited messages (spam). In this paper we analytically calculate the probability of brute-force attacks and determine the time required by the attacker... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytic evaluation of power saving in cooperative communication

    Publication Year: 2013, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    This paper addresses the effects of power saving mechanisms on cooperation in wireless networks. Cooperation by relaying data of other wireless nodes is crucial in (next-generation) wireless networks as it can greatly attribute to ensuring connectivity, reliability, performance, etc. As power saving relies on sleep mode, turning off the communication subsystem for predetermined amounts of time, it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local messages for smartphones

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper describes a new model for local messaging based on the network proximity. We present a novelty mobile mashup which combines Wi-Fi proximity measurements with Cloud Messaging. Our mobile mashup combines passive monitoring for smart phones and cloud based messaging for mobile operational systems. Passive monitoring can determine the location of mobile subscribers (mobile phones, actually)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Light-weight time synchronization for Wireless Sensor Networks

    Publication Year: 2013, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (166 KB) | HTML iconHTML

    Using a Wireless Sensor Network (WSN) for monitoring single source events, such as volcanic activity, involves many challenges. One of these challenges is that of accurate timer synchronization of the data collecting nodes, so as to ensure that there is a consistent view of the data retrieval times. In this paper we discuss a novel approach for an one-way time synchronization protocol that relies ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards behaviour inference in smart environments

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (873 KB) | HTML iconHTML

    Smart environments are physical places that are richly and invisibly populated with sensors, actuators and computational elements. The objective of such environments is to adapt themselves to its users in order to increase their comfort and usefulness. This paper proposes a platform, named APOLLO, capable of inferring behaviour rules from a smart environment and apply them to provide an intelligen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nodes' misbehavior in Vehicular Delay-Tolerant Networks

    Publication Year: 2013, Page(s):1 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes that communicate wirelessly with each other to forward data despite connectivity issues. This paper focuses on the problem of some nodes trying to impair the communication of a VDTN. In the paper we study the case of nodes that delay the forwarding of messages that is a particularly difficult to detect form of misbehavior. We s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the impact of the sensing rate of secondary users in Cognitive Radio Networks

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    The first phase in the operation of a Cognitive Radio Network (CRN) is the investigation of the availability of idle channels through channel sensing. In this paper we study the impact of the sensing rate of Secondary Users (SUs) in a CRN. We develop a continuous-time Markov chain (CTMC) to study the effect of the sensing rate σ on the performance measures of the CRN including the expected ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteed greedy routing in overlay networks

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Greedy routing can be used in mobile ad-hoc networks as geographic routing protocol. This paper proposes to use greedy routing also in overlay networks by positioning overlay nodes into a multi-dimensional Euclidean space. Greedy routing can only be applied when a routing decision makes progress towards the final destination. Our proposed overlay network is built such that there will be always pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.