In this paper we investigate the requirements and propose the design of a platform that will serve emergency operations such as in cases of wildfires or road accidents. This platform will provide assistance to the res...
详细信息
In this paper we investigate the requirements and propose the design of a platform that will serve emergency operations such as in cases of wildfires or road accidents. This platform will provide assistance to the rescue and the disaster relief operations through the use of social networking and P2P based multimedia streaming. The general idea is to create a platform that will facilitate the provision of an efficient communication network between the stakeholders who will be involved in such life threatening situations and of the means for having a rich, multimedia based communication for first aid and guidance. Based on the use of the proposed platform the distribution of multimedia streams can be supported through innovative techniques such as media encoding and media distribution. The matching and notification of the most appropriate volunteers can be made through the use of personal profiles and the deployment of social networking tools. The access to multimedia content can be adapted to the obstacles which are introduced through the impairment of infrastructures of services capabilities.
700MHz band attracted many researchers and stakeholders for mobile communications by providing a rare opportunity to have cost effective wireless solutions due to its excellent propagation characteristics compared to ...
详细信息
Nowadays, it is very common that a processor includes a SIMD (Single Instruction Multiple Data) unit in order to accelerate application processing. While a SIMD unit is a part of a processor, it evolves more rapidly t...
详细信息
Nowadays, it is very common that a processor includes a SIMD (Single Instruction Multiple Data) unit in order to accelerate application processing. While a SIMD unit is a part of a processor, it evolves more rapidly than the integer unit of the processor. Since the use of an FPU (Floating Point Unit) and a SIMD unit is basically abandoned from the kernel, there can be places inside the kernel where a SMID unit works effectively to deal with a large amount of data processing. This paper describes our preliminary work to explore the possibility to utilize a SIMD unit in the kernel. We performed preliminary experiments by using UML (User Mode Linux) and show that data copying can be improved.
This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for deter...
详细信息
This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we formulate this problem as an optimization problem that aims to achieve Nash equilibrium for bidding strategy of the buyers. In our proposal, the content of the multimedia service accounts for the good. The sellers of this auction economy are either the origin server or the peers who forward the multimedia service to their downstream peers. For each seller, its corresponding downstream peers play the role of buyers who are referred to as bidders. Each bidder submits a sealed bid to its corresponding seller. The high bidder wins and pays its bid for the service. The analytical and experimental results prove the efficiency of the proposed mechanism in terms of the overlay path stretch.
Due to the vulnerability of computer system, Internet worm is still greatly threatenning network security. It is found that the spread of worm regularly change because of the different space distributions of hosts and...
详细信息
Due to the vulnerability of computer system, Internet worm is still greatly threatenning network security. It is found that the spread of worm regularly change because of the different space distributions of hosts and this phenomenon is defined as diurnal pattern. Based on diurnal pattern, two worm propagation models, namely simple diurnal forced model and complicated diurnal forced one, are constructed to describe and predict worm propagation. To verify the accuracy of them, Conficker dataset is adopted to obtain the practical curves of worm propagation. Through comparisons of numerical curves from models and practical curves, it is proved that simple model is good in describing the initial stage of worm propagation and complicated model can accurately predict the whole worm propagation.
The current ever-growing advances in wireless networking and the great success of mobile computing have contributed to the development of an increasing amount of mobile services. Due to this growth of published servic...
详细信息
The current ever-growing advances in wireless networking and the great success of mobile computing have contributed to the development of an increasing amount of mobile services. Due to this growth of published services, quality of service (QoS) is becoming a key feature to provide the most appropriate needed service to mobile clients according to their requirements. However, managing QoS represents a critical and significant challenge in the mobile computing because of the dynamic nature of mobile environment. In addition, Service providers can use different and non-standard QoS parameters to describe QoS properties of a published service. At this end, and based on MAQAME Architecture suggested in our previous work, our current contribution is to implement QoS Management System which is responsible to propose the most appropriate service in term of QoS among the provided local mobile services. This implementation uses Devices Profile for Web Services (DPWS) specification, WS-Policy for QoS policy specification and Apache Neethi for policy processing.
Advances in computer networking combined with powerful home computers and modern operating systems made streaming media practical and affordable for ordinary consumers. We are enjoying different streaming services suc...
详细信息
ISBN:
(纸本)9781612846613
Advances in computer networking combined with powerful home computers and modern operating systems made streaming media practical and affordable for ordinary consumers. We are enjoying different streaming services such as DMB, PMP, smart phone, etc. that have never experienced before. In the future computing environment such as ubiquitous environment, user can be served video streaming service by complex contexts. In the paper, we suggest and simulate the complex context information for multimedia streaming. In this paper, we applied complex context awareness concept to video streaming service and demonstrate our applications.
A Cloud computing system provides infrastructure layer services to users by managing virtualized infrastructure resources. The infrastructure resources include CPU, hyper visor, storage, and networking. Each category ...
详细信息
A Cloud computing system provides infrastructure layer services to users by managing virtualized infrastructure resources. The infrastructure resources include CPU, hyper visor, storage, and networking. Each category of infrastructure resources is a subsystem in a cloud computing system. The cloud computing system coordinates infrastructure subsystems to provide services to users. Most current cloud computing systems lacks pluggability in their infrastructure subsystems and decision algorithms, which restricts the development of infrastructure subsystems and decision algorithms in cloud computing system. A cloud computing system should have the flexibility to switch from one infrastructure subsystem to another, and one decision algorithm to another with ease. This paper describes Roystonea, a hierarchical distributed cloud computing system with plug gable component architecture. The component pluggability ability gives administrators the flexibility to use the most appropriate subsystem as they wish. The component pluggability of Roystonea is based on a specifically designed interfaces among Roystonea controlling system and infrastructure subsystems components. The component pluggability also encourages the development of infrastructure subsystems in cloud computing. Roystonea provides a test bed for designing decision algorithms used in cloud computing system. The decision algorithms are totally isolated from other components in Roystonea architecture, so the designers of the decision algorithms can focus on algorithm design without worrying about how his algorithm will interact with other Roystonea components. We believed that component pluggability will be one of the most important issues in the research of cloud computing system.
In this paper, we propose a P2P network construction method to achieve effective sensor data collection in a ubiquitous sensor environment. Our method constructs a P2P network overlay considering the location and the ...
详细信息
In this paper, we propose a P2P network construction method to achieve effective sensor data collection in a ubiquitous sensor environment. Our method constructs a P2P network overlay considering the location and the cycle of sensing of each sensor device (peer). First, according to the location of each peer, a hierarchical overlay network is constructed. In addition, considering the cycle of sensing, another overlay network is constructed in each hierarchy. Our method suppresses messages for query propagation.
Cloud computing has become one of mobile's hottest topics. Moving computing processing and data storage away from mobile devices and into large data centers, mobile applications enable the users to improve product...
详细信息
Cloud computing has become one of mobile's hottest topics. Moving computing processing and data storage away from mobile devices and into large data centers, mobile applications enable the users to improve productivity, to share data and to collaborate with others. Considering the benefits of mobile cloud computing, the forensic service based on mobile cloud computing could be good solution to the problems today's forensic tools are facing. Therefore, this paper introduces a service concept called 'Forensic Cloud' to develop new paradigm in digital forensics. Furthermore, in order to show the feasibility of the concept, the paper suggests a technology framework for forensic analysis based on mobile cloud and describe current status of its development.
暂无评论