Software

Lifetime-aware ISP networks. Optimal formulation and solutions

We propose a framework to manage the link lifetime in an IP backbone network by exploiting the sleep mode (SM). In particular, when an SM feature is available, two different effects coexist: 1) during the SM state, the lifetime tends to be increased and 2) however, when the link changes its power state (from SM to full power or vice-versa), the lifetime tends to be decreased. We, therefore, define an optimal formulation of the lifetime-aware network problem. Moreover, we propose a heuristic, called Acceleration Factor Algorithm, to practically manage the device lifetime.

An approach for service function chain routing and virtual function network instance migration in network function virtualization architectures

Network function virtualization foresees the virtualization of service functions and their execution on virtual machines. Any service is represented by a service function chain (SFC) that is a set of VNFs to be executed according to a given order. The running of VNFs needs the instantiation of VNF Instances (VNFIs) that in general are software modules executed on virtual machines.

Editorial: Emerging Technologies for Ubiquitous and Intelligent Infrastructures

The editorial describe the content of the Special Issue on Emerging Technologies for Ubiquitous and Intelligent Infrastructures, including six papers: “Joint Atomic Norm based Estimation of Sparse Time Dispersive SIMO Channels with Common Support in Pilot Aided OFDM Systems,” “Performance Evaluation of Non-prefiltering vs.

Secure double rate registers as an RTL countermeasure against power analysis attacks

Power analysis attacks (PAAs), a class of side-channel attacks based on power consumption measurements, are a major concern in the protection of secret data stored in cryptographic devices. In this paper, we introduce the secure double rate registers (SDRRs) as a register-transfer level (RTL) countermeasure to increase the security of cryptographic devices against PAAs. We exploit the SDRR in a conventional advanced encryption standard (AES)-128 architecture, improving the immunity of the cryptographic hardware to the state-of-the-art PAAs.

Vulnus: Visual Vulnerability Analysis for Network Security

Vulnerabilities represent one of the main weaknesses of IT systems and the availability of consolidated official data, like CVE (Common Vulnerabilities and Exposures), allows for using them to compute the paths an attacker is likely to follow. However, even if patches are available, business constraints or lack of resources create obstacles to their straightforward application. As a consequence, the security manager of a network needs to deal with a large number of vulnerabilities, making decisions on how to cope with them.

A power-of-two choices based algorithm for fog computing

The fog computing paradigm brings together storage, com-munication, and computation resources closer to users’ end-devices.Therefore, fog servers are deployed at the edge of the network, offeringlow latency access to users. With the expansion of such fog computingservices, different providers will be able to deploy multiple resourceswithin a restricted geographical proximity.In this paper, we investigate an incentive-based cooperation schemeacross fog providers.

Pooling or sampling: Collective dynamics for electrical flow estimation

The computation of electrical flows is a crucial primitive for many recently proposed optimization algorithms on weighted networks. While typically implemented as a centralized subroutine, the ability to perform this task in a fully decentralized way is implicit in a number of biological systems. Thus, a natural question is whether this task can provably be accomplished in an efficient way by a network of agents executing a simple protocol.

Algorithms for hiring and outsourcing in the online labor market

Although freelancing work has grown substantially in recent years, in part facilitated by a number of online labor marketplaces, traditional forms of “in-sourcing” work continue being the dominant form of employment. This means that, at least for the time being, freelancing and salaried employment will continue to co-exist. In this paper, we provide algorithms for outsourcing and hiring workers in a general setting, where workers form a team and contribute different skills to perform a task. We call this model team formation with outsourcing.

Calibration and validation of and results from a micro-simulation model to explore drivers’ actual use of acceleration lanes

This study investigates the actual use of acceleration lanes by means of traffic micro-simulations in proximity to the convergence between the main and the secondary traffic streams. The data needed to develop the micro-simulation model were collected videotaping two acceleration lanes of an Italian highway, near the village of San Liberato. The relevant microsimulation model has been developed utilizing a commercial software, the TransModeler traffic simulation package, while the calibration and validation phases have been realized based on real-life data.

© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma