Filters








1,792 Hits in 7.6 sec

Optimizing top-k queries for middleware access

Seung-won Hwang, Kevin Chen-chuan Chang
2007 ACM Transactions on Database Systems  
Optimizing top-k queries for middleware access: A unified cost-based approach.  ...  To fulfill this critical lacking, we aim at taking a costbased optimization approach: By runtime search over a space of algorithms, cost-based optimization is general across a wide range of access scenarios  ...  CONCLUSION This article has developed a cost-based optimization framework for top-k querying in middlewares.  ... 
doi:10.1145/1206049.1206054 fatcat:p5rqu5cvyje53f7yvsvddcxyse

Optimizing Access Cost for Top-k Queries over Web Sources: A Unified Cost-Based Approach

Seung-won Hwang, K.C.-C. Chang
21st International Conference on Data Engineering (ICDE'05)  
In particular, how to access sources with different capabilities and costs, to answer queries efficiently?  ...  This paper aims at optimizing such access costswhich dominate the overall query processing (like I/O in relational DBMS).  ...  Toward this goal of general yet adaptive framework, we take a "cost-based optimization" approach-By dynamic search over a space ª of possible algorithms, cost-based optimization is general across virtually  ... 
doi:10.1109/icde.2005.102 dblp:conf/icde/HwangC05 fatcat:hhdctxmttzew3ajqrpxm4iczqq

Efficient access to web services

2004 IEEE Internet Computing  
Because efficiency plays a central role in such evaluations, the authors propose a query optimization model based on aggregating the quality of Web service (QoWS) parameters of different Web services.  ...  Efficient Access to Web Services For Web services to expand across the Internet, users need to be able to efficiently access and share Web services.  ...  Our goal is to propose such a generic approach for optimally querying Web services.  ... 
doi:10.1109/mic.2004.1273484 fatcat:sxmmk2slj5ax5evdpidju6jy6u

OVERVIEW AND EVALUATION OF CONCEPTUAL STRATEGIES FOR ACCESSING CPU-DEPENDENT EXECUTION RESOURCES IN GRID INFRASTRUCTURES

Walsh John, Dukes Jonathan, Pierantoni Gabriele, Coghlan Brian
2015 Computer Science  
Furthermore, a two-phase approach to job-submission is proposed for those jobs requiring access to CDERs. The approach is compatible with existing grid services.  ...  ., GPGPUs) has led to user demand for such resources in grid infrastructures. A widely adopted approach for discovering and accessing such resources has, however, yet to emerge.  ...  For more information, please reference the EGI-InSPIRE paper [11] .  ... 
doi:10.7494/csci.2015.16.4.373 fatcat:qvslp56cxjc5lfqckwhwrwjqni

Identity access management for Multi-tier cloud infrastructures

Mohammad Faraji, Joon-Myung Kang, Hadi Bannazadeh, Alberto Leon-Garcia
2014 2014 IEEE Network Operations and Management Symposium (NOMS)  
Identity and Access Management in Multi-tier Cloud Infrastructure  ...  This approach is not feasible for most private companies due high cost of setup.  ...  This task costs three network calls for the middleware. As tokens are valid for a specific duration, the middleware can store a token until it expires or is revoked by the IAM.  ... 
doi:10.1109/noms.2014.6838229 dblp:conf/noms/FarajiKBL14 fatcat:rbcus7sqavgbjjvnmy4h5ijsua

Optimized Composition for Multiple User Service Requests Based on Edge-Cloud Collaboration

Jine Tang, Tao Lin, Dong Wang, Zhangbing Zhou
2021 IEEE Access  
In this setting, a large number of smart object devices provide IoT services for people to carry on day-to-day activities.  ...  These services are easy to access, and thus, can be easily used by different users with different requirements through service allocation and composition.  ...  [29] extend IR-tree and construct text-first index structure SIF for batch processing top-k spatial-textual queries with the help of block based inverted file. Zhong et al.  ... 
doi:10.1109/access.2021.3093936 fatcat:zmhqoizjpnakbaro3axnhg6c6i

IoT Middleware Platforms for Smart Energy Systems : An Empirical Expert Survey

Qamar Alfalouji, Thomas Schranz, Alexander Kümpel, Markus Hans Schraven, Thomas Storek, Stephan Gross, Antonello Monti, Dirk Müller, Gerald Schweiger
2022 Buildings : open access journal 12(5)  
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY  ...  Acknowledgments: Open Access Funding by the Graz University of Technology. Conflicts of Interest: The authors declare no conflict of interest.  ...  is configured and a set of mobile applications for remote access.  ... 
doi:10.18154/rwth-2022-04034 fatcat:uqahmxsf2rczfkx6ktqqfhozim

Internet of Smart City Objects: A Distributed Framework for Service Discovery and Composition

Fikret Sivrikaya, Nizar Ben-Sassi, Xuan-Thuy Dang, O. Can Gorur, Christian Kuster
2019 IEEE Access  
Smart cities generally aim at efficiently organizing and managing city resources through a digital layer on top of the legacy infrastructure.  ...  This paper presents our methodology of transforming the complex smart city concept and its digital layer into a structured model for creating a dynamic and adaptive service ecosystem in the digital cities  ...  From the query results, the planner creates an optimal composition of the services and provides endpoint information for SAPP to access outputs of video analysis.  ... 
doi:10.1109/access.2019.2893340 fatcat:apvn33up2jfrhemnnizqlzwxym

Platforms for Smart Environments and Future Internet Design: A Survey

Antonio M. Alberti, Mateus A. S. Santos, Ricardo Souza, Hirley Dayan L. Silva, Jorge R. Carneiro, Vitor C. Figueiredo, Joel J. P. C. Rodrigues
2019 IEEE Access  
Many others are to come; (vii) AI, machine learning, and big data support are missing not only in TCP/IP-based approaches, but also in future Internet-based.  ...  This paper provides a review of platforms, middleware, and frameworks that can help in this big challenge, discussing their architectures, service life-cycling, digital twins, cloud-based operation, virtualization  ...  K.  ... 
doi:10.1109/access.2019.2950656 fatcat:kxspcj4rjjaulctzqtankmlpjq

Recent Advances in Data Engineering for Networking

Engin Zeydan, Josep Mangues-Bafalluy
2022 IEEE Access  
We provide a comprehensive analysis of standardization efforts as well as platform development activities related to data engineering driven network design.  ...  We also propose several recommendations for early adoption of these technologies and frameworks in telecommunication infrastructures and platforms.  ...  cost (e.g., computational cost for inference, time for hyperparameter optimization).  ... 
doi:10.1109/access.2022.3162863 fatcat:jqpp6dyk3jf3tnzovplmlkoewu

Multi-access edge computing: open issues, challenges and future perspectives

Sonia Shahzadi, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul Qayyum
2017 Journal of Cloud Computing: Advances, Systems and Applications  
Considering the knowledge accumulated, procedures analysed and theories discussed, the paper provides a comprehensive overview on sateof-the-art and future research directions for multi-access mobile edge  ...  Keeping in view the far ranging impact of Edge Cloud Computing in future mobile generations, a comprehensive review of the prevalent Edge Cloud Computing frameworks and approaches is presented with a detailed  ...  Acknowledgment We are thankful to the Sohail Sarwar for proofreading the paper to improve the write up of the manuscript.  ... 
doi:10.1186/s13677-017-0097-9 fatcat:jzbyxrgk3fd4zo4s5ysxyjbbnq

Towards Efficient and Intelligent Internet of Things Search Engine

William Grant Hatcher, Cheng Qian, Weichao Gao, Fan Liang, Kun Hua, Wei Yu
2021 IEEE Access  
Further, we present a case study and seek to address a particular aspect of the query process for IoT search, namely efficient and timely query processing.  ...  Given the now obvious advances in machine learning, the potential for deep learning-based prediction to improve resource use, and thus query retrieval, is clear.  ...  : With regard to query processing optimization, the objective is to reduce the processing cost for received queries.  ... 
doi:10.1109/access.2021.3052759 fatcat:osnxv2spm5brfjlyswkxm5qm54

Multimedia Internet of Things: A Comprehensive Survey

Ali Nauman, Yazdan Ahmad Qadri, Muhammad Amjad, Yousaf Bin Zikria, Muhammad Khalil Afzal, Sung Won Kim
2020 IEEE Access  
We also present the need for better routing and Physical-Medium Access Control (PHY-MAC) protocols for M-IoT.  ...  This paper provides a comprehensive survey of M-IoT with an emphasis on architecture, protocols, and applications. This article starts by providing a horizontal overview of the IoT.  ...  Optimization models are adapted to analyze and process a user's query to achieve optimized throughput and accuracy to serve the query.  ... 
doi:10.1109/access.2020.2964280 fatcat:ilihkpik65bdvblyal6rp7tb2y

Tactile based Intelligence Touch Technology in IoT configured WCN in B5G/6G-A Survey

Mantisha Gupta, Rakesh Kumar Jha, Sanjeev Jain
2022 IEEE Access  
The survey also introduces a layered and interfacing architecture complete with its E2E solution for the intelligent touch based wireless communication system.  ...  In light of the aforementioned concerns, this study proposes an intelligent touch-enabled system for B5G/6G and IoT based wireless communication network that incorporates the AR/VR technologies.  ...  A storage device, for example, may not be included in the actor-based middleware used on a smart watch.  ... 
doi:10.1109/access.2022.3148473 fatcat:dbzbqyq3efaj7pbfwf4izmju64

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
In the past, researchers have employed several privacy preservation approaches including cryptographic encryption and k-anonymity to secure IoT-enabled critical infrastructure.  ...  Adversaries carry out privacy-oriented attacks to gain access to the sensitive and confidential data of critical infrastructure for various self-centered, political and commercial gains.  ...  Moreover, Hou et al. put forward a low-cohesion DP-based algorithm for frequent pattern mining for application-level privacy protection in IIoTs [300] .The authors utilized Top-k frequent mode to combine  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja
« Previous Showing results 1 — 15 out of 1,792 results