Context dissemination completes the value chain of contextual information procurement and is identified as a precondition to actual context use by enlarging the visibility scope of context sources beyond the local acq...
详细信息
Due to the high overhead characteristics of wireless mesh network, the call capacity of VoIP is dramatically degraded. In the paper, the Aggregation Aware Routing with Path Separation (AAR-PS) protocol has been propos...
详细信息
Due to the high overhead characteristics of wireless mesh network, the call capacity of VoIP is dramatically degraded. In the paper, the Aggregation Aware Routing with Path Separation (AAR-PS) protocol has been proposed. The protocol are designed by combining and engineering several techniques: packet aggregation, multi-path routing and event-triggered rerouting. The experiment results reveal that the protocol can accept more calls than existing protocols with acceptable packet delay according to the VoIP requirements.
As semantic Web grows, security concerns increase. One concern is controlling accesses to resources in this environment. In order to infer whether the access is allowed or not, different information of different entit...
详细信息
As semantic Web grows, security concerns increase. One concern is controlling accesses to resources in this environment. In order to infer whether the access is allowed or not, different information of different entities including contextual information should be involved. From access control point of view, we divide the entities in semantic Web into three categories: resources (objects), requesters (subjects), and environment (infrastructure, time, and location). In this paper, we present a semantic-based context-aware access control framework to be applied in semantic Web, considered as a multi-domain environment. To handle context information in the framework, we propose a context ontology to represent contextual information and employ it in the inference engine. The proposed ontology classifies the context of a semantic Web environment and represents the elements of contextual information and their relationship in an abstract level. We illustrate how the access control framework handles the contextual information with the proposed context ontology.
Increasingly, a computernetwork administrator's job is pre-occupied with user behavioral problems rather than physical failures of network and system components. A small number of malicious users can cause proble...
详细信息
ISBN:
(纸本)9781424429127
Increasingly, a computernetwork administrator's job is pre-occupied with user behavioral problems rather than physical failures of network and system components. A small number of malicious users can cause problems that affect a large number of users;more often, by not following proper procedures a user may let his/her system be used by malicious users;and there are various other misuses that all leave the network in a state of the tragedy of the commons. In this paper, we introduce the concept of credit-based networking borrowing ideas from financial management and adapting them to network management. We first focus on a campus network by studying concrete scenarios of how credit-based network management can be applied. We then discuss how the concept is generally applicable to managing network behaviors as well by applying it to managing ISP peering relationships. We argue that the cascading effect of credit-based network management can enhance network management efficiency and improve the global network environment we all live in.
A recent dynamic increase in demand for wireless multimedia services has greatly accelerated the research on cross layer optimization techniques for transmitting multimedia data over wireless channel. In this paper, w...
详细信息
In the past few years, as the volume of junk information on the internet has grown tremendously, researchers' begun to handle this issue. In this paper, an algorithm, called DCM (Discriminative Category Matching) ...
详细信息
In this paper we consider a team of robots that are tasked with tracking a moving target cooperatively, while maintaining their connectivity to a base station and avoiding collision. We propose a novel extension of th...
详细信息
In this paper we consider a team of robots that are tasked with tracking a moving target cooperatively, while maintaining their connectivity to a base station and avoiding collision. We propose a novel extension of the classical navigation function framework in order to ensure task completion. More specifically, we modify the classical definition of the navigation functions to (1) incorporate measures of link qualities and (2) include the impact of a time-varying objective. Our proposed communication-aware navigation function framework is aimed at maintaining robot connectivity in realistic communication environments, while avoiding collision with both fixed and moving obstacles. We consider both packet-dropping and communication noise based receivers. We furthermore prove the convergence of the proposed framework under certain conditions. Finally, our simulation results show the performance of the proposed navigation framework.
In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that con...
详细信息
In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that considers the relationship among CPs (mutual business relationship) in bidding mechanism. In our new auction-based market model, we allow the group of service providers to publish their bids collaboratively as a single bid to the auctioneer. It gives service providers a chance to autonomously find partners and make groups. Then they can use group strategy to increase their competitive power and compete for winning the bid (s). This will reduce conflicts, as well as collaboration cost and negotiation time, among participants as compare to existing CA-based market model. We implement our proposed market model of trading service in a simulated environment and study its economic efficiency with existing model.
Recently, with wide-spread of distributed systems, distributed monitoring systems are needed to mange such systems. However, since monitoring architecture of distributed system faces a huge amount of log data which co...
详细信息
ISBN:
(纸本)9781424435654
Recently, with wide-spread of distributed systems, distributed monitoring systems are needed to mange such systems. However, since monitoring architecture of distributed system faces a huge amount of log data which come from local computing nodes, information aggregation is fundamental scheme for monitoring distributed system. In this paper, we preset a novel approach for extracting computing node-condition profiles by using sequential pattern mining, which is one of data mining techniques. Extracted computing node condition profiles represent node condition patterns which are occurred in many computing nodes frequently. Thus, extracted profiles enable summarized distributed system conditions to be small sized and easy-understandable information.
An access control model for semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontol...
详细信息
An access control model for semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous *** specification of each component of the model as well as the approach to define history constrained policies along with some clarifying examples are presented. The access control procedure of the model is proposed over the inference services of TL-ALCF.
暂无评论