Ubiquitous computing is an emerging paradigm for health care environments, in which devices must blend into the background unobtrusively, collaborating to provide value-added services for users. Insufficient informati...
详细信息
ISBN:
(纸本)9780769528472
Ubiquitous computing is an emerging paradigm for health care environments, in which devices must blend into the background unobtrusively, collaborating to provide value-added services for users. Insufficient information flow and coordination are some of the main concerns in a ubiquitous health care environment. Resources are, therefore, essential to the success of this technology and, as a result, both resource discovery and management play a vital role in sustainable ubiquitous deployment. In this paper, we present a novel resource discovery mechanism for ubiquitous computing environments using Resource Index nodes (RIns) and mobile agents. The context information needed to process a query is identified and mobile agents are deployed to explore the ubiquitous environment for requested resources. We present a health care scenario and evaluate our proposed resource discovery method.
Data warehouses store large volumes of data according to a multidimensional model that provides a fast access for online analysis. The constant growth in quantity and complexity of data stored in data warehouses has l...
详细信息
ISBN:
(纸本)9780769528465
Data warehouses store large volumes of data according to a multidimensional model that provides a fast access for online analysis. The constant growth in quantity and complexity of data stored in data warehouses has led to a variety of data warehouse applications on distributed systems. The main benefits of these architectures are parallelized query execution and higher storage capacities. computing grids in particular are built to combine a large number of heterogeneous distributed resources. Their lack If of centralized control however conflicts with the centralized structure of classical data warehouses. Autonomous data management on grid nodes requires efficient communication during query evaluation. The architecture we present supports a global data localization method with the help of a specialized catalog service. Our work is based on a model for unique identification and efficient local indexing of the warehouse data. Local indexes integrate computable aggregates for maximum utilization of locally materialized data in order to facilitate cost-optimized query execution. The grid services implementing these Junctionalities are deployed on the GGM project's test environment.
Web service technology is based on Service-Oriented Architecture (SOA) as new computing paradigm and an intelligent agent platform provides service-discovery, communication, and interaction between heterogeneous platf...
详细信息
ISBN:
(纸本)9788955191318
Web service technology is based on Service-Oriented Architecture (SOA) as new computing paradigm and an intelligent agent platform provides service-discovery, communication, and interaction between heterogeneous platforms as middleware. As these trends looked promising, we propose an advanced SOA model using Web service by the intelligent agent platform. We aim to support the interoperability of service-oriented and large scale domain through integration of two technologies in this paper.
In the near future, homes are envisioned to be equipped with numerous intelligent communicating devices. Such smart home-needs to exhibit highly adaptive behavior to meet the inhabitants changing personal requirements...
详细信息
A series of problems arises with the emergence and fast development of grid. Among all the problems, one of them is how to smoothly connect heterogeneous grid platforms. There are a number of ways to solve this proble...
详细信息
In this paper, a cooperative wireless multi-hop network is considered, cooperative diversity can be realized by allowing nodes close proximity to cooperate in transmission. In order to group receiver nodes into a clus...
详细信息
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scenarios. Coalition access control encomp...
详细信息
Mining concept drifts is one of the most important fields in mining data streams. In this paper, a new ensemble algorithm called ICEA is proposed for mining concept drifts from data streams, which uses ensemble multi-...
详细信息
NFS is considered to be the bottleneck in cluster computing environment because of its limited resources and centralized data management. With the development of hardware, NFS server has more than one I/O channel, mor...
详细信息
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key operations of PKI require by far more ...
详细信息
ISBN:
(纸本)9780769528472
PKI is generally considered as the most appropriate solution for e-commerce and mutual authentication, owing to its digital signature and non-repudiation features. Asymmetric key operations of PKI require by far more CPU cycles than a symmetric cryptographic algorithm. It hampers the usability of PKI on resource-constrained devices. To overcome these limitations, we propose a new PKI-based authentication protocol and security infrastructure enhanced with single sign-on and delegation technology for a device with a restricted computing power Although a conventional delegation mechanism cannot support non-repudiation mechanism against malicious user's behavior our proposed protocol and security, infrastructure can provide the mechanism by devising a referee server that generates binding information between a device and authentication messages, and retains the information in its local storage for future accusation.
暂无评论