Filters








1,241 Hits in 7.3 sec

Toward Optimal Replication for Hierarchical Location Management in Wireless Systems [chapter]

San-Yih Hwang, Jeng-Kuen Chiu
1999 Lecture Notes in Computer Science  
The location information of users can be replicated at various databases in a hierarchy to improve the efficiency of call lookups at the expense of increase in update and storage cost.  ...  In this paper, we systematically investigate this problem and propose two solutions.  ...  To provide faster lookup, [4] and [15] propose to cache or replicate the location information of a user in the databases of additional zones, so that subsequent calls from these zones can reuse this  ... 
doi:10.1007/978-3-540-49121-7_24 fatcat:7pqirtec3zgfpmplinp5vtxhy4

Exploring the Role of Software Architecture in Dynamic and Fault Tolerant Pervasive Systems

Chiyoung Seo, Sam Malek, George Edwards, Daniel Popescu, Nenad Medvidovic, Brad Petrus, Sharmila Ravula
2007 First International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments (SEPCASE '07)  
We discuss the design and implementation of facilities we have provided in a tool-suite targeted for architecture-based development of fault tolerant pervasive systems.  ...  This is particularly evident in a growing class of mobile and dynamic pervasive systems that are highly unpredictable, and thus require flexible and adaptable software support.  ...  This work is sponsored in part by the National Science Foundation under Grant number ITR-0312780 and by Bosch Research and Technology Center.  ... 
doi:10.1109/sepcase.2007.6 fatcat:tjif6xt62vhgxl7rtzfwjntmki

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store.  ...  Secondly, it elaborates on the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage, secure  ...  "Optimistic replication", on the other hand, allows for sharing of data efficiently in wide area as well as mobile environments and is therefore preferred for globally distributed networks.  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

Decentralized Supplementary Services for Voice-over-IP Telephony [chapter]

Christoph Spleiß, Gerald Kunzmann
2007 Lecture Notes in Computer Science  
Therefore, we introduce a framework to build distributed supplementary services for VoIP.  ...  Some of these services like completion of calls on no reply or holding are already commonly established in public switched telephone networks or realized in centralized VoIP servers like Asterisk [1] .  ...  To make lookups much faster, CHORD also maintains an additional routing table, the so-called finger table.  ... 
doi:10.1007/978-3-540-73530-4_8 fatcat:xkzngxskijbhtbi7ft5o2jv3a4

Querying in Packs: Trustworthy Data Management in Ad Hoc Networks

Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin, Yelena Yesha
2006 International Journal of Wireless Information Networks  
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing environments.  ...  Available resources include those in the fixed surrounding infrastructure as well as services offered by other nearby mobile devices.  ...  used by mobile devices to forage for information in pervasive environments.  ... 
doi:10.1007/s10776-006-0040-3 fatcat:nnfhqsxagvgqjl363ff2maxalu

DHT-based Communications Survey: Architectures and Use Cases [article]

Yahya Hassanzadeh-Nazarabadi, Sanaz Taheri-Boshrooyeh, Safa Otoum, Seyhan Ucar, Öznur Özkasap
2021 arXiv   pre-print
DHT structures arise as the most commonly used organizations for peers that can efficiently perform crucial services such as data storage, replication, query resolution, and load balancing.  ...  We investigate the recently emerged DHT-based solutions in the seven key domains of edge and fog computing, cloud computing, blockchain, the Internet of Things (IoT), Online Social Networks (OSNs), Mobile  ...  At the heart of it is the ability to uniquely, globally and verifiably locate a user account and retrieve its profile content.  ... 
arXiv:2109.10787v1 fatcat:pahehqjekrhrlnxex3khdsr5uq

Peer-to-Peer-Based Social Networks: A Comprehensive Survey

Newton Masinde, Kalman Graffi
2020 SN Computer Science  
Second, it gives an exposition of the building blocks for P2P frameworks that allow the creation of such sophisticated and demanding applications, such as user/identity management, reliable data storage  ...  , secure communication, access control and general-purpose extensibility, which are not properly addressed in other P2P surveys.  ...  -Optimistic propagation Allows sharing of data efficiently in wide area and mobile environments hence is preferred for globally distributed networks.  ... 
doi:10.1007/s42979-020-00315-8 fatcat:iwktgohkjbdalmalaj5h3lulri

Supporting service discovery, querying and interaction in ubiquitous computing environments

Adrian Friday, Nigel Davies, Elaine Catterall
2001 Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access - MobiDe '01  
Secondly, we present a detailed analysis of requirements for providing effective support in this domain.  ...  In this paper, we contend that ubiquitous computing environments will be highly heterogeneous, service rich domains.  ...  For instance, a user may wish to locate the printer that they used the last time they visited a given environment, or the one they use the most frequently.  ... 
doi:10.1145/376868.376879 dblp:conf/mobide/FridayDC01 fatcat:rnd6vw3epzbhvdz6ossoknyqnm

Supporting Service Discovery, Querying and Interaction in Ubiquitous Computing Environments

Adrian Friday, Nigel Davies, Nat Wallbank, Elaine Catterall, Stephen Pink
2004 Wireless networks  
Secondly, we present a detailed analysis of requirements for providing effective support in this domain.  ...  In this paper, we contend that ubiquitous computing environments will be highly heterogeneous, service rich domains.  ...  For instance, a user may wish to locate the printer that they used the last time they visited a given environment, or the one they use the most frequently.  ... 
doi:10.1023/b:wine.0000044024.54833.cb fatcat:ddhlm7jstzh7jgczakp3laxxsm

Distributed file systems: concepts and examples

Eliezer Levy, Abraham Silberschatz
1990 ACM Computing Surveys  
It also presents alternatives for the semantics of sharing and methods for providing access to remote files.  ...  The purpose of a distributed file system (DFS) is to allow users of physically distributed computers to share data and storage resources by using a common file system.  ...  We would like to thank the anonymous reviewers and the editor-in-chief, Salvatore March, for their constructive comments that led us to improve the clarity of this paper.  ... 
doi:10.1145/98163.98169 fatcat:adzsx2bhebd4vpsy2hwg35cjhi

P2P networking: an information sharing alternative

M. Parameswaran, A. Susarla, A.B. Whinston
2001 Computer  
Acknowledgments The authors thank Intel and IBM for their support.  ...  A network can apply user feedback to build contributor profiles, similar to the scores eBay provides for auctioneers.  ...  profiles.  ... 
doi:10.1109/2.933501 fatcat:pbyn7gg5kze4xjtycpisc33fmy

Location-Dependent Query Processing: Semantic Cache for Real-Time Smart City Analytics

Rabia Hasan, Waseem Shehzad, Ejaz Ahmed, Hasan Ali Khattak, Ahmed S. AlGhamdi, Sultan S. Alshamrani, Fahd Abd Algalil
2021 Applied Bionics and Biomechanics  
Our approach is unique and distinct from the traditional query processing system especially in mobile domain for the prediction of future locations of users.  ...  An aim of the research work is achieved through effectively processing of queries in terms of location-dependent, originated by mobile users.  ...  Acknowledgments Authors thank National University of Computer and Emerging Science (FAST) for the provision of means to conduct the study.  ... 
doi:10.1155/2021/9958647 pmid:34970332 pmcid:PMC8714369 fatcat:f6efzk6bpfggvbxcabha6a2nty

Edge Based Data-Driven Pipelines (Technical Report) [article]

Eduard Gibert Renart, Daniel Balouek-Thomert, Manish Parashar
2018 arXiv   pre-print
research reports investigates an edge on-device stream processing platform, which extends the serverless com- puting model to the edge to help facilitate real-time data analytics across the cloud and edge in  ...  deployed and tested our system on edge devices (Raspberry Pi and Android Phone), which proves that stream processing analytics can be performed at the edge of the network with single board computers in  ...  The function profile is responsible for encapsulating the process to be executed and provide the end user with fine-grained control over deployment and execution based on location and QoS requirements.  ... 
arXiv:1808.01353v1 fatcat:7vrmuolk3rc6njutkthphlxskq

LibreSocial: A Peer-to-Peer Framework for Online Social Networks [article]

Kalman Graffi, Newton Masinde
2020 arXiv   pre-print
In this paper, we define the basic requirements for a P2P OSN.  ...  Over the course of time, several essential new technologies have been incorporated within LibreSocial for better functionalities.  ...  This offers a faster method of locating data over the distributed sets and distributed linked list. The PHT allows the range queries to locate objects.  ... 
arXiv:2001.02962v2 fatcat:ou5jzvod2rd6lmjmvvym6vf7iq

Distributed redirection for the World-Wide Web

Aline Baggio, Maarten van Steen
2005 Computer Networks  
Replication in the World-Wide Web covers a wide range of techniques.  ...  As an alternative, we propose to perform the redirection as close to the client as possible in a fully distributed and transparent manner.  ...  For a highly mobile object, the mobility pattern can be analyzed and the intermediate server storing its address be strategically chosen on the path of the object, as proposed in [2] .  ... 
doi:10.1016/j.comnet.2005.01.019 fatcat:mfv7y7ergvcd5irvat6ouaezku
« Previous Showing results 1 — 15 out of 1,241 results