A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Understanding Complementary Multi-layer Collaborative Heuristics for Adaptive Caching in Heterogeneous Mobile Opportunistic Networks
2018
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
Keywords-Opportunistic mobile networks, content discovery and retrieval, content caching, multi-layer heuristics and utilities. ...
We consider the complementary multi-layer heuristics that combine social driven, resources driven, ego network driven and content popularity driven analytics. ...
We begin by analysing performance of end-to-end success ratio and delay for content retrieval. ...
doi:10.1109/iwcmc.2018.8450536
dblp:conf/iwcmc/HuynhR18
fatcat:fpnmi3mqizeuheapy3jute7tty
STUDY ON SECURITY AND QUALITY OF SERVICE IMPLEMENTATIONS IN P2P OVERLAY NETWORK FOR EFFICIENT CONTENT DISTRIBUTION
2014
International Journal of Research in Engineering and Technology
From the analysis it aims to provide the prediction of optimized path in the network for efficient file sharing and the identification of necessary security methods in the network to provide security to ...
P2P systems require a sufficient amount of trust from their nodes which are all participates in the network for AAA (Authentication, Authorization and Availability). ...
Table - 3 - .2: quality of service aware content distribution and different kinds of security implementation in p2p network 1. ...
doi:10.15623/ijret.2014.0304081
fatcat:lhin4gxxvbddhol5ela2s3jluy
Contents
2015
Procedia Computer Science
Data Retrieval in Vehicular Adhoc Networks C. ...
Tolerant Routing Protocols in Vehicular Networks Balasubramani, L. ...
doi:10.1016/s1877-0509(15)00796-6
fatcat:73jew3okrfgq5f4x3rcmfxofqm
2019 Index IEEE Transactions on Emerging Topics in Computing Vol. 7
2020
IEEE Transactions on Emerging Topics in Computing
-March 2019 115-122 Internet Content Retrieval at the Edge: A Social-Aware and Named Data Cooperative Framework. Pu, L., +, TETC Jan. ...
., +, TETC July-Sept. 2019 420-432 Content Retrieval at the Edge: A Social-Aware and Named Data Cooperative Framework. Pu, L., +, TETC Jan. ...
doi:10.1109/tetc.2020.2973584
fatcat:4txtg6db3reurmvwkf346sxotm
Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture
2018
IEEE Communications Magazine
On UMOBILE, we provide a framework to cover different application needs, as well as provide APIs that are general enough to open new design spaces for application designers. ...
This model is suitable for applications that involve the transfer of large and persistent content, but not for ones involving dissemination of frequently produced ephemeral contents [12] . ...
social awareness. ...
doi:10.1109/mcom.2018.1700325
fatcat:zxbtzxj2q5hnxb2kz4drbt7cne
Rule-based Adaptations to Control Cybersickness in Social Virtual Reality Learning Environments
[article]
2021
arXiv
pre-print
Our framework implementation in a social VRLE viz., vSocial monitors performance/security anomaly events in network/session data. ...
Using our key findings, we enlist suitable practices for addressing performance and security issues towards a more high-performing and robust social VRLE. ...
Fig. 1 : 1 Illustration of a cloud-based Social VRLE deployed across high-speed, low-latency network sites.
Fig. 2 : 2 Proposed rule-based 3QS-adaption framework for a social VRLE system. ...
arXiv:2108.12315v1
fatcat:bakh7mzdpra4bibde6nmd2mnyq
Understanding Information Centric Layer of Adaptive Collaborative Caching Framework in Mobile Disconnection-Prone Networks
2018
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
We describe a reputationbased popularity weighting mechanism built in informationcentric layer of our adaptive collaborative caching framework CafRepCache which considers a realistic case where caching ...
Smart networks and services leverage in-network caching to improve transmission efficiency and support large amount of content sharing, decrease high operating costs and handle disconnections. ...
[4] proposed Café and CafeREP, a congestion-aware mobile social framework for data forwarding over heterogeneous opportunistic networks. ...
doi:10.1109/iwcmc.2018.8450321
dblp:conf/iwcmc/HuynhRJ18
fatcat:6vxevhzo4jcfxjygbsll4d4lbu
Information-centric mobile caching network frameworks and caching optimization: a survey
2017
EURASIP Journal on Wireless Communications and Networking
The demand for content oriented service and compute-intensive service stimulates the shift of current cellular networks to deal with the explosive growth in mobile traffic. ...
In this paper, a brief survey on Information centric mobile caching network architecture and caching optimization is presented, including cache placement in different mobile wireless network architectures ...
Mobility causes disconnections and variable link conditions in networks, which can be solved by a storage-aware routing mechanism exploited at the intra-domain level by deploying local storage as in delay-tolerant ...
doi:10.1186/s13638-017-0806-6
fatcat:wwf6gctzbzfbhi6elcecbywkam
Deep Learning and Blockchain-empowered Security Framework for Intelligent 5G-enabled IoT
2021
IEEE Access
In this paper, we propose a Deep Learning (DL) and blockchain-empowered security framework for intelligent 5G-enabled IoT that leverages DL competency for intelligent data analysis operation and blockchain ...
for data security. ...
To facilitate blockchain deployment, a lightweight consensus, for instance, Practical Byzantine Fault Tolerance (PBFT) [96] Fig. 1 Design overview of the proposed security framework that supports no ...
doi:10.1109/access.2021.3077069
fatcat:scwfhwldwnbwxkbgxozrk6gjma
SCAMPI
2012
Proceedings of the first edition of the MCC workshop on Mobile cloud computing - MCC '12
In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution. ...
The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded ...
Indeed, a design based on social and context awareness can support novel security mechanisms for the opportunistic computing platform. ...
doi:10.1145/2342509.2342512
dblp:conf/sigcomm/PitkanenKOCPGPL12
fatcat:iun4dmnztvgrpmvdhgdwqcscwi
SCAMPI
2012
Computer communication review
In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution. ...
The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded ...
Indeed, a design based on social and context awareness can support novel security mechanisms for the opportunistic computing platform. ...
doi:10.1145/2377677.2377775
fatcat:7m7cpdlt6rgqpdcr25vo5oyxia
A WSN Framework for Privacy Aware Indoor Location
2022
Applied Sciences
In this research, we propose a new framework for indoor location. We present an innovative, non-intrusive implementation of indoor location based on wireless sensor networks. ...
Finally, a role-based access control contract is used to secure access to the system. ...
Acknowledgments: The authors gratefully acknowledge the European Commission for funding the InnoRenew CoE project (H2020 Grant Agreement #739574) as well as the Slovenian Research Agency (ARRS) for supporting ...
doi:10.3390/app12063204
fatcat:4h7bd5qscfadbozx2ewayswiga
A Comprehensive Review on Edge Caching from the Perspective of Total Process: Placement, Policy and Delivery
2021
Sensors
analysis, user model analysis, content retrieval, delivery, and update. ...
The main purpose of edge caching is to place popular content that users need at the edge of the network, borrow free space to reduce user waiting time, and lighten the network load by reducing the amount ...
Mobile users watch popular films and television shows online and have a high tolerance for transmission delay but require high network throughput to ensure high-quality and continuous content transmission ...
doi:10.3390/s21155033
fatcat:fdtipxzm6rg4fckn5gfqvfpj2i
Access Control Framework for Delay/Disruption Tolerant Networks
[chapter]
2010
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
The primary goal of this paper is to propose an access control framework for delay/disruption tolerant networks. ...
The emergence of DTN as an option for sustaining communication in environments with high delay/frequent disruption have rendered existing access control mechanisms inappropriate hence the need for a new ...
The implementation and validation of the design in a delay/disruptive environment will be carried out in future work. ...
doi:10.1007/978-3-642-13618-4_18
fatcat:gybxby4zhrb4zasfwix2wdfui4
Software-Defined Networks and Named Data Networks in Vehicular Ad Hoc Network Routing: Comparative Study and Future Directions
2022
Security and Communication Networks
We present a new taxonomy of routing protocols based on the additional routing aspects of Software-Defined Networks and Named Data Networks. ...
Advanced routing schemes are selected for the survey from each category to evaluate new research results in VANET routing. This article also describes future directions for VANET/ITS routing research. ...
Connectivity Aware Tribrid Routing Framework for a Generalized Software Defined Vehicular Network. ...
doi:10.1155/2022/1270180
doaj:b3562ff6c630459db301c5dc3e816b4a
fatcat:wlxiyrqrpjha7gteqrm2ifwvsu
« Previous
Showing results 1 — 15 out of 11,637 results