Intelligent Transportation Systems (ITS) have been identified as a key application of the internet of Things (IoT). In order to reduce latency and bandwidth needs, edge computing offers a distributedcomputing archite...
详细信息
Peer-to-Peer Constructed on the basis of the distributed Hash Table don39;t consider the underlying physical network topology when it build logical Overlay, which lead topology mismatch. In the mobile environment, n...
详细信息
ISBN:
(纸本)9781424420209
Peer-to-Peer Constructed on the basis of the distributed Hash Table don't consider the underlying physical network topology when it build logical Overlay, which lead topology mismatch. In the mobile environment, nodes move randomly, join and leave frequently, which have exacerbated the underlying physical network topology dynamic changes, and further exacerbated mismatch between the logical Overlay and the underlying physical network.
The evolution of networks and internet has introduced highly scalable and available services making operational environments more complex. The increasing complexity, cost and heterogeneity of distributedcomputing sys...
详细信息
The traditional approaches towards implementing mutual exclusion can not be applied for distributed systems where nodes are loosely coupled. The existing algorithms typically follow either a symmetric or a token based...
详细信息
ISBN:
(纸本)9783540683797
The traditional approaches towards implementing mutual exclusion can not be applied for distributed systems where nodes are loosely coupled. The existing algorithms typically follow either a symmetric or a token based approach. While the symmetric algorithms tend to increase the network traffic, token based approach offers solutions at a lower communication cost. Raymond has designed an efficient token based mutual exclusion algorithm. However, one major limitation of Raymond's algorithm is the lack of fairness in the sense that a token request that is generated later may be granted ahead of another request that was made earlier. In this work, we have proposed a modification of Raymond's algorithm. The new token based algorithm not only overcomes the fairness problem, but also handles the priority of the requesting processes.
It is widely recognized that the scalable and efficient management of large, heterogeneous information technology infrastructures requires middleware that allows the extension of managed resources with new functionali...
详细信息
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signal...
ISBN:
(纸本)9781538625651
The proceedings contain 53 papers. The topics discussed include: sentiment identification for collaborative, geographically dispersed, cross-functional software development teams;WebNSM: a novel scalable WebRTC signaling mechanism for many-to-many video conferencing;concurrent command and consistency management for distributed compound document authoring;model selection based on kalman temporal differences learning;extracting linked data from HTML tables;source identification for printed documents;when do changes induce software vulnerabilities?;VAPTAi: a threat model for vulnerability assessment and penetration testing of android and iOS mobile banking apps;and detecting android malwares by mining statically registered broadcast receivers.
Nowadays, the internet of Things is significantly used in the world of information technology. One of the most important things for the internet of Things is RFID tags that send information out of the environment. For...
详细信息
ISBN:
(纸本)9783319725505;9783319725499
Nowadays, the internet of Things is significantly used in the world of information technology. One of the most important things for the internet of Things is RFID tags that send information out of the environment. Forasmuch as the security process is important, the network authentication should be done with great accuracy. In this study, we propose a cryptographic authentication method that can increase the security of internet of Things against various attacks.
In many fields, equipment control management systems are often used. The main purpose is to monitor and manage various types of equipment and software systems required for work, aiming to improve the efficiency and ma...
详细信息
Blockchains started as an enabling technology in the area of digital currencies with the introduction of Bitcoin. However, blockchains have emerged as a technology that goes beyond financial transactions by providing ...
详细信息
We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers39; impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability know...
详细信息
ISBN:
(纸本)9783319044835;9783319044828
We consider an equilibrium threshold balking strategy in an unobservable GI/M/c queue with customers' impatience. Upon arriving a customer decides whether to join or balk the queue based on random probability known as joining probability (f). Once a customer decides to join the system it initiates an impatient timer with random duration T, such that, if customers' service is not completed before the timer expires, the customer abandons the system. The waiting time of a customer in system has been associated with a linear cost-reward structure for estimating the net benefit if a customer chooses to participate in the system. The study has been limited to unobservable queue where the information regarding system-length is unknown to the arriving customer. The proposed analysis is based on a root of the characteristic equation formed using the probability generating function of embedded pre-arrival epoch probabilities. Therefore, we obtain the stationary system-length distribution at pre-arrival and arbitrary epochs and thereby we obtain mean system sojourn time. Finally, we present numerical results in the form of graphs for observing net benefit against different model parameters. The proposed model has applications in the modeling of balking and impatient behavior of incoming calls in a call center, multi-core computing, multi-path routing in delay sensitive communications networks.
暂无评论