This paper presents the Content Aware Network designed as one of the Parallel Internets developed on Virtual Infrastructure. The CAN is a post-IP network designed to facilitate access to multimedia content in large sc...
详细信息
Transportation related environment and social problems become very imminent with rapid urban growth. Road detection aims to detect road anomalous events that endanger vehicle driving. Road detection using Vehicle Sens...
详细信息
Social network is a term used to represent a large group of activities using the web and mobile technologies. The micro blogging social networks provide an appropriate ground for the users to explain themselves and ex...
详细信息
BPEL is a popular standard language in SOA enterprise for specifying business process. A developer has to use specific programming technologies to construct process structure and specify Web services inputs and output...
详细信息
Energy is a scarce resource on battery-powered wireless sensor nodes, and wireless communication represents the major consumer of electric energy on most current plat-forms. Reducing the number and size of radio trans...
详细信息
ISBN:
(纸本)9781467350754
Energy is a scarce resource on battery-powered wireless sensor nodes, and wireless communication represents the major consumer of electric energy on most current plat-forms. Reducing the number and size of radio transmissions thus represents a viable approach to save energy and extend a node's operational time. In the domain of pervasive computing, where a periodic reporting of data (e.g., a user's vital parameters) is often being used, packets cannot always be simply omitted from transmission. Even if the contained data have not changed, these periodically transmitted message double as beacons to indicate that the sensor node has not run out of energy. Hence, reducing the sizes of transmitted messages remains the only available solution to achieve energy savings in such sensor networks. In this paper, we show how pre-computed codebooks can be used to encode messages in an energy-efficient way and thus reduce the size of the transmitted packets. We present how we extract these code mappings from real-world data, and describe how packets are encoded prior to their transmission in order to reduce the incurred energy demand. We practically assess the energy demand on TelosB nodes and prove that up to 17.2% of energy can be saved when our approach is applied.
We present procedures that exploit mobility prediction and prefetching to enhance offloading of traffic from mobile networks to WiFi hotspots, for both delay tolerant and delay sensitive traffic. We evaluate the proce...
详细信息
ISBN:
(纸本)9781450315265
We present procedures that exploit mobility prediction and prefetching to enhance offloading of traffic from mobile networks to WiFi hotspots, for both delay tolerant and delay sensitive traffic. We evaluate the procedures in terms of the percentage of offloaded traffic, the data transfer delay, and the cache size used for prefetching. The evaluation considers empirical measurements and shows how various parameters influence the performance of the procedures, and their robustness to time and throughput estimation errors. Copyright 2012 ACM.
We present an efficient distributed graph database architecture for large scale social computing. The architecture consists of a distributed graph data processing system and a distributed graph data storage system. We...
详细信息
"Advanced architecture of the Integrated IT Platform with high security level" is a development project within the area of the homeland security. The results of the project are intended to be used by a Polis...
详细信息
ISBN:
(纸本)9783642307201
"Advanced architecture of the Integrated IT Platform with high security level" is a development project within the area of the homeland security. The results of the project are intended to be used by a Polish Law Enforcement Authority. The goal of the project is to develop the architecture of a network and application IT environment for secure, reliable, efficient and scalable processing and storing data by current and future applications and services. Additionally, a clear migration path from the current infrastructure must be provided. Together with the increasing demand on the network bandwidth, expected growth of the multimedia mobile applications and with particular respect to strict security requirements it raises numerous IT security challenges. In this paper we would like to describe how security was addressed within the project and how external research, our own experience, and results of ther similar research projects (including those from the homeland security area) have been combined to provide the maximum possible protection level. We hope that the described approach may be used at least as an initial pattern in other similar initiatives.
Recently, virtualization attracts a lot of attention from server-side and client-side applications, even on embedded systems. Virtualization is adopted on client-side machines to enhance both user experience and colla...
详细信息
ISBN:
(纸本)9780769548432;9781467330848
Recently, virtualization attracts a lot of attention from server-side and client-side applications, even on embedded systems. Virtualization is adopted on client-side machines to enhance both user experience and collaboration with cloud servers. The characteristic of client-side virtualization makes it significantly different from the traditional virtualization for high-performance servers. For example, in many related projects of server-side virtualization, they usually rely on a specific operating system (OS) for the management of virtual machines. However, not all client-side users are familiar with the specific OS and, more specifically, the applications and device drivers running on it. Therefore, we propose a friendly framework called F-VT, which can replace the specific OS with any other OS friendly to users. To prove its feasibility, we develop a prototype to manage virtual machines on Windows XP by combining both paravirtualization and pass-through techniques. We also conduct experiments on network device to evaluate performance. The results show that F-VT can achieve about 96% performance with about 0.2% overhead as compared with native network devices.
QoS guarantee in wireless multimedia communications is a major difficulty, this paper introduces cloud technologies to ensure QoS in wireless multimedia communications. First introduced the characteristics of cloud co...
详细信息
QoS guarantee in wireless multimedia communications is a major difficulty, this paper introduces cloud technologies to ensure QoS in wireless multimedia communications. First introduced the characteristics of cloud computing technology, and research QoS guarantee in wireless multimedia communications system architecture, detailed analysis the modular of multimedia coding algorithm, adaptive control techniques and error resilience technology. Wireless multimedia communications security control technology is studied.
暂无评论