The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Focused on the issue that the mobile terminal can not remote control each other, a remote control system between Android platforms was proposed. The system is a typical C/S mode, follow the specification of Android application, to achieve the remote control between two Android system developed by Java language. Firstly, it analyzes the key technologies of the system, like the architecture of Android...
Wireless sensor networks (WSNs) consist of hundreds or thousands of small energy-constrained nodes with sensing, computation, and wireless communication capabilities, which are spatially deployed at different locations to sense the physical conditions of the surrounding environment. As a result, WSNs are usually applied to many applications that require unattended operations. However unlike many other...
The single chip microcontroller units (MCU) are widely applied in various embedded systems combined with different function type of sensors, robots, hybrid vehicle, or communication interfaces to control circuits. Usually single chip MCU system is triggered via the input voltage to affect the internal program logic, and then, the output state is changed. Simple Network Management Protocol (SNMP) is...
Web-based applications offer a range of the benefits over traditional desktop applications; they are good for wide accessibility, platform independence, rich user experience, dynamic content, high scalability easy-to-share, and easy-to-use. This paper proposes a web-based framework of multimedia support for collaborative editing. A transmission protocol that integrates OT with the consideration of...
Service composition is becoming a central aspect in the new paradigm SaaS. In practice, most web services can not be integrated directly into applications because there are some mismatches in their interfaces. These mismatches may arise at different interoperability levels: technical, signature, behavioral, quality of service and semantic. In this paper, we present a model-based framework for generating...
As the rapid progress in vehicular communication technology, academic and industry pay more and more attention to vehicular ad hoc networks (VANETs). In VANETs, the dissemination delay and reliability are important criteria for many applications, especially emergency message dissemination. Existing approaches are hard to satisfy both requirements simultaneously due to the conflict between dissemination...
Authentication is the basic security service in an open and vulnerable communications network such as the Internet. Unilateral authentication is vulnerable to the Man-in-the-Middle (MitM) attack. The security of mutual authentication against MitM attack is also weak. As case studies, we discuss the security of the well-known mutual authentication protocol-Secure Sockets Layer (SSL) protocol, examine...
Service composition is becoming a central aspect in service-oriented computing. In practice, most Web services can not be integrated directly into an application-to-be because they are incompatible. How to ensure Web services compatible at the behavioral level is an important issue for Web services integration and collaboration in a seamless way. Based on the proposed formal model for Web service...
In this paper, we present simulation results evaluating the throughput performances of several high speed TCPs over OBS networks. We find that, among the five high speed TCPs including HSTCP, STCP, H-TCP, BIC, and CUBIC, in most cases BIC achieves the best throughput performances while STCP achieves the worst, and CUBIC will achieve throughputs remarkably lower than those of others when the burst...
Dynamic spectrum access (DSA) allows opportunistic use of licensed spectral bands by unlicensed radio devices. DSA improves the overall spectral efficiency but could result in interference between licensed and unlicensed radio devices. In this paper, we investigate the detection and avoidance (DAA) technique to mitigate such potential interference. We develop a time-domain asynchronous coordination...
Content aware storage (CAS) is a model of storage facility. In this paper, we present a prototype of CAS area network system implemented at Tsinghua University in China (THCASN) compliant to the OSD T-10 standard. Experimental results of performance comparing THCASN with NFS and iSCSI storage are described. The experimental results demonstrate the performance of THCASN is comparable to and better...
Wireless sensor networks (WSN) based on hexagonal mesh can be able to extend the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity. However, security for topology control is scarce in wireless sensor networks based on hexagonal mesh. In this paper, STCP, an energy-effective secure topology control protocol for wireless sensor networks...
Distributed system design has propelled network communication service beyond best effort data delivery. Thus building the on-demand and QoS-aware communication paths between distributed software components emerges as a key research challenge. In this paper we present two QoS-assured source multicast services based on a simple autonomic service provisioning framework. These two algorithms can provide...
Fault-tolerance is an important research topic in the study of distributed systems. To cope with the influence of faulty components, reaching a common agreement in the presence of faults before performing certain tasks is essential. However, the Byzantine Agreement (BA) problem is a fundamental problem in fault-tolerant distributed systems. In previous studies, protocols dealing with the BA problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.