Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tiago T. V. Vinhoza is active.

Publication


Featured researches published by Tiago T. V. Vinhoza.


IEEE Journal on Selected Areas in Communications | 2011

Impact of Vehicles as Obstacles in Vehicular Ad Hoc Networks

Mate Boban; Tiago T. V. Vinhoza; Michel Ferreira; João Barros; Ozan K. Tonguz

A thorough understanding of the communications channel between vehicles is essential for realistic modeling of Vehicular Ad Hoc Networks (VANETs) and the development of related technology and applications. The impact of vehicles as obstacles on vehicle-to-vehicle (V2V) communication has been largely neglected in VANET research, especially in simulations. Useful models accounting for vehicles as obstacles must satisfy a number of requirements, most notably accurate positioning, realistic mobility patterns, realistic propagation characteristics, and manageable complexity. We present a model that satisfies all of these requirements. Vehicles are modeled as physical obstacles affecting the V2V communication. The proposed model accounts for vehicles as three-dimensional obstacles and takes into account their impact on the LOS obstruction, received signal power, and the packet reception rate. We utilize two real world highway datasets collected via stereoscopic aerial photography to test our proposed model, and we confirm the importance of modeling the effects of obstructing vehicles through experimental measurements. Our results show considerable obstruction of LOS due to vehicles. By obstructing the LOS, vehicles induce significant attenuation and packet loss. The algorithm behind the proposed model allows for computationally efficient implementation in VANET simulators. It is also shown that by modeling the vehicles as obstacles, significant realism can be added to existing simulators with clear implications on the design of upper layer protocols.


IEEE Journal on Selected Areas in Communications | 2011

On the Delay Distribution of Random Linear Network Coding

Maricica Nistor; Daniel E. Lucani; Tiago T. V. Vinhoza; Rui A. Costa; João Barros

A fundamental understanding of the delay behavior of network coding is key towards its successful application in real-time applications with strict message deadlines. Previous contributions focused mostly on the average decoding delay, which although useful in various scenarios of interest is not sufficient for providing worst-case delay guarantees. To overcome this challenge, we investigate the entire delay distribution of random linear network coding for any field size and arbitrary number of encoded symbols (or generation size). By introducing a Markov chain model we are able to obtain a complete solution for the erasure broadcast channel with two receivers. A comparison with Automatic Repeat reQuest (ARQ) with perfect feedback, round robin scheduling and a class of fountain codes reveals that network coding on GF(24) offers the best delay performance for two receivers. We also conclude that GF(2) induces a heavy tail in the delay distribution, which implies that network coding based on XOR operations although simple to implement bears a relevant cost in terms of worst-case delay. For the case of three receivers, which is mathematically challenging, we propose a brute-force methodology that gives the delay distribution of network coding for small generations and field size up to GF(24).


global communications conference | 2010

Trusted Storage over Untrusted Networks

Paulo F. Oliveira; Luisa Lima; Tiago T. V. Vinhoza; João Barros; Muriel Médard

We consider distributed storage over two untrusted networks, whereby coding is used as a means to achieve a prescribed level of confidentiality. The key idea is to exploit the algebraic structure of the Vandermonde matrix to mix the input blocks, before they are stored in different locations. The proposed scheme ensures that eavesdroppers with access to only one of the networks are unable to decode any symbol even if they are capable of guessing some of the missing blocks. Information-theoretic techniques allow us to quantify the achievable level of confidentiality. Moreover, the proposed approach is shown to offer low complexity and optimal rate.


IEEE Transactions on Information Forensics and Security | 2012

Coding for Trusted Storage in Untrusted Networks

Paulo F. Oliveira; Luisa Lima; Tiago T. V. Vinhoza; João Barros; Muriel Médard

We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low complexity scheme that relies on erasure coding techniques for achieving prescribed levels of confidentiality and reliability. Using matrices that have no singular square submatrices, we subject the original data to a linear transformation. The resulting coded symbols are then stored in different networks. This scheme allows users with access to a threshold number of networks to reconstruct perfectly the original data, while ensuring that eavesdroppers with access to any number of networks smaller than this threshold are unable to decode any of the original symbols. This holds even if the attackers are able to guess some of the missing symbols. We further quantify the achievable level of security, and analyze the complexity of the proposed scheme.


international conference of the ieee engineering in medicine and biology society | 2013

Heart sound segmentation of pediatric auscultations using wavelet analysis

Ana Castro; Tiago T. V. Vinhoza; Sandra da Silva Mattos; Miguel Tavares Coimbra

Auscultation is widely applied in clinical activity, nonetheless sound interpretation is dependent on clinician training and experience. Heart sound features such as spatial loudness, relative amplitude, murmurs, and localization of each component may be indicative of pathology. In this study we propose a segmentation algorithm to extract heart sound components (S1 and S2) based on its time and frequency characteristics. This algorithm takes advantage of the knowledge of the heart cycle times (systolic and diastolic periods) and of the spectral characteristics of each component, through wavelet analysis. Data collected in a clinical environment, and annotated by a clinician was used to assess algorithms performance. Heart sound components were correctly identified in 99.5% of the annotated events. S1 and S2 detection rates were 90.9% and 93.3% respectively. The median difference between annotated and detected events was of 33.9 ms.


international conference of the ieee engineering in medicine and biology society | 2014

Automatic heart sound segmentation and murmur detection in pediatric phonocardiograms

Joao Pedrosa; Ana Castro; Tiago T. V. Vinhoza

The digital analysis of heart sounds has revealed itself as an evolving field of study. In recent years, numerous approaches to create decision support systems were attempted. This paper proposes two novel algorithms: one for the segmentation of heart sounds into heart cycles and another for detecting heart murmurs. The segmentation algorithm, based on the autocorrelation function to find the periodic components of the PCG signal had a sensitivity and positive predictive value of 89.2% and 98.6%, respectively. The murmur detection algorithm is based on features collected from different domains and was evaluated in two ways: a random division between train and test set and a division according to patients. The first returned sensitivity and specificity of 98.42% and 97.21% respectively for a minimum error of 2.19%. The second division had a far worse performance with a minimum error of 33.65%. The operating point was chosen at sensitivity 69.67% and a specificity 46.91% for a total error of 38.90% by varying the percentage of segments classified as murmurs needed for a positive murmur classification.


Archive | 2011

Modeling and Simulation of Vehicular Networks: towards Realistic and Efficient Models

Mate Boban; Tiago T. V. Vinhoza

Vehicular Ad Hoc Networks (VANETs) have been envisioned with three types of applications in mind: safety, traffic management, and commercial applications. By using wireless interfaces to form an ad hoc network, vehicles will be able to inform other vehicles about traffic accidents, hazardous road conditions and traffic congestion. Commercial applications (e.g., data exchange, audio/video communication) are envisioned to provide incentive for faster adoption of the technology. To date, the majority of VANET research efforts have relied heavily on simulations, due to prohibitive costs of employing real world testbeds. Current VANET simulators have gone a long way from the early VANET simulation environments, which often assumed unrealistic models such as random waypoint mobility, circular transmission range, or interference-free environment Kotz et al. (2004). However, significant efforts still remain in order to enhance the realism of VANET simulators, at the same time providing a computationally inexpensive and efficient platform for performance evaluation of VANETs.


Security and Communication Networks | 2012

Security and privacy issues for the network of the future

Giannis F. Marias; João Barros; Markus Fiedler; Andreas Fischer; Harald Hauff; Ralph Herkenhoener; Antonio Grillo; Alessandro Lentini; Luisa Lima; Charlott Lorentzen; Wojciech Mazurczyk; Hermann de Meer; Paulo F. Oliveira; George C. Polyzos; Enric Pujol; Krzysztof Szczypiorski; João P. Vilela; Tiago T. V. Vinhoza

The vision towards the Network of the Future cannot be separated from the fact that todays networks, and networking services are subject to sophisticated and very effective attacks. When these attacks first appeared, spoofing and distributed denial-of-service attacks were treated as apocalypse for networking. Now, they are considered moderate damage, whereas more sophisticated and inconspicuous attacks, such as botnets activities, might have greater and far reaching impact. As the Internet is expanding to mobile phones and ‘smart dust’ and as its social coverage is liberalized towards the realization of ubiquitous computing (with communication), the concerns on security and privacy have become deeper and the problems more challenging than ever. Re-designing the Internet as the Network of the Future is self-motivating for researchers, and security and privacy cannot be provided again as separate, external, add-on, solutions. In this paper, we discuss the security and privacy challenges of the Network of the Future and try to delimit the solutions space on the basis of emerging techniques. We also review methods that help the quantification of security and privacy in an effort to provide a more systematic and quantitative treatment of the area in the future. Copyright


information theory and applications | 2010

Network coding delay: A brute-force analysis

Maricica Nistor; João Barros; Fausto Vieira; Tiago T. V. Vinhoza; Joerg Widmer

Understanding the delay behavior of network coding with a fixed number of receivers, small field sizes and a limited number of encoded symbols is a key step towards its applicability in real-time communication systems with stringent delay constraints. Previous results are typically asymptotic in nature and focus mainly on the average delay performance. Seeking to characterize the complete delay distribution of random linear network coding, we present a brute-force methodology that is feasible for up to four receivers, limited field and generation sizes. The key idea is to fix the pattern of packet erasures and to try out all possible encodings for various system and channel parameters. Our findings, which are valid for both decoding delay and ordered-delivery delay, can be used to optimize network coding protocols with respect not only to their average but also to their worst-case performance.


international workshop on signal processing advances in wireless communications | 2007

Performance comparison of minimum variance single carrier and multicarrier cdma receivers

Cesar A. Medina; Tiago T. V. Vinhoza; Raimundo Sampaio-Neto

This work provides comparisons between CDMA-based multiple access systems in a single and multicarrier fashion. Both zero padding and cyclic prefix types of guard intervals are considered. Comparisons include different performance measures such as signal-to-interference plus noise ratio (SINR), bit error rate (BER), and robustness against channel order overestimation. We also address the effects of finite number of samples when estimating the detector filter. In order to allow a fair comparison, blind detection based on the minimum variance is assumed for all considered systems. It is shown through computer simulations that multicarrier CDMA performs better than single carrier CDMA and is more robust against channel order overestimation.

Collaboration


Dive into the Tiago T. V. Vinhoza's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Raimundo Sampaio-Neto

Pontifical Catholic University of Rio de Janeiro

View shared research outputs
Top Co-Authors

Avatar

Cesar A. Medina

Pontifical Catholic University of Rio de Janeiro

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fabian David Backx

Pontifical Catholic University of Rio de Janeiro

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge