Access control and ensuring availability are important tasks for securing Web Services. Both requirements are not well studied on Web Services and especially not their interactions. However, considering this interacti...
详细信息
The Licklider transmission protocol (LTP) is a delay-tolerant point-to-point protocol being developed by the Delay-Tolerant Networking researchgroup (DTNRG). LTP-Transport is an extension to LTP that provides end-to-...
详细信息
The Licklider transmission protocol (LTP) is a delay-tolerant point-to-point protocol being developed by the Delay-Tolerant Networking researchgroup (DTNRG). LTP-Transport is an extension to LTP that provides end-to-end services and which is designed to be a generic Delay-Tolerant Network (DTN) friendly transport protocol. We describe our network emulation based test setup for these protocols and our evaluation of their performance for a few simple DTN scenarios. In particular we compare LTP-T with the other protocol being developed by the DTNRG, the bundle protocol (BP). Our results show that LTP-T can outperform the BP in some cases, though, as an overlay network protocol, the BP is more flexible in general.
Unit testing is a tool for assessing code quality. Unit tests check the correctness of code fragments like methods, loops and conditional statements. Usually, every code fragment is involved in different tests. We pro...
详细信息
Network technologies like mobile ad-hoc networks, peer-to-peer systems, and sensor networks are getting increasingly popular, but come up with new challenges to scalable data management because data management techniq...
详细信息
Self-organizing techniques have successfully been used to optimize software systems, such as optimization of route stability in ad hoc network routing and optimization of the use of storage space or processing power u...
详细信息
Self-organizing techniques have successfully been used to optimize software systems, such as optimization of route stability in ad hoc network routing and optimization of the use of storage space or processing power using load balancing. Existing self-organizing techniques typically focus on a single, usually implicitly specified, system goal and tune systems parameters towards optimally meeting that goal. In this paper, we consider optimization of large-scale multi-agent ubiquitous computing environments, such as urban traffic control. Applications in this class are typically required to optimize towards multiple goals simultaneously. Additionally, these multiple goals can potentially be conflicting, change over time, and apply to various parts of the system such as a single agent, a group of agents, or the system as a whole. In contrast to existing self-organizing systems in which agents are homogeneous to the extent that they are working towards a common goal, agents in these systems are heterogeneous in that they may have differing goals. Thus, existing self-organizing optimization techniques must be extended to deal with multiple goal optimization and the resulting heterogeneity of agents. In this paper we present a research agenda for extending collaborative reinforcement learning (CRL), an existing self-organizing optimization technique, to support multiple policy optimization.
The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. Wi- Fi communities which allow their users to share their wired Internet connections have emerged and become increas...
详细信息
The demand for cheap broadband Internet for nomadic users has created a market for Internet sharing. Wi- Fi communities which allow their users to share their wired Internet connections have emerged and become increasingly popular. Organizations like FON promise to provide free wireless Internet access in many places. However, user authentication is the Achilles heel of these systems. A user that allows other community members to use its access point must expect to be held responsible for other users' actions. Moreover, these Wi-Fi sharing systems are often insecure which allows eavesdroppers to gather sensitive information on the wireless link. This work provides efficient, scalable, and secure access control for large Wi-Fi sharing systems. The host identity protocol (HIP) is used as a building block for a solution which supports strong user authentication as well as mobility support for nomadic users. In our presentation, we show the feasibility and effectiveness of this approach by demonstrating the PISA authentication protocol in action.
Location-based multi-player games are currently being pushed by the industry, one main factor being that highly-accurate positioning technologies like GPS as well as broadband mobile networks like UMTS are finally get...
详细信息
Location-based multi-player games are currently being pushed by the industry, one main factor being that highly-accurate positioning technologies like GPS as well as broadband mobile networks like UMTS are finally getting widespread. Nevertheless, generic frameworks for efficiently managing user locations are still missing, which strongly complicates game development. This paper presents TraX, a device-centric framework for Location- based Services, which especially supports proactive and multi-player services and thus perfectly matches the challenges mobile game development faces today. The suitability of TraX is evaluated by means of VsGolf, an actual location-based multi-player game, which has been developed and tested by students in only four days.
Recent advances in mobile computing and wireless communication technologies are enabling high mobility and flexibility of anytime, anywhere service access for mobile users. As a result, network connections of such use...
详细信息
Unit testing is a tool for assessing code quality. Unit tests check the correctness of code fragments like methods, loops and conditional statements. Usually, every code fragment is involved in different tests. We pro...
详细信息
Unit testing is a tool for assessing code quality. Unit tests check the correctness of code fragments like methods, loops and conditional statements. Usually, every code fragment is involved in different tests. We propose a classification of tests, depending on the tested features, which delivers a higher detailed feedback than unclassified tests. Unclassified tests only deliver a feedback whether they failed or succeeded. The detailed feedback from the classified tests help to do a better code quality assessment and can be incorporated in tools helping to improve code quality. We demonstrate the power of this approach doing unit tests on network configuration.
暂无评论