The ability to recover from failures and maintain an acceptable level of service degradation despite failures is a crucial aspect in the design of multi-hop wireless networks. This paper investigates routing restorati...
详细信息
The ability to recover from failures and maintain an acceptable level of service degradation despite failures is a crucial aspect in the design of multi-hop wireless networks. This paper investigates routing restoration solutions in the event of node failures. In particular, we consider three strategies, namely global restoration, end-to-end restoration and local restoration, which can support a range of tradeoffs between the restoration latency and network throughput after restoration. To quantitatively evaluate the impact of node failures during and after routing restoration, we define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI). We formulate the optimal routing restoration schemes under these three strategies as linear programming problems and implement their solutions in the ns-2 simulator. Extensive performance evaluations are performed to study the impact of node failures in multi-hop wireless network under these three routing restoration strategies. To the best of our knowledge, this is the first work that quantitatively compares the optimal route restoration strategies in multi-hop wireless networks in terms of performance degradation during and after restoration.
Nowadays organizations require better-qualify software engineers in order to face two major challenges: 1 their process improvements and, 2 quality software development teamwork, due to actually large amount of softwa...
详细信息
Nowadays organizations require better-qualify software engineers in order to face two major challenges: 1 their process improvements and, 2 quality software development teamwork, due to actually large amount of software is developed by teams. This article aims to clarify the relationship between two technologies Capability Maturity Model Integration for Development (CMMI-DEV) and Team software Process introduction (TSPi) for the project planning.
In this article, we survey the history of studies of computational creativity, following the development of the International Conference on Computational Creativity pom its beginnings, a decade ago, in two parallel wo...
详细信息
Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely...
详细信息
ISBN:
(纸本)9781605581668
Radio Frequency IDentification (RFID) is a technology of automatic object identification. Retailers and manufacturers have created compelling business cases for deploying RFID in their supply chains. Yet, the uniquely identifiable objects pose a privacy threat to individuals. In this paper, we study the privacy threats caused by publishing RFID data. Even if the explicit identifying information, such as name and social security number, has been removed from the published RFID data, an adversary may identify a target victim's record or infer her sensitive value by matching a priori known visited locations and timestamps. RFID data by default is high-dimensional and sparse, so applying traditional K-anonymity to RFID data suffers from the curse of high dimensionality, and would result in poor data usefulness. We define a new privacy model, develop an anonymization algorithm to accommodate special challenges on RFID data, and evaluate its performance in terms of data quality, efficiency, and scalability. To the best of our knowledge, this is the first work on anonymizing high-dimensional RFID data. Copyright 2009 ACM.
Metaschedulers can distribute parts of a bag-of-tasks (BoT) application among various resource providers in order to speed up its execution. When providers cannot disclose private information such as their load and co...
详细信息
Metaschedulers can distribute parts of a bag-of-tasks (BoT) application among various resource providers in order to speed up its execution. When providers cannot disclose private information such as their load and computing power, which are usually heterogeneous, the metascheduler needs to make blind scheduling decisions. We propose three policies for composing resource offers to schedule deadline-constrained BoT applications. Offers act as a mechanism in which resource providers expose their interest in executing an entire BoT or only part of it without revealing their load and total computing power. We also evaluate the amount of information resource providers need to expose to the metascheduler and its impact on the scheduling. Our main findings are: (i) offer-based scheduling produces less delay for jobs that cannot meet deadlines in comparison to scheduling based on load availability (i.e. free time slots); thus it is possible to keep providers' load private when scheduling multi-site BoTs; and (ii) if providers publish their total computing power they can have more local jobs meeting deadlines.
Bio-signal analysis is one of the most important approaches to biomedical engineering. The health information such as ECG, PCG, EMG and EEG are often recorded in digital format to be analyzed. In this paper, a bio-sig...
详细信息
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose a...
详细信息
Alongside multitude of innovations and consequential changes in lifestyle, the ability to access home appliances or security cameras over the Internet has been in demand for some years now. In this paper, we propose an efficient, low-cost and user-friendly method to access networked home appliances over the Internet, providing strong, well integrated, three levels of security to the whole application and user data. We present a scheme in which, iris image is used for user authentication and after performing its hashing (using BioHashing), it is sent to the server through a secure communication channel utilizing Secure Socket Layer (SSL). The deterministic feature sequence from the iris image is extracted using 1D log-Gabor filters. Mersenne twister random number generator algorithm is used to produce an array of pseudo-random numbers which is later orthonormalised employing GramSchmidt orthonormalization algorithm for performing BioHashing. In addition to this protected interaction mechanism, we use a single Authentication Server in order to enable access to the home appliances of a complete housing society via Internet, which reduces user responsibility and improves accessibility of this endeavor without compromising on system security. We demonstrate the perfect recognition efficiency of this system with equal error rate (EER) of 0% on CASIA 1 iris image dataset.
Distributed sensor Webs typically operate in dynamic environments where operating conditions, transient phenomena, availability of resources, and network connection quality change frequently and unpredictably. Often t...
详细信息
Distributed sensor Webs typically operate in dynamic environments where operating conditions, transient phenomena, availability of resources, and network connection quality change frequently and unpredictably. Often these changes can neither be completely anticipated nor accurately described during development or deployment. Our prior work has described how we developed agents and services that are capable of monitoring these changing conditions and adapting system parameters using the CORBA component model (CCM) deployment infrastructure as part of the multiagent architecture for coordinated responsive observations (MACRO) platform. Our recent application of MACRO to the South East Alaska monitoring network for Science, Telecommunications, Education, and Research (SEAMONSTER) project has identified new distributed deployment infrastructure challenges common to computationally constrained field environments in adaptive sensor Webs. These challenges include standardized execution of low-level hardware-dependent actions and on-going data tasks, automated provisioning of agents for heterogeneous field hardware, and minimizing deployment infrastructure overhead. This paper describes how we extended MACRO to address these sensor Web challenges by creating an action/effector framework standardizing the execution of lightweight actions and providing for automated provisioning of MACRO agents, in addition to footprint optimizations to the underlying CCM infrastructure.
暂无评论