Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In IoT scenarios, there are smart devices hosting web services and also very simple devices with external web services. Without unifying the access to different kinds of devices, the construction of IoT service systems would be cumbersome. In our work, integrating distributed events into SOA is the basic principle. The data accessing capability of physical entities is separated from their actuation...
The tremendous bandwidth demand for content-rich services on service providers initiates new access networks deployment and leads the networks increasingly complex and functional. In general, the commercial access networks are composed of a large number heterogeneous, multi-domain, multi-technology and multi-vendor network devices. In such a network environment, the network migration is a challenging...
This study proposes a Software-Defined Networking (SDN) architecture to help cloud customers receive highly efficient services in a heterogeneous cloud serving system. An application called SDNBroker is designed herein and superposed on the SDN controller by Northbound Application Programmatic Interfaces (Northbound API). When a cloud customer requests a service, the proposed SDNBroker schedules heterogeneous...
Nowadays networking is secure because we encrypt the confidential messages with the underlying assumption that adversaries in the network are computationally bounded. For traditional routing or network coding, routers know the contents of the packets they receive. Networking is not secure any more if there are eavesdroppers with infinite computational power at routers. Our concern is whether we can...
Coarse-grained reconfigurable arrays (CGRA) exhibit high performance, improved flexibility, low cost, and power efficiency for various application domains. Compute-intensive loop kernels are mapped to CGRA through modified modulo scheduling algorithms that integrate placement and routing. Most existing approaches are heavily influenced by VLIW compilation and FPGA synthesis techniques. A salient feature...
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
In many applications, the query mechanism would co-exist with the data collection at the same time. If these two mechanisms can be combined, the query could utilize some information from the data collection and get benefits on the robustness and stability. We propose a query mechanism which can find the path without any additional beacons or packets and get information from the process of data collection...
Routing protocols for wireless sensor networks can be divided into proactive, reactive and hybrid routing. Each routing protocol has its advantages and disadvantages. A service is force-terminated when the working routing protocol can no longer support all sensor network operations. This work describes an adaptive routing protocol based on the redundancy node and the dual routing protocol. By using...
The term Organic Computing is that the system you used having the Self-X properties and autonomously. Self-organization and self-configuration will be automatically performing some mechanisms after system constructed. Self-healing when the mal-function operates or damaged the system. Self-optimization when system found a way that could be better than it is now. And context-aware is that when the working...
The performance of data query processing in wireless sensor networks is greatly affected by routing protocol. Currently available data query systems usually use one routing protocol to deal with all kinds of queries. This work demonstrates that properly selecting routing protocol according to different kinds of queries can improve the performance of query processing. We propose a dynamic routing layer...
This study presents a novel embedded WiMAX-based vehicular router with a network mobility architecture that promotes the telematics services for ubiquitous/pervasive computing (UPC) environment anytime and anywhere. Each telematics user has to process the handoff procedure with the mobile IP mechanism. Therefore, the proposed WiMAX-based vehicular router can process more Telematics users for handoff...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.