Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CRACS

2008

Early introduction of competitive programming

Autores
Ribeiro, P; Guerreiro, P;

Publicação
Olympiads in Informatics

Abstract
Those who enjoy programming enjoy programming competitions, either as contestants or as coaches. Often coaches are teachers, who, aiming at better results in the future, would like to have more and more students participating, from earlier stages. Learning all the basic algorithms takes some time, of course; on the other hand, competition environments can be introduced right from the beginning as a pedagogical tool. If handled correctly, this can be very effective in helping to reach the goals of the course and, as a side-effect, in bringing larger crowds of students into the programming competition arena. © 2008 Institute of Mathematics and Informatics, Vilnius.

2008

Minimality in a Linear Calculus with Iteration

Autores
Alves, S; Florido, M; Mackie, I; Sinot, FR;

Publicação
Electronic Notes in Theoretical Computer Science

Abstract
System L is a linear version of Gödel's System T, where the ?-calculus is replaced with a linear calculus; or alternatively a linear ?-calculus enriched with some constructs including an iterator. There is thus at the same time in this system a lot of freedom in reduction and a lot of information about resources, which makes it an ideal framework to start a fresh attempt at studying reduction strategies in ?-calculi. In particular, we show that call-by-need, the standard strategy of functional languages, can be defined directly and effectively in System L, and can be shown minimal among weak strategies.

2008

Resource Management and Signalling Architecture of a Hybrid Multicast Service for Multimedia Distribution

Autores
Borcoci, E; Pinto, A; Mehaoua, A; Fang, L; Wang, N;

Publicação
MANAGEMENT OF CONVERGED MULTIMEDIA NETWORKS AND SERVICES, PROCEEDINGS

Abstract
This paper further develops an architecture and design elements for a resource management and a signalling system to support the construction and maintenance of a mid-long term hybrid multicast tree for multimedia distribution services in a QoS guaranteed way, over multiple IP domains. The system called E-cast is composed of an overlay part - in inter-domain and possible IP level multicast in intra-domain. Each E-cast tree is associated with a given QoS class and is composed of unicast pipes established through Service Level Specification negotiations between the domain managers. The paper continues a previous work, by proposing an inter-domain signalling system to support the multicast management and control operations and then defining the resource management for tree construction and adjustment procedures in order to assure the required static and dynamic properties of the tree.

2008

Admission Control in IP Multicast over Heterogeneous Access Networks

Autores
Santos, P; Pinto, A; Ricardo, M; Almeida, T; Fontes, F;

Publicação
NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS

Abstract
Network operators have been reluctant to deploy IP multicast services mainly due to the lack of native control rover multicast groups. This lack of control does not only prevent operators from generating revenue from multicast-based services but also hinders regular network management. In this work we identified the network elements where admission control should be enforced for multicast session spawning over heterogeneous access networks. The architecture proposed uses existing AAA functionality to perform user identification and multicast session admission control. This control is made at the network layer with no protocol modifications. Three access networks were considered: xDSL, WiMAX and UMTS.

2008

Multicast deflector - Secure video distribution system

Autores
Pinto, A; Ricardo, M;

Publicação
TELECOMMUNICATION SYSTEMS

Abstract
Technological evolution is leading telecommunications toward all-IP scenarios, where multiple services are transported as IP packets. Among these services is the broadcast of video. A possible mechanism for broadcasting multiple video channels over IP is to use IP multicast, and let each client decide about the reception of a channel. The secure IP multicast specified by the IETF MSEC working group is a candidate solution for securing these broadcast services. In this paper we propose a new solution for supporting the broadcast of multiple video channels which can be accessed only by authorized users; besides, when a video channel is not visualized in the last mile its transmission is temporarily suspended, so that the cable can be used for other services such as standard Internet access.

2008

An Information-Theoretic Cryptanalysis of Network Coding - is Protecting the Code Enough?

Autores
Lima, L; Vilela, JP; Barros, J; Medard, M;

Publicação
2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3

Abstract
We consider the issue of confidentiality in multicast network coding, by assuming that the encoding matrices, based upon variants of random linear network coding, are given only to the source and sinks. Based on this assumption, we provide a characterization of the mutual information between the encoded data and the two elements that can lead to information disclosure: the matrices of random coefficients and, naturally, the original data itself. Our results, some of which hold even with finite block lengths, show that, predicated on optimal source-coding, information-theoretic security is achievable for any field size without loss in terms of decoding probability. It follows that protecting the encoding matrix is generally sufficient to ensure confidentiality of network coded data.

  • 162
  • 192