An Application-level overlay multicasting for provide cloudy computing service on the Internet for multi-agents sharing application with single sources. A mechanism is proposed by use minimum amount of traffic overhea...
详细信息
An Application-level overlay multicasting for provide cloudy computing service on the Internet for multi-agents sharing application with single sources. A mechanism is proposed by use minimum amount of traffic overhead to get routing information in trees and it is very simple to calculate optimal route compared with conventional scheme in overlay routing protocol. Performance efficient results for real-time, concurrent service is achieved to stream trees with propose scheme. the proposed scheme does well in terms of session connections, especially when multi-agents number grows. Number of hosts against group size after the agent-base distributed processing seems to be the best. Our analysis results show that proposed scheme can support more efficient than conventional routing and reduce the network overhead for the application-level approaches to cloudy computing service.
Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a new network paradigm of sensor information s...
详细信息
ISBN:
(纸本)9780769543956
Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a new network paradigm of sensor information sharing in urban environments. the key enablers are the smart phones (e.g., iPhones and Android phones) equipped with onboard sensors (e.g., cameras, accelerometer, compass, GPS), and various wireless devices (e.g., WiFi and 2/3G). the goal of this paper is to design a scalable sensor networking platform where millions of users on the move can participate in urban sensing and share location-aware information using always-on cellular data connections. We propose a two-tier sensor networking platform called GeoServ where mobile users publish/access sensor data via an Internet-based distributed P2P overlay network. the main contribution of this paper is two-fold: a location-aware sensor data retrieval scheme that supports geographic range queries, and a location-aware publish-subscribe scheme that enables efficient multicast routing over a group of subscribed users. We prove that GeoServ protocols preserve locality and validate their performance via extensive simulations.
Installation of a large number of small sources called distributed generation creates many problems in proper control of national (and European) power grid. At the same time new technologies especially power electroni...
详细信息
Installation of a large number of small sources called distributed generation creates many problems in proper control of national (and European) power grid. At the same time new technologies especially power electronics and measurement data computing associated with smart grid allows to use better and conscious these distributed sources. this paper describes what problems the distributed generation may cause, how this is mitigated and how the smart grid approach may take advantage of specific characteristic of distributed sources for ensuring more reliable quality of supply.
At times of large scale, heterogeneous computing infrastructures gathering myriads of services, service discovery has become a critical feature that has to deal withthe scale and dynamic nature of such platforms. the...
详细信息
At times of large scale, heterogeneous computing infrastructures gathering myriads of services, service discovery has become a critical feature that has to deal withthe scale and dynamic nature of such platforms. the SPADES project (Servicing Petascale Architectures and distributed System) is a consortium whose purpose is to promote new solutions to deal withdistributed, volatile and heterogeneous computing resources. For the aforementioned reasons, at the project's core, the service discovery has been envisioned as fully decentralized. More precisely, the proposed P2P service discovery system proposed within the SPADES project is based on the DLPT approach (distributed Lexicographic Placement Table) providing distributed structures and algorithms for such a feature. In this paper, an implementation of the DLPT concepts into the middleware developed within the SPADES project, called SBAM, is devised. Moreover, its actual deployment over a nation-wide grid system, as well as its performance are detailed.
the use of Open Sim as a platform for enhanced learning concepts incorporates a variety of desirable attributes. the platform supports mixed-initiative functions, may incorporate social networking like aspects and doe...
详细信息
the use of Open Sim as a platform for enhanced learning concepts incorporates a variety of desirable attributes. the platform supports mixed-initiative functions, may incorporate social networking like aspects and does so in an immersive engaging 3D environment appealing to game players. the ability to communicate with outside applications and the ability to connect virtual worlds through a Hyper grid offer exciting possibilities.
Advances in wireless communication systems and mobile devices allow nomad users to participate in mobile collaborative activities. However the availability of hardware resources of the mobile devices that are particip...
详细信息
ISBN:
(纸本)9783642219306;9783642219313
Advances in wireless communication systems and mobile devices allow nomad users to participate in mobile collaborative activities. However the availability of hardware resources of the mobile devices that are participating in the collaboration process is a crucial factor that can enhance or jeopardize such activity. this paper studies how the network topology and the hardware resources distributed into a network influence the collaboration among the participants in the activities. the results obtained from simulating the strategy of resource sharing in an overlay network allowed us to observe two clear implications: (1) it is important to maximize the number of links between Desktop PC and mobile devices and (2) the mobile devices have to be placed within the network topology in the nodes with higher degree. According to these observations we have proposed an heuristic for node placement in order to maximize the cooperation level in terms of resource sharing.
this paper discusses the 3GPP Evolved Packet Core (EPC) as a deployment of a distributed data plane architecture. distributed GWs in connection with user mobility may result in the need to optimize data routing by GW ...
详细信息
this paper discusses the 3GPP Evolved Packet Core (EPC) as a deployment of a distributed data plane architecture. distributed GWs in connection with user mobility may result in the need to optimize data routing by GW relocation. It is proposed to include the GWs itself in the decision on GW relocation what is currently done in the control plane node (mobility management entity) only. Proposals are made to allow the relocation also for active mode devices (user activity detection), to detect the occurrence of a non optimal routing situation and to detect situations where a relocation should be suppressed to avoid particularly poor user experience. these improvements are compared with other solutions.
the proceedings contain 66 papers. the topics discussed include: design and implementation of service composition protocol based on DSR;Hamiltonian cycle embedding in hierarchical crossed cubes;systematic development ...
ISBN:
(纸本)9780769542874
the proceedings contain 66 papers. the topics discussed include: design and implementation of service composition protocol based on DSR;Hamiltonian cycle embedding in hierarchical crossed cubes;systematic development of correct bulk synchronous parallel programs;multiple search centers based fast motion estimation algorithm for H.264/AVC;transient congestion avoidance in software distributed shared memory systems;experiences with hierarchical storage management support in blue whale file system;commit protocols for a distributed transactional memory;a feature-based replica consistency strategy for spatial data in distributed GIS;integrating DBMSs as a read-only execution layer into hadoop;multi-aggregate-query scheduling over data streams;and Rawls scheduler: load considered proportional share scheduling for high performance multimedia systems.
Due to the dramatic increase of data volumes in different applications, it is becoming infeasible to keep these data in one centralized machine. It is becoming more and more natural to deal withdistributed databases ...
详细信息
Due to the dramatic increase of data volumes in different applications, it is becoming infeasible to keep these data in one centralized machine. It is becoming more and more natural to deal withdistributed databases and networks. that is why distributed data mining techniques have been introduced. One of the most important data mining problems is data clustering. While many clustering algorithms exist for centralized databases, there is a lack of efficient algorithms for distributed databases. In this paper, an efficient algorithm is proposed for clustering distributed databases. the proposed methodology employs an iterative optimization technique to achieve better clustering objective. the experimental results reported in this paper show the superiority of the proposed technique over a recently proposed algorithm based on a distributed version of the well known K-Means algorithm (Datta et al. 2009) [1].
the proceedings contain 25 papers. the special focus in this conference is on Information Security Applications. the topics include: An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6;hidden Credent...
ISBN:
(纸本)9783642179549
the proceedings contain 25 papers. the special focus in this conference is on Information Security Applications. the topics include: An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6;hidden Credential Retrieval without Random Oracles;combined Side-Channel Attacks;correlation Power Analysis Based on Switching Glitch Model;vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity;collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks;Full-Round Differential Attack on TWIS Block Cipher;Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations;Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis;predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage;Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram;fingerprint Liveness Detection Based on Multiple Image Quality Features;robust Feature Extraction for Facial Image Quality Assessment;round-Optimal Deniable Ring Authentication in the Presence of Big Brother;cross-Realm Password-Based Server Aided Key Exchange;a Two-Party Protocol with Trusted Initializer for computingthe Inner Product;a New Efficient Construction for Non-Malleable Zero-Knowledge Sets;distributed Paillier Cryptosystem without Trusted Dealer;Fast Scalar Multiplication for ECC over GF(p) Using Division Chains;Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs;low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices;a Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling;using Special Use Cases for Security in the Software Development Life Cycle.
暂无评论