2010 IEEE 30th International Conference on Distributed Computing Systems Workshops最新文献

筛选
英文 中文
Utilizing Active Visual Labels for Product and Service Information 利用产品和服务信息的主动视觉标签
M. Aleksy, Robert J. Damm, N. Fantana, Bernd Stieger
{"title":"Utilizing Active Visual Labels for Product and Service Information","authors":"M. Aleksy, Robert J. Damm, N. Fantana, Bernd Stieger","doi":"10.1109/ICDCSW.2010.49","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.49","url":null,"abstract":"Changing business environments, increasing complexity of industrial products, and an aging workforce are some of the challenges that have to be faced in the industrial field service area. In this paper, we present some application scenarios of bar codes in industrial field service and evaluate the suitability of existing 2D bar code software development kits to be utilized in the described scenarios. In our evaluation, we focus on decoding capability of imperfect photos of bar codes.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement and Performance Evaluation of CAVENET: A Network Simulation Tool for Vehicular Networks 汽车网络仿真工具CAVENET的改进与性能评价
L. Barolli, Gjergji Mino, F. Xhafa, A. Durresi, A. Koyama
{"title":"Improvement and Performance Evaluation of CAVENET: A Network Simulation Tool for Vehicular Networks","authors":"L. Barolli, Gjergji Mino, F. Xhafa, A. Durresi, A. Koyama","doi":"10.1109/ICDCSW.2010.45","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.45","url":null,"abstract":"Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based Vehicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of Stable Links in MANETs manet中稳定链路的识别
A. Triviño-Cabrera, Jorge García de la Nava, E. Casilari-Pérez
{"title":"Identification of Stable Links in MANETs","authors":"A. Triviño-Cabrera, Jorge García de la Nava, E. Casilari-Pérez","doi":"10.1109/ICDCSW.2010.64","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.64","url":null,"abstract":"Mobile Ad Hoc Networks (MANET) are characterized by a highly dynamic topology as a consequence of the frequent and unpredictable changes in the link states. Routing protocols must cope with this eventuality so when routes in use break, they should discover alternative paths to keep the on-going communications active. The procedures to discover new routes commonly provoke a significant amount of control packets which may induce losses and delay to the data packets. Therefore, the network performance could benefit from the techniques that avoid these route discovery procedures. In this sense, a practical strategy is the use of the links that are expected to endure longer. Basing on an analytical model, this paper presents a technique to identify the most stable links. The evaluation in an autonomous MANET connected to the Internet shows the goodness of the proposed criterion.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Cooperative Framework for Reliable Multicast Forwarding in Mobile Ad Hoc NETworks 移动Ad Hoc网络中可靠组播转发的合作框架
G. Araniti, M. Condoluci, A. Molinaro, A. Iera
{"title":"A Cooperative Framework for Reliable Multicast Forwarding in Mobile Ad Hoc NETworks","authors":"G. Araniti, M. Condoluci, A. Molinaro, A. Iera","doi":"10.1109/ICDCSW.2010.61","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.61","url":null,"abstract":"In this paper an innovative framework based on the cooperation between MAC and routing protocols is proposed with the purpose of improving the reliability of multicast transmissions in a Mobile Ad hoc NETwork (MANET). The proposed framework adds new features to the On-Demand Multicast Routing Protocol (ODMRP) and to the IEEE 802.11MAC layer. This choice allows to exploit the mesh-based nature of the ODMRP forwarding scheme, which offers higher reliability and connectivity among multicast members compared to other multicast routing protocols proposed for MANETs. Simulation results have shown the advantages achieved by the proposed solution compared to the straight forward application of legacy ODMRP when coupled with either the standard IEEE 802.11 MAC or the Multicast aware MAC Protocol (MMP). Several scenarios have been analyzed by varying the multicast group size, the node mobility, and by properly tuning the protocols’ parameters (e.g., the maximum number of MAC layer retransmissions). In the various examined scenarios, the proposed solution improves the performance in terms of successfully conveyed multicast packets with a negligible increase in the signaling overhead necessary to guarantee reliable data delivery.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Robustness Testing of Standard Specifications-Based HA Middleware 基于标准规范的HA中间件鲁棒性测试
András Kövi, Zoltán Micskei
{"title":"Robustness Testing of Standard Specifications-Based HA Middleware","authors":"András Kövi, Zoltán Micskei","doi":"10.1109/ICDCSW.2010.73","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.73","url":null,"abstract":"Using middleware implementations, instead of integrating the fault tolerance in the applications themselves, for providing stateful services highly availably has become the best practice in many industries including the telecommunication, computing and other areas. Robustness of these implementations toward user failures is essential for the overall availability of the systems. This paper summarizes the methodology for executing robustness tests on Service Availability Forum Application Interface Specification based middleware and describes the results of the conducted experiments with the Open SAF open source middleware implementation. Finally, the results of the measurements/experiments are analyzed using the AMBERRAW Data Repository.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"23 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113964559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks 一种可靠节能的无线传感器网络目标覆盖算法
Jing He, N. Xiong, Yang Xiao, Yi Pan
{"title":"A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks","authors":"Jing He, N. Xiong, Yang Xiao, Yi Pan","doi":"10.1109/ICDCSW.2010.53","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.53","url":null,"abstract":"A critical aspect of applications in Wireless Sensor Networks (WSNs) is network lifetime. Power-constrained WSNs are usable as long as they can communicate sensed data to a processing node. Poor communication links and hazard environment make the WSNs unreliable. The existing schemes only consider that the state of a sensor covering targets is in binary mode: success (cover the targets) or fail (cannot cover the targets). However in the real WSNs, a sensor covers targets with a certain probability. To improve WSNs’ reliability, we should consider the fact that a sensor covers targets with users’satisfied probability. To solve the above problem, this paper first introduces failure probability into target coverage problems to improve and control the system’s reliability. Furthermore, we model the solution as the Maximum Reliability Sensor Covers (MRSC)problem and design a heuristic greedy algorithm that efficiently compute the maximal number of reliable sensor covers. To efficiently extend the WSNs’ lifetime with users’ pre-defined failure probability requirements, only the sensors from the current active sensor cover is responsible for monitoring all targets, while all other sensors are in a low-energy sleep mode. Finally, simulation results validate the performance of our proposed algorithm, in which users can precisely control the system’s reliability without sacrificing the energy consumption too much.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121746454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Sharing Experimental and Field Data: The AMBER Raw Data Repository Experience 共享实验和现场数据:琥珀原始数据存储库经验
Raquel Almeida, N. Mendes, H. Madeira
{"title":"Sharing Experimental and Field Data: The AMBER Raw Data Repository Experience","authors":"Raquel Almeida, N. Mendes, H. Madeira","doi":"10.1109/ICDCSW.2010.75","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.75","url":null,"abstract":"The AMBER Raw Data Repository is a repository of field data and raw results from resilience assessment experiments. Its goal is to grant both the research and IT industry communities with an infrastructure to gather, analyze and share field data resulting from resilience assessments of systems and services, stimulating a better coordination of high quality research in the area, and contributing to the promotion of a standardization of resilience measurement, which will in turn have a positive impact in the industry. While experimental and field data repositories are recognizably fundamental for supporting the advance of research and the dissemination of knowledge, the research community still seems somewhat reluctant in embracing such enterprises. This paper presents our experience in building and deploying the AMBER Raw Data Repository, and intends to share insights gained in the process, as well as raising some discussion topics on the implementation and future of global experimental data repositories.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Encryption-Based Policy Enforcement for Cloud Storage 基于加密的云存储策略实施
S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati
{"title":"Encryption-Based Policy Enforcement for Cloud Storage","authors":"S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati","doi":"10.1109/ICDCSW.2010.35","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.35","url":null,"abstract":"Nowadays, users are more and more exploiting external storage and connectivity for sharing and disseminating user-generated content. To this aim, they can benefit of the services offered by Internet companies, which however assume that the service provider is entitled to access the resources. To overcome this limitation, we present an approach that does not require complete trust in the external service w.r.t. both resource content and authorization management, while at the same time allowing users to delegate to the provider the enforcement of the access control policy on their resources. Our solution relies on the translation of the access control policy into an equivalent encryption policy on resources and on a hierarchical key structure that limits both the number of keys to be maintained and the amount of encryption to be enforced.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信