The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the operational goals of a middleware platform is to provide a mechanism of distributing computation requests in a way that hides from the programmer the complexity of the underlying systems platform. This means that distribution mechanisms used to harness a set of computer and network resources should not expose to the programmer the detailed systems aspects which are unrelated to their application...
Increasingly, software needs to dynamically adapt its structure and behavior at runtime in response to changing conditions in the supporting computing, network infrastructure, and in the surrounding physical environments. By high complexity, assurance of high dependability of these software is a great challenge. Effective modeling of behavior and flexibly specifying requirements are the key issues...
This paper presents an approach for recognition of Activities of Daily Living (ADLs) in smart environments. Our approach is based on the frequent pattern mining principle to extract frequent patterns in the datasets collected from different sensors disseminated in a smart environment. In contrast with existing intrusive activity recognition approaches that have been proposed in the literature, where...
When there are a lot of injured people at a large-scale disaster site, medical staff first do triage. Triage is to decide the priority for treatment depending on the degree of severity or urgency of injured people. Paper triage tags are used now to show their condition and to record information on injuries. We do research that collect information of injured people by using electronic triage tags which...
Some people tend to forget things when they leave home for work or school. It is desired that there would be a reminder system to automatically remind people what they might have forgotten to bring along just when they step outside their home. In this paper, we present a reminder system that uses the RFID technology to detect the objects that a user brings along. The system then provide a reminder...
A writing genre can be thought of as the style in which the writer chooses to present textual content to the reader. We distinguish four main types of essay genres namely Narrative, Persuasive, Descriptive and Expository. An essay's writing genre can be identified by searching for salient features present within those genres using various Natural Language Processing tools such as Named Entity Recognition,...
The distributed system made the large-scale scientific computing possible in a cost effective way. And the hardware resources in such systems are also getting much cheaper than years before. However, the problem of executing the job using minimum resources is still reasonable and important, especially for the cloud environment, who has to save energy and control cost. Unfortunately, only a few existing...
In this paper we present a replication approach which utilizes the availability information of nodes in the network. By performing Box-Jenkins's ARIMA model on the availability information, a prediction model is devised which helps to predict the future availability of the node. Based on this information highly requested data is replicated to nodes which complement each others availability in the...
Data Grids provide services and infrastructure for distributed data-intensive applications accessing massive geographically distributed datasets. An important technique to speed access in Data Grids is replication, which provides nearby data access. Much of the work on the replica placement problem has focused on average system performance and ignored quality assurance issues. In a data grid environment,...
Several design alternatives have been advocated for content-based publish subscribe communication infrastructure over structured peer to peer networks. These efforts have contributed significantly towards efficient implementations of subscription specification, installation of publications and subscriptions and notification delivery. There are some design issues which need to be addressed. These issues...
Due to the growing use of XML data format in global information, an effective XML data management system is needed. An Enabled XML DB is one of the recent widely accepted approaches to store XML documents. This ability coupled with the increase use of XML data in different areas have triggered the need for a better method to structure a large data in order to improve query performance. Issues concerning...
The Bloom filter is a data structure which the characteristics of contents is expressed by a bit pattern. The Bloom filter has become attractive as one of the methods of looking up data in the distributed system. Since two or more keywords can be used in the method based on the Bloom filter, it is more flexible than the distributed hash table (DHT). Especially, the key aspect of the structured Bloom...
A group of n (>;1) peers are required to cooperate with each other in distributed applications. In this paper, we consider a distributed group of multiple peers in P2P overlay networks. A P2P group is distributed, i.e. no centralized controller and is scalable and heterogeneous since various types and huge number of computers are interconnected in types of networks. In group communication, messages...
Much work is underway within the broad next generation technologies community on issues associated with the development of services to foster collaboration via the integration of distributed and heterogeneous data systems and technologies. In previous works, we have discussed how these could help coin and prompt future direction of their usage (integration) in various real-world scenarios such as...
Multi-resource sharings among virtual machines (VM)are very important in data center, but also bring contentions for cache, disk and network in host server. Recent studies focus primarily on locally optimizing resource sharings in a single server, or global optimization of mitigating cache and memory contentions. But it remains an open question how to efficiently find optimal co-schedules for cache,...
Cloud computing allows the users to efficiently and dynamically provision computing resources to meet their IT needs. Most cloud providers offer two types of payment plans to the user, i.e., reservation and on-demand. The reservation plan is typically cheaper than the on-demand plan but reservation plan has to be provisioned in advance. Reserving the resources would be straightforward if the actual...
The recent deployment of multiprocessors (such as multicores) as the mainstream computing platform has given rise to a new concurrent programming impetus. In such a context it becomes extremely important to be able to design shared objects that can cope with the net effect of asynchrony and process crashes. This paper is a theory-oriented introduction to wait-free synchronization for such systems...
How to measure and maintain connectivity is an important issue in ad hoc networks. A special case of such network is Wireless Sensor Networks (WSN), which are often deployed in harsh environments and also susceptible to a number of problems that may negatively affect the connectivity among the nodes. An additional factor that increases the cost of connectivity maintenance in ad hoc networks is when...
In wireless sensor networks, many studies on data dissemination to individual mobile sinks traditionally rely on a strategy that consists of a virtual infrastructure to serve current location of the mobile sinks and a per-sink foot-print chaining mechanism to support local mobility after location update. To adapt the strategy for supporting mobile sink groups, it may be simply considered to exploit...
In wireless sensor applications such as disaster recovery and military actions, the behavior of mobile sinks is characterized by group features. A number of mobile sinks move together in a group manner, and mobile sinks in the group stay closely and randomly move within a geographically restricted region. Recently, many communication schemes have been suggested to reflect the properties of the mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.