Filters








11,637 Hits in 5.6 sec

Understanding Complementary Multi-layer Collaborative Heuristics for Adaptive Caching in Heterogeneous Mobile Opportunistic Networks

Vu San Ha Huynh, Milena Radenkovic
2018 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)  
Keywords-Opportunistic mobile networks, content discovery and retrieval, content caching, multi-layer heuristics and utilities.  ...  We consider the complementary multi-layer heuristics that combine social driven, resources driven, ego network driven and content popularity driven analytics.  ...  We begin by analysing performance of end-to-end success ratio and delay for content retrieval.  ... 
doi:10.1109/iwcmc.2018.8450536 dblp:conf/iwcmc/HuynhR18 fatcat:fpnmi3mqizeuheapy3jute7tty

STUDY ON SECURITY AND QUALITY OF SERVICE IMPLEMENTATIONS IN P2P OVERLAY NETWORK FOR EFFICIENT CONTENT DISTRIBUTION

K.Ramalakshmi .
2014 International Journal of Research in Engineering and Technology  
From the analysis it aims to provide the prediction of optimized path in the network for efficient file sharing and the identification of necessary security methods in the network to provide security to  ...  P2P systems require a sufficient amount of trust from their nodes which are all participates in the network for AAA (Authentication, Authorization and Availability).  ...  Table - 3 - .2: quality of service aware content distribution and different kinds of security implementation in p2p network 1.  ... 
doi:10.15623/ijret.2014.0304081 fatcat:lhin4gxxvbddhol5ela2s3jluy

Contents

2015 Procedia Computer Science  
Data Retrieval in Vehicular Adhoc Networks C.  ...  Tolerant Routing Protocols in Vehicular Networks Balasubramani, L.  ... 
doi:10.1016/s1877-0509(15)00796-6 fatcat:73jew3okrfgq5f4x3rcmfxofqm

2019 Index IEEE Transactions on Emerging Topics in Computing Vol. 7

2020 IEEE Transactions on Emerging Topics in Computing  
-March 2019 115-122 Internet Content Retrieval at the Edge: A Social-Aware and Named Data Cooperative Framework. Pu, L., +, TETC Jan.  ...  ., +, TETC July-Sept. 2019 420-432 Content Retrieval at the Edge: A Social-Aware and Named Data Cooperative Framework. Pu, L., +, TETC Jan.  ... 
doi:10.1109/tetc.2020.2973584 fatcat:4txtg6db3reurmvwkf346sxotm

Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture

Christos-Alexandros Sarros, Sotiris Diamantopoulos, Sergi Rene, Ioannis Psaras, Adisorn Lertsinsrubtavee, Carlos Molina-Jimenez, Paulo Mendes, Rute Sofia, Arjuna Sathiaseelan, George Pavlou, Jon Crowcroft, Vassilis Tsaoussidis
2018 IEEE Communications Magazine  
On UMOBILE, we provide a framework to cover different application needs, as well as provide APIs that are general enough to open new design spaces for application designers.  ...  This model is suitable for applications that involve the transfer of large and persistent content, but not for ones involving dissemination of frequently produced ephemeral contents [12] .  ...  social awareness.  ... 
doi:10.1109/mcom.2018.1700325 fatcat:zxbtzxj2q5hnxb2kz4drbt7cne

Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments [article]

Samaikya Valluripally, Vaibhav Akashe, Michael Fisher, David Falana, Khaza Anuarul Hoque, Prasad Calyam
2021 arXiv   pre-print
Our framework implementation in a social VRLE viz., vSocial monitors performance/security anomaly events in network/session data.  ...  Using our key findings, we enlist suitable practices for addressing performance and security issues towards a more high-performing and robust social VRLE.  ...  Fig. 1 : 1 Illustration of a cloud-based Social VRLE deployed across high-speed, low-latency network sites. Fig. 2 : 2 Proposed rule-based 3QS-adaption framework for a social VRLE system.  ... 
arXiv:2108.12315v1 fatcat:bakh7mzdpra4bibde6nmd2mnyq

Understanding Information Centric Layer of Adaptive Collaborative Caching Framework in Mobile Disconnection-Prone Networks

Vu San Ha Huynh, Milena Radenkovic, Robert John
2018 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)  
We describe a reputationbased popularity weighting mechanism built in informationcentric layer of our adaptive collaborative caching framework CafRepCache which considers a realistic case where caching  ...  Smart networks and services leverage in-network caching to improve transmission efficiency and support large amount of content sharing, decrease high operating costs and handle disconnections.  ...  [4] proposed Café and CafeREP, a congestion-aware mobile social framework for data forwarding over heterogeneous opportunistic networks.  ... 
doi:10.1109/iwcmc.2018.8450321 dblp:conf/iwcmc/HuynhRJ18 fatcat:6vxevhzo4jcfxjygbsll4d4lbu

Information-centric mobile caching network frameworks and caching optimization: a survey

Hao Jin, Dan Xu, Chenglin Zhao, Dong Liang
2017 EURASIP Journal on Wireless Communications and Networking  
The demand for content oriented service and compute-intensive service stimulates the shift of current cellular networks to deal with the explosive growth in mobile traffic.  ...  In this paper, a brief survey on Information centric mobile caching network architecture and caching optimization is presented, including cache placement in different mobile wireless network architectures  ...  Mobility causes disconnections and variable link conditions in networks, which can be solved by a storage-aware routing mechanism exploited at the intra-domain level by deploying local storage as in delay-tolerant  ... 
doi:10.1186/s13638-017-0806-6 fatcat:wwf6gctzbzfbhi6elcecbywkam

Deep Learning and Blockchain-empowered Security Framework for Intelligent 5G-enabled IoT

Shailendra Rathore, Jong Hyuk Park, Hangbae Chang
2021 IEEE Access  
In this paper, we propose a Deep Learning (DL) and blockchain-empowered security framework for intelligent 5G-enabled IoT that leverages DL competency for intelligent data analysis operation and blockchain  ...  for data security.  ...  To facilitate blockchain deployment, a lightweight consensus, for instance, Practical Byzantine Fault Tolerance (PBFT) [96] Fig. 1 Design overview of the proposed security framework that supports no  ... 
doi:10.1109/access.2021.3077069 fatcat:scwfhwldwnbwxkbgxozrk6gjma

SCAMPI

Mikko Pitkänen, Karin Hummel, Martin May, Nidhi Hegde, Thrasyvoulos Spyropoulos, Teemu Kärkkäinen, Jörg Ott, Marco Conti, Andrea Passarella, Silvia Giordano, Daniele Puccinelli, Franck Legendre (+1 others)
2012 Proceedings of the first edition of the MCC workshop on Mobile cloud computing - MCC '12  
In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution.  ...  The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded  ...  Indeed, a design based on social and context awareness can support novel security mechanisms for the opportunistic computing platform.  ... 
doi:10.1145/2342509.2342512 dblp:conf/sigcomm/PitkanenKOCPGPL12 fatcat:iun4dmnztvgrpmvdhgdwqcscwi

SCAMPI

Mikko Pitkänen, Karin Hummel, Martin May, Nidhi Hegde, Thrasyvoulos Spyropoulos, Teemu Kärkkäinen, Jörg Ott, Marco Conti, Andrea Passarella, Silvia Giordano, Daniele Puccinelli, Franck Legendre (+1 others)
2012 Computer communication review  
In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution.  ...  The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded  ...  Indeed, a design based on social and context awareness can support novel security mechanisms for the opportunistic computing platform.  ... 
doi:10.1145/2377677.2377775 fatcat:7m7cpdlt6rgqpdcr25vo5oyxia

A WSN Framework for Privacy Aware Indoor Location

Aleksandar Tošić, Niki Hrovatin, Jernej Vičič
2022 Applied Sciences  
In this research, we propose a new framework for indoor location. We present an innovative, non-intrusive implementation of indoor location based on wireless sensor networks.  ...  Finally, a role-based access control contract is used to secure access to the system.  ...  Acknowledgments: The authors gratefully acknowledge the European Commission for funding the InnoRenew CoE project (H2020 Grant Agreement #739574) as well as the Slovenian Research Agency (ARRS) for supporting  ... 
doi:10.3390/app12063204 fatcat:4h7bd5qscfadbozx2ewayswiga

A Comprehensive Review on Edge Caching from the Perspective of Total Process: Placement, Policy and Delivery

Honghai Wu, Yizheng Fan, Yingda Wang, Huahong Ma, Ling Xing
2021 Sensors  
analysis, user model analysis, content retrieval, delivery, and update.  ...  The main purpose of edge caching is to place popular content that users need at the edge of the network, borrow free space to reduce user waiting time, and lighten the network load by reducing the amount  ...  Mobile users watch popular films and television shows online and have a high tolerance for transmission delay but require high network throughput to ensure high-quality and continuous content transmission  ... 
doi:10.3390/s21155033 fatcat:fdtipxzm6rg4fckn5gfqvfpj2i

Access Control Framework for Delay/Disruption Tolerant Networks [chapter]

Enyenihi Johnson, Godwin Ansa, Haitham Cruickshank, Zhili Sun
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The primary goal of this paper is to propose an access control framework for delay/disruption tolerant networks.  ...  The emergence of DTN as an option for sustaining communication in environments with high delay/frequent disruption have rendered existing access control mechanisms inappropriate hence the need for a new  ...  The implementation and validation of the design in a delay/disruptive environment will be carried out in future work.  ... 
doi:10.1007/978-3-642-13618-4_18 fatcat:gybxby4zhrb4zasfwix2wdfui4

Software-Defined Networks and Named Data Networks in Vehicular Ad Hoc Network Routing: Comparative Study and Future Directions

Ishtiaq Wahid, Sadaf Tanvir, Abdul Hameed, Masood Ahmad
2022 Security and Communication Networks  
We present a new taxonomy of routing protocols based on the additional routing aspects of Software-Defined Networks and Named Data Networks.  ...  Advanced routing schemes are selected for the survey from each category to evaluate new research results in VANET routing. This article also describes future directions for VANET/ITS routing research.  ...  Connectivity Aware Tribrid Routing Framework for a Generalized Software Defined Vehicular Network.  ... 
doi:10.1155/2022/1270180 doaj:b3562ff6c630459db301c5dc3e816b4a fatcat:wlxiyrqrpjha7gteqrm2ifwvsu
« Previous Showing results 1 — 15 out of 11,637 results