Underlying Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 39081 Experts worldwide ranked by ideXlab platform

Jan M Rabaey - One of the best experts on this subject based on the ideXlab platform.

  • a service based universal application interface for ad hoc wireless sensor and actuator networks
    Ambient Intelligence, 2005
    Co-Authors: Marco Sgroi, Adam Wolisz, Alberto Sangiovannivincentelli, Jan M Rabaey
    Abstract:

    A set of services and interface primitives to be offered to an application programmer of an ad hoc wireless sensor and actuator network (AWSAN) is described. As the definition of sockets has made the use of communication services in the Internet independent of the Underlying Protocol stack, communication medium and even operating system, the proposed application interface, called the “sensor network services platform” (SNSP), identifies an abstraction that is offered to any sensor network application and supported by any sensor network platform. The SNSP builds on the query/command paradigm already used in several sensor network implementations and further adds time synchronization, location and naming services that support the communication and coordination among application components.

  • a service based universal application interface for ad hoc wireless sensor networks
    2003
    Co-Authors: Marco Sgroi, Adam Wolisz, Alberto Sangiovannivincentelli, Jan M Rabaey
    Abstract:

    This paper addresses the fundamental issue of defining a standard set of services and interface primitives which should be made available to an application programmer independently on their implementation on any present and future sensor network platform. As the definition of sockets has made the use of communication services in the Internet independent of the Underlying Protocol stack, communication medium and even operating system, the application interface we propose identifies an abstraction that is offered to any sensor network application and supported by any sensor network platform. The distributed service platform we introduce builds on the query/command paradigm already used in several sensor network implementations and includes time synchronization, location and naming services that support the communication and coordination among application components.

Marco Sgroi - One of the best experts on this subject based on the ideXlab platform.

  • a service based universal application interface for ad hoc wireless sensor and actuator networks
    Ambient Intelligence, 2005
    Co-Authors: Marco Sgroi, Adam Wolisz, Alberto Sangiovannivincentelli, Jan M Rabaey
    Abstract:

    A set of services and interface primitives to be offered to an application programmer of an ad hoc wireless sensor and actuator network (AWSAN) is described. As the definition of sockets has made the use of communication services in the Internet independent of the Underlying Protocol stack, communication medium and even operating system, the proposed application interface, called the “sensor network services platform” (SNSP), identifies an abstraction that is offered to any sensor network application and supported by any sensor network platform. The SNSP builds on the query/command paradigm already used in several sensor network implementations and further adds time synchronization, location and naming services that support the communication and coordination among application components.

  • a service based universal application interface for ad hoc wireless sensor networks
    2003
    Co-Authors: Marco Sgroi, Adam Wolisz, Alberto Sangiovannivincentelli, Jan M Rabaey
    Abstract:

    This paper addresses the fundamental issue of defining a standard set of services and interface primitives which should be made available to an application programmer independently on their implementation on any present and future sensor network platform. As the definition of sockets has made the use of communication services in the Internet independent of the Underlying Protocol stack, communication medium and even operating system, the application interface we propose identifies an abstraction that is offered to any sensor network application and supported by any sensor network platform. The distributed service platform we introduce builds on the query/command paradigm already used in several sensor network implementations and includes time synchronization, location and naming services that support the communication and coordination among application components.

Lee, Kong Aik - One of the best experts on this subject based on the ideXlab platform.

  • ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
    2020
    Co-Authors: Wang Xin, Yamagishi Junichi, Todisco Massimiliano, Delgado Hector, Nautsch Andreas, Evans Nicholas, Vestman Ville, Kinnunen Tomi, Lee, Kong Aik
    Abstract:

    Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric person recognition. Unfortunately, just like all other biometric systems, ASV is vulnerable to spoofing, also referred to as "presentation attacks." These vulnerabilities are generally unacceptable and call for spoofing countermeasures or "presentation attack detection" systems. In addition to impersonation, ASV systems are vulnerable to replay, speech synthesis, and voice conversion attacks. The ASVspoof 2019 edition is the first to consider all three spoofing attack types within a single challenge. While they originate from the same source database and same Underlying Protocol, they are explored in two specific use case scenarios. Spoofing attacks within a logical access (LA) scenario are generated with the latest speech synthesis and voice conversion technologies, including state-of-the-art neural acoustic and waveform model techniques. Replay spoofing attacks within a physical access (PA) scenario are generated through carefully controlled simulations that support much more revealing analysis than possible previously. Also new to the 2019 edition is the use of the tandem detection cost function metric, which reflects the impact of spoofing and countermeasures on the reliability of a fixed ASV system. This paper describes the database design, Protocol, spoofing attack implementations, and baseline ASV and countermeasure results. It also describes a human assessment on spoofed data in logical access. It was demonstrated that the spoofing data in the ASVspoof 2019 database have varied degrees of perceived quality and similarity to the target speakers, including spoofed data that cannot be differentiated from bona-fide utterances even by human subjects.Comment: Accepted, Computer Speech and Language. This manuscript version is made available under the CC-BY-NC-ND 4.0. For the published version on Elsevier website, please visit https://doi.org/10.1016/j.csl.2020.10111

  • ASVspoof 2019: A large-scale public database of synthetized, converted and replayed speech
    'Elsevier BV', 2020
    Co-Authors: Wang Xin, Yamagishi Junichi, Todisco Massimiliano, Delgado Hector, Nautsch Andreas, Evans Nicholas, Vestman Ville, Kinnunen Tomi, Lee, Kong Aik
    Abstract:

    Automatic speaker verification (ASV) is one of the most natural and convenient means of biometric person recognition. Unfortunately, just like all other biometric systems, ASV is vulnerable to spoofing, also referred to as “presentation attacks.” These vulnerabilities are generally unacceptable and call for spoofing countermeasures or “presentation attack detection” systems. In addition to impersonation, ASV systems are vulnerable to replay, speech synthesis, and voice conversion attacks. The ASVspoof challenge initiative was created to foster research on anti-spoofing and to provide common platforms for the assessment and comparison of spoofing countermeasures. The first edition, ASVspoof 2015, focused upon the study of countermeasures for detecting of text-to-speech synthesis (TTS) and voice conversion (VC) attacks. The second edition, ASVspoof 2017, focused instead upon replay spoofing attacks and countermeasures. The ASVspoof 2019 edition is the first to consider all three spoofing attack types within a single challenge. While they originate from the same source database and same Underlying Protocol, they are explored in two specific use case scenarios. Spoofing attacks within a logical access (LA) scenario are generated with the latest speech synthesis and voice conversion technologies, including state-of-the-art neural acoustic and waveform model techniques. Replay spoofing attacks within a physical access (PA) scenario are generated through carefully controlled simulations that support much more revealing analysis than possible previously. Also new to the 2019 edition is the use of the tandem detection cost function metric, which reflects the impact of spoofing and countermeasures on the reliability of a fixed ASV system. This paper describes the database design, Protocol, spoofing attack implementations, and baseline ASV and countermeasure results. It also describes a human assessment on spoofed data in logical access. It was demonstrated that the spoofing data in the ASVspoof 2019 database have varied degrees of perceived quality and similarity to the target speakers, including spoofed data that cannot be differentiated from bona fide utterances even by human subjects. It is expected that the ASVspoof 2019 database, with its varied coverage of different types of spoofing data, could further foster research on anti-spoofing.final draftpeerReviewe

  • ASVspoof 2019: A large-scale public database of synthesized, converted and replayed speech
    'Elsevier BV', 2020
    Co-Authors: Wang Xin, Yamagishi Junichi, Todisco Massimiliano, Delgado Hector, Nautsch Andreas, Evans Nicholas, Vestman Ville, Kinnunen Tomi, Lee, Kong Aik
    Abstract:

    International audienceAutomatic speaker verification (ASV) is one of the most natural and convenient means of biometric person recognition. Unfortunately , just like all other biometric systems, ASV is vulnerable to spoofing, also referred to as "presentation attacks." These vulnerabilities are generally unacceptable and call for spoofing countermeasures or "presentation attack detection" systems. In addition to impersonation, ASV systems are vulnerable to replay, speech synthesis, and voice conversion attacks. The ASVspoof challenge initiative was created to foster research on anti-spoofing and to provide common platforms for the assessment and comparison of spoofing countermeasures. The first edition, ASVspoof 2015, focused upon the study of countermeasures for detecting of text-to-speech synthesis (TTS) and voice conversion (VC) attacks. The second edition, ASVspoof 2017, focused instead upon replay spoofing attacks and countermeasures. The ASVspoof 2019 edition is the first to consider all three spoofing attack types within a single challenge. While they originate from the same source database and same Underlying Protocol, they are explored in two specific use case scenarios. Spoofing attacks within a logical access (LA) scenario are generated with the latest speech synthesis and voice conversion technologies, including state-of-the-art neural acoustic and waveform model techniques. Replay spoofing attacks within a physical access (PA) scenario are generated through carefully controlled simulations that support much more revealing analysis than possible previously. Also new to the 2019 edition is the use of the tandem detection cost function metric, which reflects the impact of spoofing and countermeasures on the reliability of a fixed ASV system. This paper describes the database design, Protocol, spoofing attack implementations, and baseline ASV and countermeasure results. It also describes a human assessment on spoofed data in logical access. It was demonstrated that the spoofing data in the ASVspoof 2019 database have varied degrees of perceived quality and similarity to the target speakers, including spoofed data that cannot be differentiated from bona fide utterances even by human subjects. It is expected that the ASVspoof 2019 database, with its varied coverage of different types of spoofing data, could further foster research on anti-spoofing

D Manjunath - One of the best experts on this subject based on the ideXlab platform.

  • outdoor cooperative flight using decentralized consensus algorithm and a guaranteed real time communication Protocol
    Control Engineering Practice, 2019
    Co-Authors: Apurva Joshi, Ankit Wala, Mohit Ludhiyani, Debraj Chakraborty, Hoam Chung, D Manjunath
    Abstract:

    Abstract This paper describes the implementation of a decentralized consensus law with theoretically provable convergence properties on a multi-agent testbed comprising of quadrotors. It is shown that for small roll and pitch angles and well-tuned control loops, the quadrotor dynamics can be approximated as a pair of double integrators. Several experiments are carried out in an outdoor environment for validation of the consensus law which is based on double integrator dynamics. For any arbitrary initial positions of the quadrotors, the consensus law is able to drive them to an autonomously decided common point, given that the communication graph is connected at each instant of time. The resulting experimental trajectories and the consensus point matches with theoretical predictions. For guaranteeing real-time reliability required for such coordinated motion, a novel synchronized, time-slotted, scalable and fully airborne communication Protocol is proposed. The Protocol avoids data collisions and ensures real-time, reliable communication between agents. It can also address changing communication graph topologies, temporary link-breaks and additions. Using this Underlying Protocol, the quadrotors attain consensus for static and dynamic communication graphs. Experiments to observe the effect of communication rate on consensus performance are also conducted.

El-ghazali Talbi - One of the best experts on this subject based on the ideXlab platform.

  • Metaheuristic traceability attack against SLMAP, an RFID lightweight authentification Protocol
    International Journal of Foundations of Computer Science, 2012
    Co-Authors: Julio Hernandez-castro, Juan Manuel Estevez-tapiador, Pedro Peris-lopez, John Clark, El-ghazali Talbi
    Abstract:

    We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication Protocol for RFID environments called SLMAP, and analyze its implications. The main interest of our approach is that it constitutes a complete black-box technique that does not make any assumptions on the components of the Underlying Protocol and can thus be easily generalized to analyze many other proposals.

  • metaheuristic traceability attack against slmap an rfid lightweight authentication Protocol
    International Parallel and Distributed Processing Symposium, 2009
    Co-Authors: Julio C Hernandezcastro, Juan E Tapiador, Pedro Perislopez, John A Clark, El-ghazali Talbi
    Abstract:

    We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication Protocol for RFID environments called SLMAP, and analyse its implications. The main interest of our approach is that it is a complete black-box technique that doesn't make any assumptions on the components of the Underlying Protocol and can thus be easily generalised to analyse many other proposals.