The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing services have varying performance characteristics that the cloud provider often hides from the user. Thus, it is difficult for a user to make operational decisions about when and where to run their jobs. In this paper, we present a series of experiments on a cloud computing platform to understand these characteristics and then present a series of strategies to optimize utilization...
Privacy, security, and trust concerns are continuously hindering the growth of cloud computing despite its attractive features. To mitigate these concerns, an emerging approach targets the use of multi-cloud architectures to achieve portability and reduce cost. Multi-cloud architectures however suffer several challenges including inadequate cross-provider APIs, insufficient support from cloud service...
In this paper, we present an approach to support transaction-based spatial-temporal programming of mobile robot swarms on a systemic level. We introduce a programming model for swarms of mobile robots. Swarm applications consist of concurrent, distributed and context-aware actions. We provide distributed transactions in order to guarantee atomic execution of a set of dependent actions. We distinguish...
The popularity of Wireless Sensor Networks (WSN) is increasing in critical infrastructure, smart metering, and home automation. Of the numerous protocols available, Z-Wave has significant potential for growth in WSNs. As a proprietary protocol, there are few research publications concerning Z-Wave, and thus little is known about the security implications of its use. Z-Wave networks use a gateway controller...
To meet strict dependability requirements in hostile and highly-varying environments, IoT communication protocols need to be carefully tuned in relation to the expected environmental changes. However, this is difficult to attain, as every application has unique properties and requirements. Tuning communication protocols correctly requires indeed significant expertise as well as a clear understanding...
Sensor network macroprogramming methodologies such as the Abstract Task Graph hold the promise of enabling high-level sensor network application development. However, progress in this area is hampered by the scarcity of tools, and also because of insufficient focus on developing tool support for programming applications aware of performance requirements.
Sensor devices and the emergent networks that they enable are capable of transmitting information between data sources and a permanent data sink. Since these devices have low-power and intermittent connectivity, latency of delivery for certain classes of data may be tolerated in an effort to save energy. Several previously developed algorithms employ models which considers the popularity of individual...
The performance demands of modern computing applications have enormously accelerated the power density of on-chip devices. Consequently, not only the operational budget has increased exponentially, but also the temperature has experienced an alarming increase rate. The high chip temperatures pose serious threat to devices reliability. The aforementioned challenges necessitate the requirement of realizing...
Optimizing the total power consumption within a data center is an NP-hard problem. Project nano data center was started with the promise of reducing power and cooling cost. This paper is focused on reducing the total power consumption within a nano data center by introducing power-aware server selection. We studied effects of several attributes such as power consumption of servers, size of request,...
Wireless sensor networks (WSNs) are utilized in various applications and are providing the backbone for the new pervasive Internet, or Internet of Things (IoT). Researchers are working on merging other emerging technologies and services such as cloud computing and Big data with IoT to design and build smart cities. Energy consumption is one the important constraint in the design of WSN based system...
Minimizing the energy consumption and hence extending the network lifetime is a key requirement when designing an efficient sensor network protocol. QoS-aware routing in Wireless Sensor Network (WSN), aims to take into account other networks performance aspects as minimizing end-to-end delay (as well as jitter), reducing packet loss rate and minimizing the energy consumption of the network during...
For commercial Wireless Sensor Network (WSNs) deployments it is necessary to estimate the network lifetime. It must be possible before network deployment to determine how long a network maintains operational before maintenance is required and batteries have to be replaced. Unfortunately, node lifetime is very dependent on the radio environment in which the node is operated. As we will demonstrate...
The Internet-of-Things (IoT) envisions a world where billions of everyday objects and mobile devices communicate using a large number of interconnected wired and wireless networks. Maximizing the utilization of this paradigm requires fine-grained QoS support for differentiated application requirements, context-aware semantic information retrieval, and quick and easy deployment of resources, among...
Increasing demand on wireless communications also increases the issues related to communication security. Among different security solutions, physical layer security have recently been gaining many interests by the researchers. In this paper, a survey study is provided in one of the most critical attacks, namely spoofing attacks. When a legitimate transmitter stops sending a signal to a legitimate...
Distance is a key measure when implementing timer-based dissemination protocols in Vehicular Ad-hoc Networks (VANets). In which the transmission is deferred proportional to distance, aiming to order vehicles transmission, such that the farthest vehicle gets the highest opportunity to relay the message. This will ensure long hops along the road to speed up the dissemination and cover more nodes. However,...
Emerging Software Defined Networking (SDN) technology has provided excellent flexibility to large-scale networks in terms of control, management, security, and maintenance. With SDN, network architectures can be deployed and maintained with ease. New trends in computing (e.g., cloud computing, data centers, and virtualization) can seamlessly be integrated with the SDN architecture. On the other hand,...
Smart vehicles have been capturing increasing attention as major providers of ubiquitous information services. In this paper, we propose a solution to enable expedited and cost-effective access of road information for vehicles as information requesters. The proposed caching-assisted data delivery with mobile requesters (CADD-MR) scheme employs caching on the data delivery path for handling later interests...
Agents in Mobile Ad hoc Networks (MANET) typically have no knowledge of the environment that they are to be deployed in nor where they will be located. All information a mobile agent has access to is provided locally by other mobile agents within its communication range. Due to the nature of random deployment, agents may be clustered together which creates coverage holes in the network. Most of the...
One of the most popular and efficient methods for conserving energy in Wireless Sensor Networks (WSNs) is data aggregation. This technique usually introduces an additional delay in the transmission of data packets. The inherent trade-off between energy consumption and end-to-end delay imposes an important decision to be made by the nodes, mainly to determine the most appropriate time for aggregating...
Proactive handover, in which mobile nodes attempt to determine the best time and place to handover to local networks, has been studied in the context of new architectures such as the Y-Comm Framework. Y-Comm research has yielded techniques to calculate the Time Before Vertical Handover and the Network Dwell Time, for any given network topology. However, by knowing Time Before Vertical Handover and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.