M. Aleksy, Robert J. Damm, N. Fantana, Bernd Stieger
{"title":"Utilizing Active Visual Labels for Product and Service Information","authors":"M. Aleksy, Robert J. Damm, N. Fantana, Bernd Stieger","doi":"10.1109/ICDCSW.2010.49","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.49","url":null,"abstract":"Changing business environments, increasing complexity of industrial products, and an aging workforce are some of the challenges that have to be faced in the industrial field service area. In this paper, we present some application scenarios of bar codes in industrial field service and evaluate the suitability of existing 2D bar code software development kits to be utilized in the described scenarios. In our evaluation, we focus on decoding capability of imperfect photos of bar codes.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Barolli, Gjergji Mino, F. Xhafa, A. Durresi, A. Koyama
{"title":"Improvement and Performance Evaluation of CAVENET: A Network Simulation Tool for Vehicular Networks","authors":"L. Barolli, Gjergji Mino, F. Xhafa, A. Durresi, A. Koyama","doi":"10.1109/ICDCSW.2010.45","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.45","url":null,"abstract":"Vehicle Ad-hoc Network (VANET) is a kind of Mobile Ad-hoc Network (MANET) that establishes wireless connection between cars. In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour nodes. In this paper, we present a simulation system for VANET called CAVENET (Cellular Automaton based Vehicular NETwork). In CAVENET, the mobility patterns of nodes are generated by an 1-dimensional cellular automata. We improved CAVENET and implemented some routing protocols. We investigated the performance of the implemented routing protocols by CAVENET. The simulation results have shown that DYMO protocol has better performance than AODV and OLSR protocols.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126352113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Triviño-Cabrera, Jorge García de la Nava, E. Casilari-Pérez
{"title":"Identification of Stable Links in MANETs","authors":"A. Triviño-Cabrera, Jorge García de la Nava, E. Casilari-Pérez","doi":"10.1109/ICDCSW.2010.64","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.64","url":null,"abstract":"Mobile Ad Hoc Networks (MANET) are characterized by a highly dynamic topology as a consequence of the frequent and unpredictable changes in the link states. Routing protocols must cope with this eventuality so when routes in use break, they should discover alternative paths to keep the on-going communications active. The procedures to discover new routes commonly provoke a significant amount of control packets which may induce losses and delay to the data packets. Therefore, the network performance could benefit from the techniques that avoid these route discovery procedures. In this sense, a practical strategy is the use of the links that are expected to endure longer. Basing on an analytical model, this paper presents a technique to identify the most stable links. The evaluation in an autonomous MANET connected to the Internet shows the goodness of the proposed criterion.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cooperative Framework for Reliable Multicast Forwarding in Mobile Ad Hoc NETworks","authors":"G. Araniti, M. Condoluci, A. Molinaro, A. Iera","doi":"10.1109/ICDCSW.2010.61","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.61","url":null,"abstract":"In this paper an innovative framework based on the cooperation between MAC and routing protocols is proposed with the purpose of improving the reliability of multicast transmissions in a Mobile Ad hoc NETwork (MANET). The proposed framework adds new features to the On-Demand Multicast Routing Protocol (ODMRP) and to the IEEE 802.11MAC layer. This choice allows to exploit the mesh-based nature of the ODMRP forwarding scheme, which offers higher reliability and connectivity among multicast members compared to other multicast routing protocols proposed for MANETs. Simulation results have shown the advantages achieved by the proposed solution compared to the straight forward application of legacy ODMRP when coupled with either the standard IEEE 802.11 MAC or the Multicast aware MAC Protocol (MMP). Several scenarios have been analyzed by varying the multicast group size, the node mobility, and by properly tuning the protocols’ parameters (e.g., the maximum number of MAC layer retransmissions). In the various examined scenarios, the proposed solution improves the performance in terms of successfully conveyed multicast packets with a negligible increase in the signaling overhead necessary to guarantee reliable data delivery.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128370007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robustness Testing of Standard Specifications-Based HA Middleware","authors":"András Kövi, Zoltán Micskei","doi":"10.1109/ICDCSW.2010.73","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.73","url":null,"abstract":"Using middleware implementations, instead of integrating the fault tolerance in the applications themselves, for providing stateful services highly availably has become the best practice in many industries including the telecommunication, computing and other areas. Robustness of these implementations toward user failures is essential for the overall availability of the systems. This paper summarizes the methodology for executing robustness tests on Service Availability Forum Application Interface Specification based middleware and describes the results of the conducted experiments with the Open SAF open source middleware implementation. Finally, the results of the measurements/experiments are analyzed using the AMBERRAW Data Repository.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"23 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113964559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliable Energy Efficient Algorithm for Target Coverage in Wireless Sensor Networks","authors":"Jing He, N. Xiong, Yang Xiao, Yi Pan","doi":"10.1109/ICDCSW.2010.53","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.53","url":null,"abstract":"A critical aspect of applications in Wireless Sensor Networks (WSNs) is network lifetime. Power-constrained WSNs are usable as long as they can communicate sensed data to a processing node. Poor communication links and hazard environment make the WSNs unreliable. The existing schemes only consider that the state of a sensor covering targets is in binary mode: success (cover the targets) or fail (cannot cover the targets). However in the real WSNs, a sensor covers targets with a certain probability. To improve WSNs’ reliability, we should consider the fact that a sensor covers targets with users’satisfied probability. To solve the above problem, this paper first introduces failure probability into target coverage problems to improve and control the system’s reliability. Furthermore, we model the solution as the Maximum Reliability Sensor Covers (MRSC)problem and design a heuristic greedy algorithm that efficiently compute the maximal number of reliable sensor covers. To efficiently extend the WSNs’ lifetime with users’ pre-defined failure probability requirements, only the sensors from the current active sensor cover is responsible for monitoring all targets, while all other sensors are in a low-energy sleep mode. Finally, simulation results validate the performance of our proposed algorithm, in which users can precisely control the system’s reliability without sacrificing the energy consumption too much.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121746454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sharing Experimental and Field Data: The AMBER Raw Data Repository Experience","authors":"Raquel Almeida, N. Mendes, H. Madeira","doi":"10.1109/ICDCSW.2010.75","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.75","url":null,"abstract":"The AMBER Raw Data Repository is a repository of field data and raw results from resilience assessment experiments. Its goal is to grant both the research and IT industry communities with an infrastructure to gather, analyze and share field data resulting from resilience assessments of systems and services, stimulating a better coordination of high quality research in the area, and contributing to the promotion of a standardization of resilience measurement, which will in turn have a positive impact in the industry. While experimental and field data repositories are recognizably fundamental for supporting the advance of research and the dissemination of knowledge, the research community still seems somewhat reluctant in embracing such enterprises. This paper presents our experience in building and deploying the AMBER Raw Data Repository, and intends to share insights gained in the process, as well as raising some discussion topics on the implementation and future of global experimental data repositories.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130186897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati
{"title":"Encryption-Based Policy Enforcement for Cloud Storage","authors":"S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, Gerardo Pelosi, P. Samarati","doi":"10.1109/ICDCSW.2010.35","DOIUrl":"https://doi.org/10.1109/ICDCSW.2010.35","url":null,"abstract":"Nowadays, users are more and more exploiting external storage and connectivity for sharing and disseminating user-generated content. To this aim, they can benefit of the services offered by Internet companies, which however assume that the service provider is entitled to access the resources. To overcome this limitation, we present an approach that does not require complete trust in the external service w.r.t. both resource content and authorization management, while at the same time allowing users to delegate to the provider the enforcement of the access control policy on their resources. Our solution relies on the translation of the access control policy into an equivalent encryption policy on resources and on a hierarchical key structure that limits both the number of keys to be maintained and the amount of encryption to be enforced.","PeriodicalId":133907,"journal":{"name":"2010 IEEE 30th International Conference on Distributed Computing Systems Workshops","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}