Filters








93 Hits in 4.2 sec

HTTP/2 and QUIC for Virtual Worlds and the 3D Web?

Hussein Bakri, Colin Allison, Alan Miller, Iain Oliver
2015 Procedia Computer Science  
In MUVWs the firewall and latency problems are related as the SL/OS network protocols designed over twelve years ago sought to minimise latency through the use of multiple concurrent UDP-based virtual  ...  The continuing advances in computer graphics and Internet bandwidths are supporting a gradual convergence between multi-user virtual worlds (MUVW), such as Second Life and OpenSim (SL/OS), and the nascent  ...  The paper shows that theses protocols are good candidates for replacing the current SL/OS network protocols as they can potentially solve problems associated with firewall blocking and traffic management  ... 
doi:10.1016/j.procs.2015.07.204 fatcat:qdn5nmwxljbkvnd2veevho6a7i

A Center Location Algorithm for Tropical Cyclone in Satellite Infrared Images

Pingping Wang, Ping Wang, Cong Wang, Yue Yuan, Di Wang
2020 IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing  
For the TC in the initial phase or dissipation stage, the location results are usually superior to the results of the comparison algorithms.  ...  In the object detection, considering the statistical scale distribution of TCs, the global and local features extracted by the network are combined to form the fusion feature maps through the upsampling  ...  ACKNOWLEDGMENT The authors thank students in the laboratory who have made great contributions to download the raw satellite data.  ... 
doi:10.1109/jstars.2020.2995158 fatcat:zgbw2l6naffdbcmilkqkqfsniy

Design, implementation and validation of a generic and reconfigurable protocol stack framework for mobile terminals

T. Scholer, C. Muller-Schloer
2004 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings.  
Assertion-based virtual prototyping (based on non-resident assertions), utilising simulation of hardware software co-systems as well as software probes containing code-resident assertions are used in the  ...  Acknowledgements This work has been performed in the framework of the IST project IST-2001-34091 SCOUT, which is partly funded by the European Union. [4] .  ...  It is envisaged to connect the protocol stack software to the OS networking system by a packet capture device (such as WinPCap [12] ) to enable reallife applications to be built upon the protocol stack  ... 
doi:10.1109/icdcsw.2004.1284055 dblp:conf/icdcsw/ScholerM04 fatcat:igezekznpzd4bohtvcjfuodmke

Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems [chapter]

Douglas C. Schmidt
2002 Lecture Notes in Computer Science  
Next-generation DRE systems, such as total ship computing environments, coordinated unmanned air vehicle systems, and national missile defense, will use many geographically dispersed sensors, provide on-demand  ...  This paper describes the need for adaptive and reflective middleware systems (ARMS) to bridge the gap between application programs and the underlying operating systems and network protocol stacks in order  ...  that lead to loss of life and property.  ... 
doi:10.1007/3-540-45828-x_21 fatcat:qacskpghpjer3p36eqjo46jzre

Adaptive and Reflective Middleware for Distributed Real-Time and Embedded Systems [chapter]

Douglas C. Schmidt
2001 Lecture Notes in Computer Science  
Next-generation DRE systems, such as total ship computing environments, coordinated unmanned air vehicle systems, and national missile defense, will use many geographically dispersed sensors, provide on-demand  ...  This paper describes the need for adaptive and reflective middleware systems (ARMS) to bridge the gap between application programs and the underlying operating systems and network protocol stacks in order  ...  that lead to loss of life and property.  ... 
doi:10.1007/3-540-45449-7_25 fatcat:cj2xdfyyrbhknfjrrpcwmukrty

Research Advances in Middleware for Distributed Systems: State of the Art [chapter]

Richard E. Schantz, Douglas C. Schmidt
2002 Communication Systems  
Thanks also to members of the Cronus, ACE, TAO, and QuO user communities who have helped to shape our thinking on DOC middleware for over a decade.  ...  ACKNOWLEDGEMENTS We would like to thank Don Hinton, Joe Loyall, Jeff Parsons, Andrew Sutton, Franklin Webber, and members of the Large-scale, Network-centric Systems working group at the Software Design  ...  underlying OS, networks, and computing hardware.  ... 
doi:10.1007/978-0-387-35600-6_1 fatcat:i2ol2cikmjacjavnj4vkaecov4

Implementation of a protocol for cooperative packet recovery over hybrid networks

Fraida Fund, Thanasis Korakis, Shivendra S. Panwar
2013 Proceedings of the 8th ACM international workshop on Wireless network testbeds, experimental evaluation & characterization - WiNTECH '13  
on their mobile devices.  ...  In trials on a wireless networking testbed, using WiMAX as the primary network and WiFi as an assistant network, we find that our implementation can recover up to 92% of packets lost over the primary network  ...  developers to program functionality at the boundary between the application layer and the OS networking stack, the socket API.  ... 
doi:10.1145/2505469.2505479 dblp:conf/mobicom/FundKP13 fatcat:oemrfwzvozeajgqxmutjlf3kdy

Item 2: Review article and OS services & tools in research libraries 2018

Lorna Wildgaard, Mareike Christina Harms Buss, Lars Nondal
2020 Zenodo  
The model focuses on the main phases a researcher, in a research project, goes through.  ...  This analysis includes the Edison Data Science framework, EOSC Skills and Capability Framework), The Open Science Skills Working Group Report and the matrices and models these three frameworks build on  ...  in training programmes and across organizational boundaries.  ... 
doi:10.5281/zenodo.3773659 fatcat:kw2lmafev5a2dempwaiyhsi7ye

Cloud Computing Security Issues: a Stakeholder's Perspective

Garima Verma, Sandhya Adhikari
2020 SN Computer Science  
Security indeed has remained one of the biggest challenges.  ...  This study will help the various researchers to find all security concerns at one place with critical reviews.  ...  The cloud service provider (CSP) is one of the stake holders who should be responsible for handling security of applications, operating System (OS), network traffic, and infrastructure [1, 4] .  ... 
doi:10.1007/s42979-020-00353-2 fatcat:2nzla6ennzgljiirmnw7juvgay

ADVANCING A TYPOLOGY OF OPEN INNOVATION

PETER T. GIANIODIS, S. C. ELLIS, E. SECCHI
2010 International Journal of Innovation Management  
dynamics of OS networks, and the differences between industry- sponsored participants and regular ones -Users communities can be seen as complementary assets, which enable firms to take advantage  ...  In contrast, specialist firms focus on one particular industry, or a few exclusive technology domains. For example, Pharmalicensing works exclusively in the life sciences industries.  ... 
doi:10.1142/s1363919610002775 fatcat:gsrr63aiyvhfxfwrmktzvh22nm

Integration testing of protocol implementations using symbolic distributed execution

Raimondas Sasnauskas, Philipp Kaiser, Russ Lucas Jukic, Klaus Wehrle
2012 2012 20th IEEE International Conference on Network Protocols (ICNP)  
In this paper, we first detail on the protocol testing issues, such as low coverage, missing code and automation, we experienced during the lifetime of an university-industry project.  ...  We detail on SymNet architecture, show its applicability to real-world protocol software, and discuss future research directions.  ...  ACKNOWLEDGMENTS We thank René Hummen for his help and ideas on HIP protocol testing. We also thank Vitaly Chipounov and Oscar Soria Dustmann for helping us to improve the quality of the paper.  ... 
doi:10.1109/icnp.2012.6459940 dblp:conf/icnp/SasnauskasKJW12 fatcat:amcerirhqfcjnhgp3ocx4rehym

Knowledge Management in Small Firms [chapter]

Jessada Panyasorn, Niki Panteli, Philip Powell
2009 IFIP Advances in Information and Communication Technology  
Evidence of knowledge creation is found at the departmental level but not at the organizational level.  ...  The key findings suggest that publishing, searching, sharing and retrieving are the user modes for enabling sharing and storing information.  ...  The team of OS, Network and Application focus on implementation systems for customers, whereas Support & MA tracks and supports customers after implementation.  ... 
doi:10.1007/978-3-642-02388-0_14 fatcat:oykj3aweonhffgyqlvma2gac3u

Towards automated provisioning of secure virtualized networks

Serdar Cabuk, Chris I. Dalton, HariGovind Ramasamy, Matthias Schunter
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
We have implemented a prototype of the framework based on the Xen hypervisor.  ...  We have implemented a prototype of the framework based on the Xen hypervisor.  ...  Acknowledgements We thank the other authors of [6] for valuable inputs. This work has been partially funded by the European Commission as part of the OpenTC project www.opentc.net.  ... 
doi:10.1145/1315245.1315275 dblp:conf/ccs/CabukDRS07 fatcat:6snudt5tgbdprduwjyrf3d5izi

A Classification Method of Network Ideological and Political Resources Using Improved SVM Algorithm

WenXia Wang, Jian Su
2021 Security and Communication Networks  
of network ideological and political resources based on the improved SVM algorithm is proposed.  ...  In order to improve the accuracy and efficiency of the classification of network ideological and political resources and promote the efficiency of ideological education, a research on the classification  ...  of resources and the development of resources. ose network information resources with strong ideological and political education significance have problems of disorder.  ... 
doi:10.1155/2021/2133042 fatcat:ruyb4fmxabeurhyb5kyzj6kl4q

Systems Computing Challenges in the Internet of Things [article]

Rajeev Alur, Emery Berger, Ann W. Drobnis, Limor Fix, Kevin Fu, Gregory D. Hager, Daniel Lopresti, Klara Nahrstedt, Elizabeth Mynatt, Shwetak Patel, Jennifer Rexford, John A. Stankovic, Benjamin Zorn
2016 arXiv   pre-print
IoT has the potential to have a profound impact on our daily lives, including technologies for the home, for health, for transportation, and for managing our natural resources.  ...  , activities, and the future in uncanny ways; and to manipulate the physical world in response.  ...  System Computing Challenges in the Internet of Things: A white paper prepared for the Computing Community Consortium committee of the Computing Research Association. http://cra.org/ccc/resources/ccc-led-whitepapers  ... 
arXiv:1604.02980v1 fatcat:vldhpvc5vjhwtht2mf4qzk3sje
« Previous Showing results 1 — 15 out of 93 results