A mobile replicated database is comprised of several mobile and fixed servers and clients interconnected through a wireless network. In order to ensure data consistency in mobile replicated databases, several replicat...
详细信息
Embracing service-oriented architectures in the context of large systems, such as the Web, rises a set of new and challenging issues: increased size and load in terms of users and services, distribution, and dynamicit...
详细信息
Micro-Electro-Mechanical Systems (MEMS) sensors are used nowadays in a wide range of applications, from robotics to entertainment. Recently, this technology has also been adopted to equip Inertial Measurement Units (I...
详细信息
The vast number of on-line biological and medical databases available can be a great resource for biomedical researchers. However, the different types of data and interfaces available can be overwhelming for many biom...
详细信息
For distributed software systems, ensuring their availability under intentional attacks is critical. Traffic analysis, conducted by the attacker, could reveal the protocol being carried out by the components. Furtherm...
详细信息
Spam has become an increasingly important problem with a big economic impact in society. Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an acti...
详细信息
Extensive research activities are recently directed towards the Semantic Web as a future form of the Web. Consequently, Web search as the key technology of the Web is evolving towards some novel form of Semantic Web s...
详细信息
In this paper, we explore the problem of processing a novel type of location based queries, named the location based top-k query, which involves both of spatial and non-spatial specifications for data objects in the w...
详细信息
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling...
详细信息
ISBN:
(纸本)9781450302753
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in those systems. The model is multi-constraints and utility-based, and takes into account computing resources, the perceived risk level, and user preferences. We illustrate through a case study of a typical Beyond 3G adaptive multimedia streaming service how the model may be applied to find the right balance between different QoS and security dimensions.
作者:
Ghosh, PavelSen, ArunabhaComputing
Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States
Voltage islanding technique in Network-on-Chip (NoC) can significantly reduce the computational energy consumption by scaling down the voltage levels of the processing elements (PEs). This reduction in energy consumpt...
详细信息
暂无评论