A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Toward Optimal Replication for Hierarchical Location Management in Wireless Systems
[chapter]
1999
Lecture Notes in Computer Science
The location information of users can be replicated at various databases in a hierarchy to improve the efficiency of call lookups at the expense of increase in update and storage cost. ...
In this paper, we systematically investigate this problem and propose two solutions. ...
To provide faster lookup, [4] and [15] propose to cache or replicate the location information of a user in the databases of additional zones, so that subsequent calls from these zones can reuse this ...
doi:10.1007/978-3-540-49121-7_24
fatcat:7pqirtec3zgfpmplinp5vtxhy4
Exploring the Role of Software Architecture in Dynamic and Fault Tolerant Pervasive Systems
2007
First International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE '07)
We discuss the design and implementation of facilities we have provided in a tool-suite targeted for architecture-based development of fault tolerant pervasive systems. ...
This is particularly evident in a growing class of mobile and dynamic pervasive systems that are highly unpredictable, and thus require flexible and adaptable software support. ...
This work is sponsored in part by the National Science Foundation under Grant number ITR-0312780 and by Bosch Research and Technology Center. ...
doi:10.1109/sepcase.2007.6
fatcat:tjif6xt62vhgxl7rtzfwjntmki
Peer-to-Peer based Social Networks: A Comprehensive Survey
[article]
2020
arXiv
pre-print
While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store. ...
Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure ...
"Optimistic replication", on the other hand, allows for sharing of data efficiently in wide area as well as mobile environments and is therefore preferred for globally distributed networks. ...
arXiv:2001.02611v2
fatcat:nrvp45dy3rbnhmajtvqiect3ty
Decentralized Supplementary Services for Voice-over-IP Telephony
[chapter]
2007
Lecture Notes in Computer Science
Therefore, we introduce a framework to build distributed supplementary services for VoIP. ...
Some of these services like completion of calls on no reply or holding are already commonly established in public switched telephone networks or realized in centralized VoIP servers like Asterisk [1] . ...
To make lookups much faster, CHORD also maintains an additional routing table, the so-called finger table. ...
doi:10.1007/978-3-540-73530-4_8
fatcat:xkzngxskijbhtbi7ft5o2jv3a4
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
2006
International Journal of Wireless Information Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments. ...
Available resources include those in the fixed surrounding infrastructure as well as services offered by other nearby mobile devices. ...
used by mobile devices to forage for information in pervasive environments. ...
doi:10.1007/s10776-006-0040-3
fatcat:nnfhqsxagvgqjl363ff2maxalu
DHT-based Communications Survey: Architectures and Use Cases
[article]
2021
arXiv
pre-print
DHT structures arise as the most commonly used organizations for peers that can efficiently perform crucial services such as data storage, replication, query resolution, and load balancing. ...
We investigate the recently emerged DHT-based solutions in the seven key domains of edge and fog computing, cloud computing, blockchain, the Internet of Things (IoT), Online Social Networks (OSNs), Mobile ...
At the heart of it is the ability to uniquely, globally and verifiably locate a user account and retrieve its profile content. ...
arXiv:2109.10787v1
fatcat:pahehqjekrhrlnxex3khdsr5uq
Peer-to-Peer-Based Social Networks: A Comprehensive Survey
2020
SN Computer Science
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage ...
, secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys. ...
-Optimistic propagation Allows sharing of data efficiently in wide area and mobile environments hence is preferred for globally distributed networks. ...
doi:10.1007/s42979-020-00315-8
fatcat:iwktgohkjbdalmalaj5h3lulri
Supporting service discovery, querying and interaction in ubiquitous computing environments
2001
Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access - MobiDe '01
Secondly, we present a detailed analysis of requirements for providing effective support in this domain. ...
In this paper, we contend that ubiquitous computing environments will be highly heterogeneous, service rich domains. ...
For instance, a user may wish to locate the printer that they used the last time they visited a given environment, or the one they use the most frequently. ...
doi:10.1145/376868.376879
dblp:conf/mobide/FridayDC01
fatcat:rnd6vw3epzbhvdz6ossoknyqnm
Supporting Service Discovery, Querying and Interaction in Ubiquitous Computing Environments
2004
Wireless networks
Secondly, we present a detailed analysis of requirements for providing effective support in this domain. ...
In this paper, we contend that ubiquitous computing environments will be highly heterogeneous, service rich domains. ...
For instance, a user may wish to locate the printer that they used the last time they visited a given environment, or the one they use the most frequently. ...
doi:10.1023/b:wine.0000044024.54833.cb
fatcat:ddhlm7jstzh7jgczakp3laxxsm
Distributed file systems: concepts and examples
1990
ACM Computing Surveys
It also presents alternatives for the semantics of sharing and methods for providing access to remote files. ...
The purpose of a distributed file system (DFS) is to allow users of physically distributed computers to share data and storage resources by using a common file system. ...
We would like to thank the anonymous reviewers and the editor-in-chief, Salvatore March, for their constructive comments that led us to improve the clarity of this paper. ...
doi:10.1145/98163.98169
fatcat:adzsx2bhebd4vpsy2hwg35cjhi
P2P networking: an information sharing alternative
2001
Computer
Acknowledgments The authors thank Intel and IBM for their support. ...
A network can apply user feedback to build contributor profiles, similar to the scores eBay provides for auctioneers. ...
profiles. ...
doi:10.1109/2.933501
fatcat:pbyn7gg5kze4xjtycpisc33fmy
Location-Dependent Query Processing: Semantic Cache for Real-Time Smart City Analytics
2021
Applied Bionics and Biomechanics
Our approach is unique and distinct from the traditional query processing system especially in mobile domain for the prediction of future locations of users. ...
An aim of the research work is achieved through effectively processing of queries in terms of location-dependent, originated by mobile users. ...
Acknowledgments Authors thank National University of Computer and Emerging Science (FAST) for the provision of means to conduct the study. ...
doi:10.1155/2021/9958647
pmid:34970332
pmcid:PMC8714369
fatcat:f6efzk6bpfggvbxcabha6a2nty
Edge Based Data-Driven Pipelines (Technical Report)
[article]
2018
arXiv
pre-print
research reports investigates an edge on-device stream processing platform, which extends the serverless com- puting model to the edge to help facilitate real-time data analytics across the cloud and edge in ...
deployed and tested our system on edge devices (Raspberry Pi and Android Phone), which proves that stream processing analytics can be performed at the edge of the network with single board computers in ...
The function profile is responsible for encapsulating the process to be executed and provide the end user with fine-grained control over deployment and execution based on location and QoS requirements. ...
arXiv:1808.01353v1
fatcat:7vrmuolk3rc6njutkthphlxskq
LibreSocial: A Peer-to-Peer Framework for Online Social Networks
[article]
2020
arXiv
pre-print
In this paper, we define the basic requirements for a P2P OSN. ...
Over the course of time, several essential new technologies have been incorporated within LibreSocial for better functionalities. ...
This offers a faster method of locating data over the distributed sets and distributed linked list. The PHT allows the range queries to locate objects. ...
arXiv:2001.02962v2
fatcat:ou5jzvod2rd6lmjmvvym6vf7iq
Distributed redirection for the World-Wide Web
2005
Computer Networks
Replication in the World-Wide Web covers a wide range of techniques. ...
As an alternative, we propose to perform the redirection as close to the client as possible in a fully distributed and transparent manner. ...
For a highly mobile object, the mobility pattern can be analyzed and the intermediate server storing its address be strategically chosen on the path of the object, as proposed in [2] . ...
doi:10.1016/j.comnet.2005.01.019
fatcat:mfv7y7ergvcd5irvat6ouaezku
« Previous
Showing results 1 — 15 out of 1,241 results