The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to realize the cooperation of a group of nodes, messages have to be deleted to all the nodes. In addition to reliably and efficiently delivering messages, the electric energy consumed by nodes has to be reduced. In this paper, we discuss an energy-efficient broadcast protocol in wireless networks so that the total electric energy consumed by nodes can be reduced. In our previous studies,...
A distributed system is considered in an eventdriven model where a state of a process transits on occurrence of an event. In this paper, we discuss a peer-to-peer topic-based publish/subscribe (P2PPS) model where each peer process (peer) can both subscribe and publish event messages. The subscriptions and publications are specified in terms of topics. Each event message e carries a vector e:TV = (tv1,...
Data in an object may flow into another object if transactions read and write data in the objects. A transaction illegally reads data in an object if the object includes data in other objects which are not allowed to be read. In our previous studies, the flexible read-write-abortion with role sensitivity (FRWA-R), object sensitivity (FRWA-O), and role safety (FRWA-RS) protocols are proposed to prevent...
The recent advances in Grid and Cloud computing make new types of applications possible. At the same time, they require an infrastructure to implement heterogeneous computing resources time and cost-savely. Here, approaches that utilize design patterns, i.e., proven solutions to existing problems, seem to provide a good approach to enable these kind of applications. In this paper, we investigated...
Each peer has to obtain information on objects distributed in networks by itself through communicating with its acquaintance peers. An acquaintance might hold obsolete, even incorrect information on objects due to the propagation delay of changed information on the object and faults of peers. It is critical to discuss how a peer can trust acquaintances. We discuss subjective and objective types of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.