2011
Authors
Soares, J; Preguica, N;
Publication
EURO-PAR 2011 PARALLEL PROCESSING, PT 1
Abstract
Users increasingly own, and use, multiple computing devices. To be able to access their personal data, at any time and in any device, users usually need to create replicas in each device. Managing these multiple replicas becomes an important issue. In this paper we present the FEW Phone File System, a data management system that combines mobile and cloud storage for providing ubiquitous data access. To this end, our system takes advantage of the characteristics of mobile phones for storing a replica of a user's personal data, thus allowing these devices to be used as personal and portable file servers. As users tend to always carry their mobile phone with them at all times, these replicas are the basis for providing high data availability, and keeping replicas automatically synchronized. Our system also uses other replicas located in web servers and cloud storage systems, to reduce the volume of data stored, and transferred to/from mobile phones, by maintaining only the information needed to obtain them.
2011
Authors
Vilela, JP; Pinto, PC; Barros, J;
Publication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract
Signal interference and packet collisions are typically viewed as negative factors that hinder wireless communication networks. When security is the primary concern, signal interference may actually be very helpful. Starting with a stochastic network model, we are able to show that packet collisions caused by jamming nodes can indeed be used effectively to attain new levels of secrecy in multiterminal wireless environments. To this effect, we propose a practical jamming protocol that uses the well-known request-to-send/clear-to-send (RTS/CTS) handshake of the IEEE 802.11 standard as a signaling scheme. Various jammer selection strategies are investigated depending on the position of source, destination, and jamming nodes. The goal is to cause asmuch interference as possible to eavesdroppers that are located in unknown positions, while limiting the interference observed by the legitimate receiver. To evaluate the performance of each strategy, we introduce and compute a measure for the secure throughput. Our results show that jamming can increase the levels of secrecy significantly albeit at a substantial cost in terms of energy efficiency.
2011
Authors
Vilela, JP; Bloch, M; Barros, J; McLaughlin, SW;
Publication
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
Abstract
Inspired by recent results on information-theoretic security, we consider the transmission of confidential messages over wireless networks, in which the legitimate communication partners are aided by friendly jammers. We characterize the security level of a confined region in a quasi-static fading environment by computing the probability of secrecy outage in connection with two new measures of physical-layer security: the jamming coverage and the jamming efficiency. Our analysis for various jamming strategies based on different levels of channel state information provides insight into the design of optimal jamming configurations and shows that a single jammer is not sufficient to maximize both figures of merit simultaneously. Moreover, a single jammer requires full channel state information to provide security gains in the vicinity of the legitimate receiver.
2011
Authors
Vilela, JP; Pinto, PC; Barros, J;
Publication
IEEE International Conference on Communications
Abstract
We consider a wireless network scenario in which the communicating nodes are assisted by a number of jammers. The goal of the jammers is to obstruct potential eavesdroppers while restricting the harmful interference experienced by the legitimate receiver. Based on a stochastic network model, we are able to show that packet collisions caused by jamming nodes can be used effectively to increase the level of secrecy. Various jammer selection policies are investigated depending on the position of source, destination and jamming nodes. Our results shed some light on the trade-off between secure throughput and energy efficiency. © 2011 IEEE.
2010
Authors
Figueira, A; Felix, C; Ferreira, C;
Publication
Proceedings of the 8th IASTED International Conference on Web-Based Education, WBE 2010
Abstract
Digital portfolios have recently assumed an increasing importance in e-learning. In this article we report an integrated system that can be used to publish online projects undertaken by students during their courses. The system was then integrated with the Moodle learning management system featuring the possibility to create, evaluate, publish and maintain digital portfolios assigned and corrected by the institution faculty. This integrated process ensures a high quality level of the projects registered. The system uses information imported from Moodle's database to fill in its own database for users, courses and propagates the existing session between the two systems. It also maintains the projects in specific development phases, thus, allowing asynchronous editing, assessing or commenting on projects by different students or teachers. The creation of a new project is boosted by the use of a set of pre-defined templates which in turn give a standard layout and design quality to the final view of the project.
2010
Authors
Santos, G; Figueira, A;
Publication
ICALT 2010, 10th IEEE International Conference on Advanced Learning Technologies, Sousse, Tunesia, 5-7 July 2010
Abstract
This paper describes a conceptual framework for implementing Intelligent Tutoring Systems using SCORM 2004. The main objective is to discuss how the SCORM 2004 sequencing and navigation specification can allow the development of Intelligent Web-Based Learning Environments using the sequencing and navigation tracking data, and rule set. Our main argument is that SCORM 2004 sequencing and navigation specification can be used to implement the two main functionalities of an ITS, (1) the inner loop and (2) the outer loop. © 2010 IEEE.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.