The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Semantic Web services (SWs) and P2P computing have emerged as new paradigms for solving complex problems by enabling large-scale aggregation and sharing of distributed computational resources. In this paper, we present a scalable approach based on epidemic discovery algorithm to discover new distributed and heterogeneous collaborative applications of large-scale distributed systems in a P2P network,...
In opportunistic networks, nodes hold packets in permanent storage and make independent routing decisions on sporadically emerging links. This helps to achieve connectivity even if an end-to-end contemporaneous path does not exist between a pair of nodes. Next-hop decision is generally dependent on future probability of encounters with a destination node while other constraints on nodes' resources...
Rapid growth in users of smartphones and other mobile devices is increasing the demand for online video service to these mobile devices. The mobile video on demand (VoD) service is almost exclusively provided by content delivery network (CDN) servers since mobile devices are not powerful enough to provide any peer-to-peer (P2P) service. However, in a mixed VoD system with both non-mobile and mobile...
Trust management is one of the major issues for secure communication in vehicular network. Most of the existing trust models are identity-based and use excessive periodic exchange between vehicles to build a decision about trustiness of participating vehicles. Malicious data can be minimized in such models using identities reputation. In general, the nature and the quality of the data are not taken...
Pull-based late-binding overlays are used in some of today's largest computational grids. Job agents are submitted to resources with the duty of retrieving real workload from a central queue at runtime. This helps overcome the problems of these complex environments: heterogeneity, imprecise status information and relatively high failure rates. In addition, the late job assignment allows dynamic adaptation...
Within the Future Internet, a new trend is foreseen with the creation of overlay networks composed of residential gateways (i.e. Home-Box), leveraging their storage and upload capacity in order to achieve scalable and cost-efficient content distribution. In this paper, we highlight an architecture of such a home-box overlay for Video On Demand (VOD) services, in cooperation with a network-aware request...
Due to intermittent connectivity and uncertain node mobility, opportunistic message forwarding algorithms have been widely adopted in delay tolerant networks (DTNs). While existing work proposes practical forwarding algorithms in terms of increasing the delivery rate and decreasing data overhead, little attention has been drawn to the control overhead induced by the algorithms. The control overhead...
The context of this work is the online characterization of errors in large scale systems. In particular, we address the following question: Given two successive configurations of the system, can we distinguish massive errors from isolated ones, the former ones impacting a large number of nodes while the second ones affect solely a small number of them, or even a single one? The rationale of this question...
The BitTorrent mechanism effectively spreads file fragments by copying the rarest fragments first. We propose to apply a mathematical model for the diffusion of fragments on a P2P in order to take into account both the effects of peer distances and the changing availability of peers while time goes on. Moreover, we manage to provide a forecast on the availability of a torrent thanks to a neural network...
This work is concerned with the problem of efficient and intelligent message forwarding in wireless networks. This problem arises in many diverse scenarios within ad-hoc networks and especially networks formed during and in the aftermath of a disaster in which infrastructure-based communication systems have been damaged or completely destroyed. Within this setting, mobile devices need to support critical...
Data access is an important and challenging issue in Mobile Social Networks (MSNs), and cooperative caching is an effective technique to improve the access performance. Most of current research efforts in data access of MSNs focus on improving the access performance while neglecting the fair treatment of users. Because fairness is considered as a major incentive for peer-to-peer service especially...
Content replication and placement is an effective technique to improve data availability and enhancing network performance. This area received attention in Content Delivery Networks (CDNs), but is less explored by the research community in Wireless Mesh Networks (WMNs). A number of replica placement algorithms were specifically designed for CDNs, but they do not consider the special features of wireless...
Multipath routing can provide a better solution for several of the current BGP's problems in the inter-domain scenario by allowing a cleaner separation between routing and traffic engineering and better failure containment. The separation between routing control logic and data forwarding, and the use of software defined networking principles open space to easier deployments of new routing protocols...
Distributed systems in which users consume and supply different types of services and resources are becoming ever more prevalent. For the matching of consumers and providers, preference-based two-sided matching algorithms can be used to improve the efficiency of the overall match outcome. In such systems, requesting (providing) users rank others based on preferences derived from feedback. Trust can...
The Internet has become a large platform where users can interact and share contents. In this context, content distribution systems (CDS) have been designed to satisfy users needs. Peer-to-Peer (P2P) systems have emerged as a prominent solution to speed up CDS. In this kind of distributed system, a particular interesting challenge refers to mechanisms employed to match user's interests and published...
A new generation of social discovery and crowd-sourced location-based services promise to integrate mobile computing into our lives more than ever. An essential component in these services is the neighbor or peer selection, that is also needed for peer-to-peer (P2P) mobile applications and multiplayer mobile gaming. One major challenge is posed by the interpretation of the information collected by...
Network lifetime has become the key characteristic for evaluating sensor networks in an application-specific way. In this paper, we focus on Mobile Wireless Sensor Networks, which are specific opportunistic networks because of their poor connectivity among the mobile sensors, and thus it is difficult to form a well connected mesh network for transmitting data through end-to-end connections from the...
Geocasting aims to deliver information to all nodes within a geographic area rather than an arbitrary group of nodes. Supporting geocasting in the context of opportunistic networks where nodes are not well-connected is still an open problem. We present a routing algorithm to provide geocasting service for opportunistic networks, termed Geoopp. Geoopp combines unicasting and flooding by first forwarding...
We explore the networking aspects of realizing self-organized intersection management. Inter-Vehicle Communication (IVC) based on DSRC/WAVE is expected to complement other communication technologies including Wi-Fi and 3G/4G. Applications range from road traffic efficiency to critical safety situations, intersection management being one of the most compelling applications. The Virtual Traffic Light...
The literature of wireless adhoc networks includes a plethora of alternative dissemination strategies that aim for efficient delivery of data traffic from source to destination. Hence, the majority of these strategies assume that the source-destination pair is known prior to any data forwarding. On the contrary, an adhoc network opportunistically formed by mobile devices in the aftermath of a disaster,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.