2012
Autores
Pinto, J; Calado, P; Braga, J; Dias, P; Martins, R; Marques, E; Sousa, JB;
Publicação
IFAC Proceedings Volumes (IFAC-PapersOnline)
Abstract
This paper describes the layered control architecture and its software implementation developed and used at the Underwater Systems and Technology Laboratory. The architecture is implemented as a toolchain which consists on three main entities: DUNE onboard software, Neptus command and control software and a common IMC message-based communication protocol. The LSTS software toolchain has been tested throughout various field deployments where it was used to control heterogeneous autonomous vehicles like AUVs, ASVs, UAVs and ROVs in both single and multi-vehicle operations.
2012
Autores
Santos, A; Almeida, JJ; Carvalho, N;
Publicação
LREC 2012 - EIGHTH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION
Abstract
Text alignment is one of the main processes for obtaining parallel corpora. When aligning two versions of a book, results are often affected by unpaired sections - sections which only exist in one of the versions of the book. We developed Text : : Perfide : : BookSync, a Perl module which performs books synchronization (structural alignment based on section delimitation), provided they have been previously annotated by Text : : Perfide : : BookCleaner. We discuss the need for such a tool and several implementation decisions. The main functions are described, and examples of input and output are presented. Text : : Perfide : : PartialAlign is an extension of the partialAlign.py tool bundled with hunalign which proposes an alternative methods for splitting bitexts.
2012
Autores
Vilela, JP; Barros, J;
Publicação
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)
Abstract
We present a jamming protocol for secrecy-enhanced wireless networks in which otherwise silent devices are selected as jammers to cause interference to potential eavesdroppers. This cooperative protocol includes several jammer selection policies that lead to different levels of secrecy-energy tradeoffs. Our results show that there is some advantage over selecting well-connected jammers and there is a need for a minimum number of jammers for the energy cost of jamming to payoff.
2012
Autores
Marias, GF; Barros, J; Fiedler, M; Fischer, A; Hauff, H; Herkenhoener, R; Grillo, A; Lentini, A; Lima, L; Lorentzen, C; Mazurczyk, W; de Meer, H; Oliveira, PF; Polyzos, GC; Pujol, E; Szczypiorski, K; Vilela, JP; Vinhoza, TTV;
Publicação
SECURITY AND COMMUNICATION NETWORKS
Abstract
The vision towards the Network of the Future cannot be separated from the fact that today's networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service attacks were treated as apocalypse for networking. Now, they are considered moderate damage, whereas more sophisticated and inconspicuous attacks, such as botnets activities, might have greater and far reaching impact. As the Internet is expanding to mobile phones and smart dust and as its social coverage is liberalized towards the realization of ubiquitous computing (with communication), the concerns on security and privacy have become deeper and the problems more challenging than ever. Re-designing the Internet as the Network of the Future is self-motivating for researchers, and security and privacy cannot be provided again as separate, external, add-on, solutions. In this paper, we discuss the security and privacy challenges of the Network of the Future and try to delimit the solutions space on the basis of emerging techniques. We also review methods that help the quantification of security and privacy in an effort to provide a more systematic and quantitative treatment of the area in the future. Copyright (c) 2011 John Wiley & Sons, Ltd.
2011
Autores
Koumaras, H; Négru, D; Borcoci, E; Koumaras, V; Troulos, C; Lapid, Y; Pallis, E; Sidibé, M; Pinto, A; Gardikis, G; Xilouris, G; Timmerer, C;
Publicação
The Future Internet - Future Internet Assembly 2011: Achievements and Technological Promises
Abstract
This chapter proposes a novel concept towards the deployment of a networked 'Media Ecosystem'. The proposed solution is based on a flexible cooperation between providers, operators, and end-users, finally enabling every user first to access the offered multimedia services in various contexts, and second to share and deliver his own audiovisual content dynamically, seamlessly, and transparently to other users. Towards this goal, the proposed concept provides content-awareness to the network environment, network- and user context-awareness to the service environment, and adapted services/content to the end user for his best service experience possible, taking the role of a consumer and/or producer. © 2011 Springer-Verlag Berlin Heidelberg.
2011
Autores
Lupu, R; Borcoci, E; Stanciu, M; Pinto, A;
Publicação
UPB Scientific Bulletin, Series C: Electrical Engineering
Abstract
With the ongoing increase of the network technologies' diversity and the integration of the user level applications, the legacy-style content-independent configuration of the security mechanisms cannot yields in efficient security solutions farther. Our work aims to contribute on the design of auto-reconfigurable (adaptive) security services that are capable to satisfy the application's security level required with minimal network resources' usage. In this paper we propose a new networkcentric security architecture design that relies on the current network security conditions and content-aware mechanisms. The architecture main functional blocks and the corresponding relationships are defined. This architecture shall supply three inter-domain composite user security services, named "public traffic", "secret content" and "private communication", as well as, attack source traceback and distributed access control functionalities.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.