The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Involving end-users in the creation of an overlay wireless access network, which provides nomadic connectivity by exploiting under-utilized residential connections, is an attractive perspective, which has motivated the emergence of WiFi communities worldwide. The practical exploitation of user-provided local loops, however, raises organizational, administrative, technical, and regulatory issues the...
Internet routing system is the fundamental components of Internet. As the Internet growth, Internet routing system is facing the scaling issues of global routing table expanding due to the wide use of multi-homing, traffic engineering, and mobility. Existing proposed solutions need to change host protocol stack or routing architecture, hence, no incentive for practical deployment. In this paper, we...
Medium Access Control (MAC) protocols must perform the functionality required by the application while utilizing the limited resources available on sensor nodes. Limited energy resources place strict limits on the operations that a sensor node may accomplish and differentiate sensor networks from other networks. Application and protocol designers must utilize the hardware resources of the sensor nodes...
In the pervasive computing paradigm, there is a strong demand towards user-centric services based on the context and service management. For implementing the user-centric services recent researches on the service-oriented system is focused on the context recognition, analysis and reasoning. Furthermore, the service-oriented systems also need to manage the structural and hierarchical context model...
Current ad hoc networks rely on a silent mutual agreement among nodes to relay packets to the destinations. The efforts made by each single node to serve the others are usually repaid with the chance to successfully set up its own traffic sessions. However, limited power, together with security concerns, can push certain nodes to refuse to cooperate. Such nodes will thus act as parasites, while the...
Nowadays, users of mobile phones generate too many files that have to be frequently downloaded to an external storage repository (freeing local space), using a USB cable or a short-range wireless connection such as Bluetooth. This situation is very common in developing countries where there are not many available wireless networks, restricting the user mobility. This paper presents an Internet File...
Content-based image retrieval (CBIR) is a difficult area of research in multimedia systems. The research has proved extremely difficult because of the inherent problems in proper automated analysis and feature extraction of the image to facilitate proper classification of various objects. An image may contain more than one objects and to segment the image in line with object features to extract meaningful...
Ubiquitous home refers not only to home but also to logical space, including a wide range of out-home personal devices such as mobile phones, PDAs, laptops, car navigators, and office PCs. There are certain connection barriers among the devices, such as the dynamic IP address, NAT. In a home network, various devices coexist in heterogeneous networks, such as IP, IEEE1394, PLC, Bluetooth, ZigBee, UWB,...
In this paper, we have presented an opportunistic multi-server scheduling scheme that distributes traffic on multiple wireless interfaces of a mobile router to improve service guarantees for competing flows during mobility. The proposed adaptive, scalable, multi-server (ASM) scheduling scheme extends guaranteed-rate(GR) service model to ensure bounded service delays for each packet of flows in accordance...
The paper presents a platform, which offers to the possibilities to connect remotely via Internet to an industrial process in order to monitor, diagnose and control it remotely. In this way, several expensive resources like experts and powerful computers that simulate the complex processes from the customer site can be shared at distance through Internet in order to optimize the costs and to increase...
The process of record-keeping and maintenance of digital photographs is an emerging concern. In this paper, we present a tag organization framework for photographs by clustering similar content based photographs. Using a social network graph model, we relate objects and the corresponding relationships amongst them. Each photograph is represented in our framework with five attributes of objects, place,...
Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining unbounded computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting of extra physical...
The wireless networked sensors embedded with everyday objects will become an integral part of Future Internet, where the interaction among people, computer and those objects will shift the current Internet to a new paradigm, namely the Internet of Things. The terabyte torrent of data generated by billions of sensors belonging to a large number of distributed heterogeneous sensor networks in Future...
In this paper, we study the performance of active queue management algorithms for packet queueing in Internet routers in the presence of new versions of the TCP congestion control mechanism. In particular, we compare the performance of tail drop, adaptive RED, AVQ, PI, REM and AN-AQM queueing in four TCP cases: (i) the classic New Reno protocol, (ii) the Sack protocol, (iii) the Fack protocol, (iv)...
With the fast growth of Internet, IPv4 address exhaustion is an imminent problem. IPv6 is proposed to resolve this issue. It is identified that the deployment of IPv6 will be progressive. This leads to the coexistence of IPv4 and IPv6 networks during the transition time. It is important to study how to enable communication between IPv4 only hosts and IPv6 only hosts. In this paper, we propose a new...
Immersive Massive Multiuser Virtual Environments currently attract a lot of attention. Going beyond the hype, one discovers interesting concepts and opportunities for a supposed future Web which is commonly called the 3D Web. The global provision of such a vision is much more than another evolutionary step in content visualization, rather severe technical challenges need to be addressed by the future...
The following topics are dealt with: content-based image retrieval; mobile IP; ad hoc wireless networks; Internet routing scalability; wireless neutral access networks; service-oriented multi agent middleware; information fusion; MAC protocol; wireless sensor networks; QoS paradigm; file transfer service; mobile phones; avatars; virtual environments; VoIP; AQM routers; cloud SSO authentication; and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.