The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a fair scheduling solution for wireless mesh networks using multi-objective optimization technique. The main aim is to achieve fairness in wireless bandwidth utilization while also maximizing the overall system throughput in the wireless mesh network. We compare the proposed approach with existing solutions in a simulation environment.
Trust management has become a cornerstone for information security and privacy, to enable secure data sharing in pervasive healthcare systems. This paper proposes the use of the opportunistic networks (oppnets) paradigm as a solution for communication and data dissemination in such environment. Oppnet allows communication among nodes by opportunistically connecting devices without relying on any pre-existing...
Several protocols have been proposed to improve data accessibility in MANETs. Some of these proposals have adopted the cooperative caching scheme, allowing multiple mobile hosts within a neighborhood to cache and share data items in their local caches. Cross-layer optimization has not been fully exploited to further improve the performance of cooperative caching in these proposals. In this paper,...
With the growth of the Internet services, voice over IP (VoIP) has been playing a key role in cutting the costs of telephone calls. It can be seen that since the demand of VoIP over wireless network is growing, the use of VoIP over mobile ad-hoc network (MANET) is expected to grow as well. We have identified some of the challenging issues to ensure robust and secure voice communication over MANET...
In a pervasive wireless network, malicious nodes can initiate attacks to well-behaved nodes. This paper argues that our recently proposed probabilistic trust management scheme for pervasive computing can be used in pervasive wireless networks to provide protection against few typical attacks usually targeted at such systems. Simulation experiments are provided to assess the achievement of the stated...
In modern organizations, the communication between collaborators is essential to improve productivity. There is a need for mobile collaboration tools that allow efficient collaboration among staff in organization which may be located in different geographical areas and time zones. Mobile and pervasive computing provides easy and convenient access to information, enabling effective collaboration. This...
Semantic Web is emerging as a promising integration of trust management systems, fostering the use of ontology to achieve a common language for communication among humans, computers, and programs. In this paper, a novel Semantic Web solution called COmposite trust and Trust management in Opportunistic Networks (COTTON) is proposed, which provides an architectural basis for representing trust and trust...
Wireless mesh networks (WMNs) have become a network of choice to provide broadband wireless Internet connectivity where wired infrastructure is uneconomical or impractical to deploy. Their support for inexpensive broadband Internet services has made them even more attractive and increased users' demand. Even with their abundant computational resources in the form of mesh routers (MRs), WMNs suffer...
In this paper a model where an autonomic DBMS can identify and characterize the type of workload acting upon it is developed and the most important database status variables which are highly affected by changing workloads are identified. Two algorithms are selected for database workload classification: hierarchical clustering and classification & regression tree for classifying database workloads...
This paper addresses the problem of scheduling in Wireless Mesh Networks (WMNs). The paper first discusses existing scheduling algorithms and classifies them based on the technique they use and their implementation frameworks.Then detailed discussions of the proposed scheduling method are presented. Simulation experiments are conducted to compare the performance of fair scheduling with the method...
This paper addresses the survivability in existing ATM mesh networks with the goal to (1) compare the network survivability for link and path restorations, (2) to determine the effect of spare capacity distribution schemes on the restoration ratio, and (3) to determine the effect of the choice of candidate paths per node pair on the restoration ratio. It is observed that our results can contribute...
Several protocols have been proposed to improve data accessibility and reduce query delay in MANETs. Some of these proposals have adopted the cooperative caching scheme, allowing multiple mobile hosts within a neighborhood to cache and share data items in their local caches. Cross-layer optimization has not been fully exploited to further improve the performance of cooperative caching in these proposals...
Wireless mesh networks (WMNs) have been drawing significant attention due to their support for low cost broadband wireless Internet access. Despite extensive deployments in recent years, the 802.11 based wireless mesh networks suffer from unfairness attributed to the lack of adequate support for multihop communications. Most existing solutions focus on hard fairness by investigating fairness without...
Wireless mesh networks (WMNs) have recently received tremendous research attention in industry and academia. The application domain of WMN is expanding from experimental settings in academic research to practical implementations in community networking, public safety, transportation services, healthcare systems and other similar applications. While these applications are evolving, there are still...
In pervasive computing, interactions are possible among users, devices and applications anytime and anywhere. Security and privacy are critical issues in this environment because pervasive computing environments' decentralized and distributed nature means that classical, centralized security management mechanisms are not directly applicable. Pervasive computing's similarity to human society makes...
In this paper we employ a cross-layer design approach to improve the performance of combined cooperative caching and prefetching schemes. The cross-layer information is maintained in a separate data structure and is shared among layers. We also combine prefetching with cooperative caching to further improve performance. We carried out extensive simulation experiments and compared various approaches...
In this paper we propose a cluster-based cooperative caching scheme for Mobile Ad Hoc Networks (MANETs). We also adopt a prefetching scheme to complement the caching scheme. A cross-layer design approach is employed to further improve the performance of cooperative caching and prefetching schemes. Cross-layer information is shared among network protocol layers. The effect of network size and the Time-To-Live...
This paper presents an agent based system to increase the life time of node in Wireless Sensor Networks. In environment where node density is massive, placement is heterogeneous and lot of sensory traffic with redundancy is produced; individual nodes waste limited wireless bandwidth and consume lot of energy. This minimizes their life time on the network. Directed diffusion paradigm for distributed...
This paper proposes a routing metric known as weighted cumulative expected transmission time with load balancing (WCETT-LB) for wireless mesh net works. WCETTT-LB enhances the basic Weighted Cumulative Expected Transmission Time (WCETT) by incorporating load balancing into the routing metric. Unlike other existing schemes proposed for load balancing for wireless mesh networks, WCETT-LB implements...
Most existing message-oriented middleware for mobile networks rely on infrastructure or assume the existence of reliable and continuous connections among communicating entities. These schemes do not take advantage of cross-layer optimizations. Publish/subscribe middleware has been widely used to provide asynchronous communication functionality in distributed application environments. Due to node mobility...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.