2014 IEEE 13th International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile Applications 基于接近度的移动应用中使用虚拟移动节点进行邻居检测
Behnaz Bostanipour, B. Garbinato
{"title":"Using Virtual Mobile Nodes for Neighbor Detection in Proximity-Based Mobile Applications","authors":"Behnaz Bostanipour, B. Garbinato","doi":"10.1109/NCA.2014.6","DOIUrl":"https://doi.org/10.1109/NCA.2014.6","url":null,"abstract":"We introduce a time-limited neighbor detector service for mobile ad hoc networks, which enables a mobile device to detect other nearby devices in the past, present and up to some bounded time interval in the future. Our motivation lies in the emergence of a new trend of mobile applications known as proximity-based mobile applications, which enable a user to communicate with other users within some defined range and for a certain amount of time. Neighbor discovery is a fundamental requirement for these applications and is not restricted to the current neighbors but can include past or future neighbors. To implement the time-limited neighbor detector service, we apply an approach based on virtual mobile nodes. A virtual mobile node is an abstraction that is akin to a mobile node that travels in the network in a predefined trajectory. In practice it can be implemented by a set of mobile nodes based on a replicated state machine approach. In this paper, we assume that each node can accurately predict its own locations up to some bounded time interval in the future. Thus, we present a time-limited neighbor detector algorithm that uses a virtual mobile node that continuously travels in the network, collects the predicted locations of all nodes, performs the neighborhood matching between nodes and sends the list of neighbors to each node. We show that our algorithm correctly implements the time-limited neighbor detector service under a set of conditions.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124280295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deploying Large-Scale Service Compositions on the Cloud with the CHOReOS Enactment Engine 使用CHOReOS颁布引擎在云上部署大规模服务组合
Leonardo A. F. Leite, C. Santos, Daniel Cordeiro, M. Gerosa, Fabio Kon
{"title":"Deploying Large-Scale Service Compositions on the Cloud with the CHOReOS Enactment Engine","authors":"Leonardo A. F. Leite, C. Santos, Daniel Cordeiro, M. Gerosa, Fabio Kon","doi":"10.1109/NCA.2014.25","DOIUrl":"https://doi.org/10.1109/NCA.2014.25","url":null,"abstract":"In recent years, service-oriented systems are becoming increasingly complex, with growing size and heterogeneity. Developing and deploying such large-scale systems present several challenges, such as reliability, reproducibility, handling failures on infrastructure, scaling deployment time as composition size grows, coordinating deployment among multiple organizations, dependency management, and supporting requirements of adaptable systems. However, many organizations still rely on manual deployment processes, which imposes difficulties in overcoming such challenges. In this paper, we propose a flexible and extensible middleware solution that addresses the challenges present in the large-scale deployment of service compositions. The CHOReOS Enactment Engine is a robust middleware infrastructure to automate the deployment of large-scale service compositions. We describe the middleware architecture and implementation and then present experimental results demonstrating the feasibility of our approach.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125804639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Local Search Heuristics for Media Streams Planning with Transcoding 基于转码的媒体流规划的局部搜索启发式算法
Jiri Marek, Hana Rudová, P. Holub
{"title":"Local Search Heuristics for Media Streams Planning with Transcoding","authors":"Jiri Marek, Hana Rudová, P. Holub","doi":"10.1109/NCA.2014.32","DOIUrl":"https://doi.org/10.1109/NCA.2014.32","url":null,"abstract":"Recent advances in processing capabilities of commodity hardware enabled deployment of high-performance collaborative environments in various application fields, where maximum image quality and interactivity are critical. In this paper, we focus on user-empowered collaborative environments that rely on information available to the users and that can be obtained from the end-nodes connected to the network. We build upon our previous work on scheduling strategies for multi-point data distribution, while utilizing media transcoding during the distribution and partial network topology knowledge that may be provided by the users. The novelty introduced by this paper focuses on improving scheduling scalability by employing local search metaheuristics, allowing us to maintain systems comprising more than twice as many applications compared to the previous approaches.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122054251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solvability-Based Comparison of Failure Detectors 基于可解性的故障检测器比较
S. Sastry, Josef Widder
{"title":"Solvability-Based Comparison of Failure Detectors","authors":"S. Sastry, Josef Widder","doi":"10.1109/NCA.2014.46","DOIUrl":"https://doi.org/10.1109/NCA.2014.46","url":null,"abstract":"Failure detectors are oracles that have been introduced to provide processes in asynchronous systems with information about faults. This information can then be used to solve problems otherwise unsolvable in asynchronous systems. A natural question is on the \"minimum amount of information\" a failure detector has to provide for a given problem. This question is classically addressed using a relation that states that a failure detector D is stronger (that is, provides \"more, or better, information\") than a failure detector D' if D can be used to implement D'. It has recently been shown that this classic implementability relation has some drawbacks. To overcome this, different relations have been defined, one of which states that a failure detector D is stronger than D' if D can solve all the time-free problems solvable by D'. In this paper we compare the implementability-based hierarchy of failure detectors to the hierarchy based on solvability. This is done by introducing a new proof technique for establishing the solvability relation. We apply this technique to known failure detectors from the literature and demonstrate significant differences between the hierarchies.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127559271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel Deferred Update Replication 并行延迟更新复制
L. P. D. Sousa, Daniele Sciascia, F. Pedone
{"title":"Parallel Deferred Update Replication","authors":"L. P. D. Sousa, Daniele Sciascia, F. Pedone","doi":"10.1109/NCA.2014.38","DOIUrl":"https://doi.org/10.1109/NCA.2014.38","url":null,"abstract":"Deferred update replication (DUR) is an established approach to implementing highly efficient and available storage. While the throughput of read-only transactions scales linearly with the number of deployed replicas in DUR, the throughput of update transactions experiences limited improvements as replicas are added. This paper presents Parallel Deferred Update Replication (P-DUR), a variation of classical DUR that scales both read-only and update transactions with the number of cores available in a replica. In addition to introducing the new approach, we describe its full implementation and compare its performance to classical DUR and to Berkeley DB, a well-known standalone database.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129513368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Time and Location Power Based Malicious Code Detection Techniques for Smartphones 基于时间和位置功率的智能手机恶意代码检测技术
2014 IEEE 13th International Symposium on Network Computing and Applications Pub Date : 2013-07-16 DOI: 10.1109/TrustCom.2013.22
Bryan Dixon, Shivakant Mishra
{"title":"Time and Location Power Based Malicious Code Detection Techniques for Smartphones","authors":"Bryan Dixon, Shivakant Mishra","doi":"10.1109/TrustCom.2013.22","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.22","url":null,"abstract":"There is a growing number of viruses, malware, and other threats designed to gain access to system resources and information stored on smartphones. This paper examines the effectiveness of three techniques for detecting malicious code based on individual power consumption profiles with a focus on time and location. This project used Google's Android platform for testing and data collection. The paper describes the design, implementation, and evaluation of each of these techniques.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信