The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet, far from being a simple technology, is truly changing our way of life. Just as the invention of the alphabet, or the printing, Internet is a fundamental technology that we have designed, but which, in turn, is impacting our behavior, our relationship with the world and ourselves. By empowering ordinary citizens, it helps us to face a cognitive paradigm shift. This is deeply rooted in the...
Within an effort for providing a layered architecture of services supporting multi-peer collaborative applications, this paper proposes a new type of consistency management aimed for applications where a large number of processes share a large set of replicated objects. Many such applications, like peer-to-peer collaborative environments for training or entertaining purposes, platforms for distributed...
We provide an approach to distribute the calculation of PageRank, by splitting the graph into its strongly connected components. As we prove, the global ranking may be calculated componentwise, as long as the rankings of pages directly linking to the current component are already known. Depending on the structure of the WWW, this approach approach may be used to calculate the ranking on several components...
Load balancing emerges as an important problem that affects the performance of structured peer-to-peer systems. This paper presents a peer-to-peer system relying on the partitionning of a de Bruijn graph. The proposed system integrates mechanisms that perform index and storage load balancing. Index load refers to the network traffic incurred by a peer in managing an object index, while storage load...
Advances in Information Technology have led to development of various Automatic Vehicle Location (AVL) systems. The automotive industry quickly adopted this system as it provides location services for vehicles through wireless technologies. But these systems are not explicitly optimized to take advantage of grid computing. Grid computing offers the infrastructure for developing coordinated, scalable...
The current contribution gives an overview on the different complex and concatenated aspects and problems of traffic control in large urban environments with a high population and traffic density. It intends to show that without innovative, Internet based technologies no suitable simulation, analysis and control of the urban traffic situation in a big city can be realized, especially under the conditions...
P2P systems draw large communities of users and create most of the Internet traffic. Two typical P2P myths are (1) that P2P is about sharing of audio and video content and (2) that P2P networks are only about sharing files between anonymous users. We present the results of an empirical study in the P2P network Direct Connect. We find that P2P networks are places to share all kind of data. We also...
GRID computing is a more and more attractive approach. Its aim is to gather and to share the resources of a network like the content, the storage or CPU cycles. A computational distributed system like SETI@home produces a power up to 70 TFlops whereas the current best parallel supercomputer BlueGene produces a power of 140 TFlops. Such a supercomputer costs very much contrary to a system like SETI@home...
The flooding-based search is a major problem in unstructured peer-to-peer file sharing systems like Gnutella or KaZaa since it results in a significant portion of Internet traffic. This article intended to demonstrate that flooding can be avoided by using a content-oriented self-organization mechanism. In contrast to connections that are usually made randomly between peers in unstructured systems,...
A storage scheme is a distributed system that coordinates a set of network-attached components. Using this type of solution it is possible to achieve balance in time and space over the involved components. Although this approach was developed to support efficient global states recording, many storage applications, like web hosting or distributed databases, might profit from it to provide highly available...
Event logging and log files are playing an important role in system and network security. Log files record computer system activities, are used to provide requirements of reliability, security and accountability applications. Information stored in log files can be obtained from different devices, not necessarily clock synchronized, and they do not arrive in the same order they are generated. Nevertheless,...
The cost of developing and deploying web applications is reduced by dynamically integrating other heterogeneous self-contained web services. However, the malfunctioning of such systems would cause severe losses. This paper presents a technique for building reliable web applications composed of web services. All relevant web services are linked to the component under test at the testing time; thus,...
The long latency related with Mobile IPv6’s home-address and care-of-address tests can considerably impact delay-sensitive applications. Applying the ingress-filtering in a proper way over the networks can prevent the source IP address spoofing which is used by the malicious nodes to launch some sort of attacks. We have suggested a new communication mode which is called Very Early Binding Update Mode...
In this paper we describe an assume/guarantee based execution constraints synthesis algorithm for concurrent threads executing on parallel platforms. Threads are loops which can have several control points, such as the activation of loop iterations and the interaction with other threads. Real-time applications such as multimedia applications are usually specified using this kind of concurrent interacting...
The wireless resources such as bandwidth in case of wireless networks (WNs) are very restricted compared with wired networks. Thus, providing integrated service for WNs could lead to high traffic and instable performance because of the high link error. However, some application signaling protocols transport information about their resource requirements; this information is similar to that transported...
This chapter presents architecture to design emotional agents evolving in an artificial 3D environment. The agent behavior and environment emulator are independent of implementation. To achieve this, a Language of Interface for Animations in 3D called LIA-3D, is presented. The agent and environment simulator uses LIA to establish communication with each other.
We present a new algorithm that solves the problem of distributively determining the maximum flow in an asynchronous network. This distributed algorithm is based on the preflow-push technique. Sequential processes, executing the same code over local data, exchange messages with neighbors to establish the max flow. This algorithm is derived to the case of multiple sources and/or sinks without modifications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.