Commits

Gérald Arnould committed b8b88cc

- Page limit = 6
- reformat pictures to respect the limit
- remove 1 picture
- pdf conformity check

Comments (0)

Files changed (5)

2012-UBIROADS-TUDOR.tex

 
 \begin{figure}[!h]
     \centering
-    \includegraphics[width=0.99\columnwidth]{wsc-services-dia}
+    \includegraphics[width=1.01\columnwidth]{wsc-services-dia}
     \caption{Dynamic carpooling and WiSafeCar related services}
     \label{fig_wsc-platform}
 \end{figure}
 This architecture is highly scalable and able to easily include new services:
 geolocalized meteorological information, infotainment services, etc.
 
-\begin{figure*}[!ht]
+\begin{figure}[!ht]
     \centering
-    \includegraphics[width=6.83in]{general-archi-big}
+    \includegraphics[width=0.99\columnwidth]{general-archi-big}
     \caption{Global Multi-Agent Architecture}
     \label{fig_multi-agent-architecture}
-\end{figure*}
+\end{figure}
 
 Each agent has responsibilities and capabilities in order to achieve a specific task. Local agents are running
 on the user's devices and are the bridge between the Android application
 
 \begin{figure}[!h]
     \centering
-    \includegraphics[width=2.6in]{bluetooth1}
+    \includegraphics[width=0.9\columnwidth]{bluetooth1}
     \caption{Mutual authentication via Bluetooth}
     \label{fig_mutual-authentication}
 \end{figure}
 Each transaction supported by the MAS network is authenticated and encrypted.
 Obtaining a signed public key is mandatory for each actor trying to send
 something on the network.
-Figure~\ref{fig_getting-a-public-key}
-depicts how Bob will get the public key of Alice in order to send secured
-and authenticated messages. The keystore agent is responsible for the keys of all
+%Figure~\ref{fig_getting-a-public-key}
+In the following example, Bob will get the public key of Alice in order to send secured
+and authenticated messages. 
+The keystore agent is responsible for the keys of all
 authenticated users. This agent is involved when:
 \begin{itemize}
     \item a client receives the list of waypoints which also contains pickup points.
 won't be able to use the platform, which means that prior registration with the
 service is mandatory.
 
-\begin{figure}[!h]
-    \centering
-    \includegraphics[width=2.8in]{gettingApublicKey}
-    \caption{Bob needs the public key of Alice}
-    \label{fig_getting-a-public-key}
-\end{figure}
+%\begin{figure}[!h]
+%    \centering
+%    \includegraphics[width=2.8in]{gettingApublicKey}
+%    \caption{Bob needs the public key of Alice}
+%    \label{fig_getting-a-public-key}
+%\end{figure}
 
 \subsection{Inheritance from XMPP security features}
 SPADE communication system relies on XMMP and consequently inherits from features of XMPP.

images/bluetooth1.png

Old
Old image
New
New image

images/draw.odg

Binary file modified.

images/general-archi-big.png

Old
Old image
New
New image

images/gettingApublicKey.png

Old
Old image
New
New image