Filters








105,228 Hits in 3.8 sec

Opportunistic data structures with applications

P. Ferragina, G. Manzini
Proceedings 41st Annual Symposium on Foundations of Computer Science  
In designing these implicit data structures the goal is to reduce as much as possible the auxiliary information kept together with the input data without introducing a significant slowdown in the final  ...  There is an upsurging interest in designing succinct data structures for basic searching problems (see [23] and references therein).  ...  We design two algorithms for operating on our opportunistic data structure.  ... 
doi:10.1109/sfcs.2000.892127 dblp:conf/focs/FerraginaM00 fatcat:cnisrvyhhjhktnlvqznukdfu2a

A Smartphone-Targeted Opportunistic Computing Environment for Decentralized Web Applications

Lionel Touseau, Yves Maheo, Camille Nous
2021 2021 IEEE 46th Conference on Local Computer Networks (LCN)  
Then we present the implementation of a programming model called foglet that allows web browsers to share consistent data structures.  ...  Providing smartphone users with decentralized web applications is an actual trend, but making web applications run in a decentralized though collaborative way in real conditions, with connectivity disruptions  ...  data structures.  ... 
doi:10.1109/lcn52139.2021.9524983 fatcat:7j2z4on54ffp5apakhua2x24uy

Smartphone with Augmented Gateway Functionality as Opportunistic WSN Gateway Device

Marko Pesko, Miha Smolnikar, Matevž Vučnik, Tomaž Javornik, Milica Pejanović-Djurišić, Mihael Mohorčič
2014 Wireless personal communications  
These devices either represent additional gateways for exposing data and metadata to external networks, or serve as connection points to WSN M. Pesko  ...  Sensors and actuators are being increasingly deployed for monitoring and controlling different phenomena and processes in a stand-alone manner or attached to sensor nodes with communication capabilities  ...  Fig. 4 4 Data frame structures used by opportunistic WSN gateway device. Fig. 5 5 Application sequence diagram. Fig. 6 6 HTTP GET request format used in the use case.  ... 
doi:10.1007/s11277-014-1908-7 fatcat:dboag4i2gbbknf5nmgpk7naz6u

SCAMPI application platform

Teemu Kärkkäinen, Mikko Pitkänen, Paul Houghton, Jörg Ott
2012 Proceedings of the seventh ACM international workshop on Challenged networks - CHANTS '12  
The platform includes an opportunistic router, HTML5 application development framework, and an opportunistic application market for distributing applications.  ...  In this paper we demonstrate an application platform architecture and implementation that allows developers to easily target opportunistic networks.  ...  In this paper we describe our solution for an opportunistic application development platform with support for both native application development and HTML5.  ... 
doi:10.1145/2348616.2348636 dblp:conf/mobicom/KarkkainenPHO12 fatcat:xjnh2ikdxzfl5ifj2546kovuh4

From opportunistic networks to opportunistic computing

Marco Conti, Silvia Giordano, Martin May, Andrea Passarella
2010 IEEE Communications Magazine  
It is a data structure that contains any type of data: from messages to be sent on the network to internal data exchanged by managers.  ...  each data item, exploiting connectivity opportunities and using the context information coming with the data itself (and, in particular, the application concerned), as well as context information contained  ... 
doi:10.1109/mcom.2010.5560597 fatcat:svzmhzr27ffxnmh7pgjaojpu7y

Opportunities in Opportunistic Computing

Marco Conti, Mohan Kumar
2010 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  This looks to be a promising approach, as contacts between nodes are fundamentally tied with users' behavior and hence with social network structures.  ...  In opportunistic computing, devices carry one another's information in their content cache, which should be optimally maintained by purging unwanted data and keeping data useful to the applications on  ... 
doi:10.1109/mc.2010.19 fatcat:6ykgb46wlbca5jtjlzbwcnjdfm

Opportunities in opportunistic computing

Marco Conti, Mohan Kumar
2009 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  This looks to be a promising approach, as contacts between nodes are fundamentally tied with users' behavior and hence with social network structures.  ...  In opportunistic computing, devices carry one another's information in their content cache, which should be optimally maintained by purging unwanted data and keeping data useful to the applications on  ... 
doi:10.1109/mc.2009.378 fatcat:mq3mdzqszvhzfcelxdpu7i7wjm

Sensor Mobile Enablement (SME): A light-weight standard for opportunistic sensing services

Valerio Arnaboldi, Marco Conti, Franca Delmastro, Giovanni Minutiello, Laura Ricci
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
This highlights the necessity of defining a common standard for sensing data encoding in order to guarantee the interoperability of heterogeneous devices and personal mobile systems.  ...  Results highlight that SME does not heavily impact on mobile system's performances while efficiently supporting opportunistic sensing services.  ...  social-aware applications over opportunistic networks.  ... 
doi:10.1109/percomw.2013.6529488 dblp:conf/percom/ArnaboldiCDMR13 fatcat:z6czn6qdcveifdsrvcyetqotxy

Power consumption evaluation in vehicular opportunistic networks

Jorge Herrera-Tapia, Pietro Manzoni, Enrique Hernandez-Orallo, Carlos T. Calafate, Juan-Carlos Cano
2015 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)  
Fig. 5 : 5 Impact of data transmission. TABLE I : I Logs Structure No.  ...  Furthermore, there is a logging application developed just to collect power consumption data every 0.1 seconds and transmit that information. Table I shows the structure of these records.  ... 
doi:10.1109/ccnc.2015.7158100 dblp:conf/ccnc/Herrera-TapiaMH15 fatcat:l4jurpmwy5azfp3nteolt3752e

Monoliths to Mashups: Increasing Opportunistic Assets

M. Todd Gamble, Rose Gamble
2008 IEEE Software  
Increasing integration services can improve opportunistic development by presenting monolith applications as opportunities for mashups.  ...  Data mashups provide content filtering, aggregation, and other data transformations to present reusable output as opportunistic assets with high functional and technical fitness, but with low QoS due to  ...  Monoliths are large, self-contained software applications that control significant data and processing components. Mashups are Web application hybrids that consume opportunistic assets.  ... 
doi:10.1109/ms.2008.152 fatcat:4ikij6crfvbzdmvwg2jp2snura

Opportunistic IoT: Exploring the social side of the internet of things

Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang
2012 Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD)  
It enables information sharing and dissemination within/among opportunistic communities that are formed with the movement and opportunistic contact nature of human.  ...  We characterize the bi-directional effect between human and opportunistic IoT, present the innovative application areas, and discuss the challenges raised by this new computing paradigm.  ...  The Effect of Human Behaviors to Opportunistic IoT Data sharing is the major application area of opportunistic IoT.  ... 
doi:10.1109/cscwd.2012.6221932 dblp:conf/cscwd/GuoYZZ12 fatcat:62t4224durc2pkgdesh25hnbym

A Comparative Analysis of Different Routing Scheme in Opportunistic Network

Minakshi Sona Malhotra
2016 IOSR Journal of Computer Engineering  
In opportunistic network numbers of routing protocols are presented. Routing protocols are used for data transmission in network.  ...  Data transmission takes place through intermediate nodes. These intermediate nodes uses store-carry-forward model for data transmission.  ...  Routing Strategies Routing schemes for opportunistic networks have been categorized as given below:  Direct Delivery: The source node carries data with it until it directly comes in contact of destination  ... 
doi:10.9790/0661-15010020267-72 fatcat:oga7k3yqkncsddqculb3weqnpa

Context-aware File Sharing for Opportunistic Networks

Marco Conti, Franca Delmastro, Andrea Passarella
2007 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems  
Opportunistic networks are mainly characterized by nodes intermittently connected among them.  ...  In this demo we present an enhanced file sharing application based on the exchange of context information between nodes.  ...  This will allow our demo not to interfere with any other demo running on 802.11.  ... 
doi:10.1109/mobhoc.2007.4428696 dblp:conf/mass/ContiDP07 fatcat:x7hdtll5szdadeliizkkdoawli

Reproducing opportunistic connectivity traces using connectivity models

Thabotharan Kathiravelu, Arnold Pears
2007 Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07  
In opportunistic networking devices make control and management decisions by themselves with locally available information.  ...  Intermittent connectivity, non existence of an end-to-end path between nodes and extreme dynamism in topological structure are inherent characteristics of opportunistic networking [2, 5] .  ...  Data persistence will enable future development of applications that rely on opportunistic connections among devices, and will open up new avenues for novel content distribution technologies.  ... 
doi:10.1145/1364654.1364697 dblp:conf/conext/KathiraveluP07 fatcat:xypscdamxvaw7b47dncfmcq7h4

Collection and analysis of multi-dimensional network data for opportunistic networking research

Theus Hossmann, George Nomikos, Thrasyvoulos Spyropoulos, Franck Legendre
2012 Computer Communications  
The first dataset we have collected with Stumbl, a Facebook application that lets participating users report their daily face-to-face meetings with other Facebook friends.  ...  Opportunistic networks use human mobility and consequent wireless contacts between mobile devices to disseminate data in a peer-to-peer manner.  ...  of opportunistic applications [3, 10, 11] .  ... 
doi:10.1016/j.comcom.2012.05.003 fatcat:wvu7n3z5infz3a57ycoild5ndi
« Previous Showing results 1 — 15 out of 105,228 results