This paper presents the current state of the art in Web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, which are currently limited in number, and...
详细信息
This paper presents the current state of the art in Web3d multi-user technologies and more specifically networked virtual environment platforms that support the X3D standard, which are currently limited in number, and also the existing X3D browsers that enable these applications. Furthermore, this paper presents the architecture of a platform, called EVE, which was developed to support multi-user virtual environments and was initially based on VRML, as well as the implementation regarding the process of upgrading this platform in order to fully support the X3D standard, using the open-source Xj3D library. Finally, the benefits of shifting to the X3D standard are presented, and some of the problems that currently exist are discussed.
UMTS, the successor of GSM, is evolving toward a future wireless all-IP network. In this paper we present how it supports real-time IP multimedia services, as these services are expected to drive the adoption of wirel...
详细信息
UMTS, the successor of GSM, is evolving toward a future wireless all-IP network. In this paper we present how it supports real-time IP multimedia services, as these services are expected to drive the adoption of wireless all-IP networks. The scheme of real time streaming video is one of the newcomers in wireless data communication and in particular in UMTS, raising a number of novel requirements in both telecommunication and data communication systems. This scheme applies when the mobile user is experiencing real time multimedia content. In this paper, we describe the design and the implementation of a decision feedback scheme, which is based on real time protocols and it is used for streaming video over UMTS transport channels. The decision feedback scheme uses a friendly, to the mobile users, congestion control mechanism to control the transmission rate of the real time video sequence. Furthermore, we evaluate this mechanism through a number of experiments. During these experiments we demonstrate the friendly behavior of the decision feedback scheme to TCP and UDP data streams that coexist in the same channel with the video sequence.
In this paper we investigate the idea of applying the emerging world-scale computing paradigm of Web services onto small-area clusters of embedded systems with limited resources. Our goal is to develop a truly standar...
详细信息
In this paper we investigate the idea of applying the emerging world-scale computing paradigm of Web services onto small-area clusters of embedded systems with limited resources. Our goal is to develop a truly standard and architecturally independent interface for aggregating the unused processing power of embedded devices. This power can be used to support ambient intelligence processing in residential areas, as well as exported to external users as commodity. We have used an embedded distributed computing system described in previous work, in order to show how an embedded generic computing Web service can be constructed. We have identified the limited processing power of embedded devices, as well as the dynamic nature of networks of appliances, as impeding factors for the introduction of Web services into small systems and we propose a hierarchical layered grouping of devices as a solution to this problem.
In this paper we present algorithms for the localization and extraction of interesting motifs from biological sequences. We are especially interested in weighted sequences, which are extensively used in molecular biol...
详细信息
In this paper we present algorithms for the localization and extraction of interesting motifs from biological sequences. We are especially interested in weighted sequences, which are extensively used in molecular biology as profiles for protein families and for the representation of binding sites. It is our belief that these algorithms can also be applied to other information technology applications such as network management, data mining and signal processing.
In this paper, we present a comprehensive traffic analysis of the Greek School Network (GSN), a wide area network designed to provide Internet access and services to about 15,000 units of primary and secondary educati...
详细信息
In this paper, we present a comprehensive traffic analysis of the Greek School Network (GSN), a wide area network designed to provide Internet access and services to about 15,000 units of primary and secondary education schools and administration offices. In our analysis, we have used measurements from the PATraS region node obtained through the Cisco NetFlow and FlowScan tools. We have used classical analysis to obtain protocol and application traffic statistics. Our study revealed that TCP traffic is dominant in the network, while nearly 50% of the outgoing and 37% of the incoming traffic is peer-to-peer (P2P) traffic, with a further 25.6% of traffic using not registered ports and suspected to be P2P as well. Finally, we have also observed a remarkable traffic locality phenomenon in the P2P services, where more than the 90% of the traffic was heading or generated by 50 hosts
This paper describes the design and the implementation of the managed bandwidth service (MBS) in a high speed backbone network as well as a management tool for the service. The service was designed taking advantage of...
详细信息
This paper describes the design and the implementation of the managed bandwidth service (MBS) in a high speed backbone network as well as a management tool for the service. The service was designed taking advantage of features provided by the MPLS technology and also using the DiffServ architecture. So, it uses L2 MPLS VPNs to provide point to point connection and also marks the traffic in order to pass from certain priority queues (to provide guaranteed bandwidth). It also enables traffic engineering characteristics in order to provide load balancing on the network as well as fast rerouting in case of link failure. In addition we implemented a management tool for the service. The scope of this tool is to allow the users to manage their MBS requests (make a new one, edit, delete or view a request). Also the tool performs admission control and produces the necessary configuration that must be applied on the network in order to implement every service's request. This service was designed and implemented on GRNET's network.
In this paper the issue of the architectural organization of a bandwidth broker with respect to the distribution of functionalities among separate entities is examined. We discuss the benefits of a distributed versus ...
详细信息
In this paper the issue of the architectural organization of a bandwidth broker with respect to the distribution of functionalities among separate entities is examined. We discuss the benefits of a distributed versus a centralized architecture and study some of the most important implementations. We also present a novel design proposal that builds on our earlier work on the admission control module of a bandwidth broker and introduces it in the framework of a distributed bandwidth broker architecture. Our conclusions are supported by a series of simulated experiments that we analyze.
Recommendation systems are special personalization tools that help users to find interesting information and services in complex online shops. Even though today's e-commerce environments have drastically evolved a...
详细信息
Recommendation systems are special personalization tools that help users to find interesting information and services in complex online shops. Even though today's e-commerce environments have drastically evolved and now incorporate techniques from other domains and application areas such as Web mining, semantics, artificial intelligence, user modeling and profiling, etc. setting up a successful recommendation system is not a trivial or straightforward task. This paper argues that by monitoring, analyzing and understanding the behavior of customers, their demographics, opinions, preferences and history, as well as taking into consideration the specific e-shop ontology and by applying Web mining techniques, the effectiveness of produced recommendations can be significantly improved. In this way, the e-shop may upgrade users' interaction, increase its usability, convert users to buyers, retain current customers and establish long-term and loyal one-to-one relationships
We study energy efficient routing strategies for wireless ad-hoc networks. In this kind of network, energy is a scarce resource and its conservation and efficient use is a major issue. Our strategy follows the multi-c...
详细信息
We study energy efficient routing strategies for wireless ad-hoc networks. In this kind of network, energy is a scarce resource and its conservation and efficient use is a major issue. Our strategy follows the multi-cost routing approach, according to which a cost vector of various parameters is assigned to each link. The parameters of interest are the number of hops on a path, and the residual energy and transmission power of the nodes on the path. These parameters are combined in various optimization functions, corresponding to different routing algorithms, for selecting the optimal path. We evaluate the routing algorithms proposed in a number of scenarios, with respect to energy consumption, throughput and other performance parameters of interest. From the experiments conducted, we conclude that routing algorithms that take into account energy related parameters, increase the lifetime of the network, while achieving better performance than other approaches, such as minimum hop routing.
This paper is concerned with the mixed H∞/D-stability control problem. Since multiobjective control problems are non-convex problems except some cases, it is difficult to obtain the globally optimal solutions. The pu...
详细信息
暂无评论