The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the sparse distribution of road video surveillance cameras, precise trajectory tracking for hit-and-run vehicles remains a challenging task. Previous research on vehicle trajectory recovery mostly focuses on recovering trajectory with low-sampling-rate GPS coordinates by retrieving road traffic flow patterns from collected GPS information. However, to the best of our knowledge, none of them...
In this paper we consider the data caching problem in next generation data services in the cloud, which is characterized by using monetary cost and access trajectory information to control cache replacements, instead of exploiting capacityoriented strategies as in traditional research. In particular, given a stream of requests to a shared data item with respect to a homogeneous cost model, we first...
Due to the sparse distribution of road video surveillance cameras, precise trajectory tracking for vehicles remains a challenging task. To the best of our knowledge, none of the previous research considered using on-road taxicabs as mobile video surveillance cameras and road traffic flow patterns, therefore not suitable for recovering trajectories of vehicles. With this insight, we model the travel...
Nowadays, more and more companies intend to combine public transport system with the mature Wi-Fi technology to bring more passengers value-added services during their travel. It is critical to mobile service market and city management by identify the user's behavior patterns. In this paper, the author firstly analyzes the time regularity of bus Wi-Fi network behavior. Then from the perspective of...
In this paper, we study the problem of dynamically migrating a service in Clouds to satisfy a sequence of mobile batch-request demands in a cost effective way. The service may have a single or multiple replicas, each running on a virtual machine. As the origins of the mobile accesses are frequently changed over time, this problem is particularly important to those time-bounded services to achieve...
In this paper, we design and develop time-efficient algorithms that identify vantage locations to stage a shared data item for the ease of mobile accesses. As mobile users will be charged on the use of communication bandwidth as well as on the fraction of the time the storage resources are kept busy on their respective data, we aim to provide such access for a class of mobile users using Cloud services...
Aiming at how to reduce energy consumption and improve the node survival cycle in mobile P2P network, SRDBSM was proposed. It uses the transmission characteristics of spatial node to search the optimal node which is considered as next-hop node within the maximum effective transmission range. It's not only reduces next-hop number and communion time, but also improves the efficiency of resource discovery...
Abstract-Load control is an important component of wireless resource management (RRM).It detect system load in period and provide a suitable solution to make sure that system load below threshold.Load control algorithms can be devised from a multi-cell perspective.This allows the reduction of the load in a given reference cell.In particular,this can be beneficial when service distribution is not homogeneous...
Seamless handover is one of the most attractive research fields in B3G systems. Many mechanisms are proposed to provide certain QoS guarantees in handovers of mobile systems, which would also introduce new threats, such as DoS and DDOS attacks. In this paper, we extend a cookie-based scheme to protect systems from DoS and DDoS attacks. We also adopt a novel queuing network model to analyze our scheme...
With the advent of high bandwidth third-generation mobile networks and other wireless networks, grid computing has migrated from traditional parallel and distributed computing to pervasive and utility computing based on the wireless networks and mobile devices, which results in the emergence of a new computing paradigm named mobile grid. Data replication is widely used in mobile grid environments...
RF techniques have attracted much attention for the indoor tracking, because of its better penetrability than traditional techniques, such as infrared or ultrasound. Generally, existing systems mostly focuses on the localization of the mobile entity. In fact, area information is also an important requirement for some applications, such as intelligent museum explanation, etc. Also, the area information...
Telecommunications fraud is increasing dramatically resulting in costing operators almost $60 billion each year. Due to the increase of bandwidth of 3G mobile communication equipment, the fraud can be in terms of network, commercial, customer or even staff and all will remain keys in assessing 3G fraud risk. Current methods such as artificial neural network and statistic methods used to detect fraud...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.