Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase perform...
详细信息
ISBN:
(纸本)1595934804
Mobile computing allows for the development of new and sophisticated database applications. Such applications require the reading of current and consistent data. In order to improve data availability, increase performance and maximize throughput, data replication is used. However, due to inherent limitations in mobile and other loosely-coupled environments, the concurrency control and replica control mechanisms must be revisited. This paper proposes a new protocol that guarantees the consistency of replicated data in a mobile computing environment, while provide high data availability and ensure an eventual replica convergence towards a strongly consistent state. Copyright 2007 acm.
A practical approach is described for integrating knowledge technology and traditional database technology;this approach generates systems that are maintainable in a precise sense. Integration of systems is achieved b...
详细信息
As grid computing scales up in size and diversity, anonymous communications will be desirable, and sometimes vital, for certain applications. However, existing anonymity protocols, when being applied to grid applicati...
详细信息
ISBN:
(纸本)0769522564
As grid computing scales up in size and diversity, anonymous communications will be desirable, and sometimes vital, for certain applications. However, existing anonymity protocols, when being applied to grid applications, either dramatically degrade system efficiency or cause severe performance bottlenecks. We found that a distributed and highly efficient anonymity protocol can be designed if one considers the existing trust in grids. We have designed such a protocol based on controlled anonymity, which maintains an entity's anonymity against untrustable entities. To our best knowledge, this protocol is the first one of its kind. Using the existing methods from anonymity studies, we quantitatively analyze the degree of anonymity that could be offered by this protocol, and use a simulator to confirm its efficiency advantage over the existing protocols.
Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or loc...
详细信息
In this paper, we investigate the impact of different fog topologies in fog planning on provisioning diverse IoT tasks under an integrated cloud and fog framework (iCloudFog). Two Integer Linear Programming (ILP) mode...
详细信息
ISBN:
(纸本)9781450368667
In this paper, we investigate the impact of different fog topologies in fog planning on provisioning diverse IoT tasks under an integrated cloud and fog framework (iCloudFog). Two Integer Linear Programming (ILP) models are proposed for ring and star topologies, respectively. Note that similar issue for fully-connected mesh topology has been addressed in our previous work[2], which will be used as a benchmark in the performance comparison. Numerical analyses and comparisons are conducted in terms of the CAPEX, OPEX and average hops for different topologies.
The combination of edge and cloud in the fog computing paradigm enables a new breed of data-intensive applications. These applications, however, have to face a number of fog-specific challenges which developers have t...
详细信息
ISBN:
(纸本)9781450368667
The combination of edge and cloud in the fog computing paradigm enables a new breed of data-intensive applications. These applications, however, have to face a number of fog-specific challenges which developers have to repetitively address for every single application. In this paper, we derive a set of requirements for a replication service that aims to simplify the development of data-intensive fog applications which are caused by the highly distributed and heterogeneous operation environment. Furthermore, we propose the design for such a service which addresses our requirements.
This paper aims to propose an XML-based protocol for two Web Services to utilise TN to establish a trust relationship between them. The main contribution of this protocol is towards preventing failed TN caused by the ...
详细信息
Elasticity is a feature quite important for cloud computing and it is related to how a system autonomously adapts its capacity over time to fit the workload variation. In this context, this paper proposes an elastic a...
详细信息
A new analytical model for predicting message delay in wormhole-routed torus is presented. Unlike previous wormhole routing models, which mainly have been developed for uniform traffic, the model introduced in this pa...
详细信息
A new analytical model for predicting message delay in wormhole-routed torus is presented. Unlike previous wormhole routing models, which mainly have been developed for uniform traffic, the model introduced in this paper computes message latency in the wormhole-routed torus in the presence of broadcast traffic. Results obtained through simulation experiments show that the model exhibits a good degree of accuracy in predicting message latency under different working conditions.
暂无评论