The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last few years, the research community has witnessed the rapid development of the Information-Centric Networking (ICN) approach aiming at evolving the Internet from today's host based packet delivery towards directly retrieving information in a secure, reliable, scalable, and efficient way. The Internet of Things (IoT) concept envisions scenarios in which “smart objects” can be interconnected...
Heterogeneous wireless sensor network (HWSN) consists of sensor nodes with different ability, such as computing power and sensing range. Compared with homogeneous wireless sensor network, the design of protocols for such networks has to be more complex due to the energy constraint in order to prolong the lifetime of the network. As energy consumption mostly comes from the radio transmissions, bandwidth...
XML has become a standard widely used in wireless networking technologies to improve flexibility and interoperability between heterogeneous applications. However, applying this technology to areas such as network management across a wireless embedded internet can pose significant challenges due to the verbosity of XML. A number of compression techniques and tools have been applied to this problem...
Distributed systems have rapidly changed the face of Internet Technology. Web syndication is a competitive collaborative content delivery system over the cloud, which refers to making web feeds/ material available from a site to other people with a summary of the website's content including the recent updates. The relevance of web syndication has been remarkable in the fields of e-Governance, e-Commerce...
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Wireless sensor networks (WSNs) have received lots of attention in recent years. WSNs have been applied to multiple fields such as video surveillance, home automation, and health care. How to efficiently manage WSN devices thus becomes an important issue. Simple Network Management Protocol (SNMP) is an IP-based network management protocol which can collect and modify management information from network...
With the rapidly gaining ground of the Internet of things, wireless sensor networks (WSNs) will be bound to permeate more and more applications. However, due to the nature of these applications such as harsh environment, resource-limited wireless sensor networks are usually fault prone. Therefore, it is essential to provide effective fault management techniques and robust fault management frameworks...
With the rapid expanse of the web service over the internet, discovering related web service is becoming the most urgent problem. Traditional methods focus on the interfaces of service through using ontology without considering service behavior. In this paper, the Calculus of Communicating Systems(CCS) is exploited to specify web service's behavior, weak equivalence on behavior is used for matchmaking...
Cyber-physical system (CPS) integrates physics with Internet to provide a timely, confidential and efficient interaction of physical appliances with people. However, as a CPS Application, Smart Home still has difficulties in building a centralized interaction for remote monitoring. The paper presents the interaction model of Smart Community Cyber-Physical System (SCCPS) with the name Net-in-Net. The...
In recent years, under the advancement of mobile communication technology and popularization of information technology, diversified value added services have emerged. Location-based services (LBS) is an application of information and Internet integrated technology that has been developed rapidly in recent years. This study utilized a room-based indoor location mode to construct a wireless sensor network...
A wireless sensor network (WSN) is composed of a large number of nodes deployed in a wide area. In the sensor network, there are some special nodes referred as sinks which play the role of data collector. Sinks are connected to internet so that they can forward data to the data collecting server. Thus each sensor can forward the information they sensed to any one of these sinks. In this paper, we...
With the rapid expanse of the Web service over the internet, discovering web service is becoming the most urgent problem. To tackle this problem, The Calculus of Communicating Systems (CCS) as a formal tool is exploited to specify and model web services, especially service behavior. Reverse engineering is proposed to develop the formal model of query service according to user's behavior, behavioral...
Telemonitoring and remote healthcare are two ICT techniques promise to deliver cost effective long-term healthcare services to the aging population worldwide. Anticipating an emerging market opportunity, NCTU Kannon project team is creating Custos, an open composeable platform for developing remote on-demand healthcare applications using smart phones and wireless sensor networks. Custos is integrated...
Wireless sensor networks consist of sensor nodes and sink nodes. Due to the variety of applications, the interconnection between wireless sensor networks and Internet is needed. In order to have the access to the Internet, a sensor node must select a sink node as the gateway to the Internet. The selection of sink has great influence on the delivery latency and network efficiency. In this paper, we...
Video based monitoring system plays an important role in asset management. However, transmission of video data occupies large amount of bandwidth, especially in wireless communication environment. On the same time, searches and storage of video data is a troublesome problem in after-event investigation. This paper studies a non-video monitoring system which is based on RFID and sensors. The system...
The increasing ubiquity of mobile embedded systems has been matched by the evolution of a variety of wireless network standards and technologies. The major constraints of wireless embedded systems are limitations of communication bandwidth, processing capabilities, and battery power. Remote wireless embedded systems often act as sensors, which provide data to a certain community. The exchange of data...
Information privacy is usually concerned with the confidentiality of personally identifiable information (PII), such as electronic medical records. Nowadays, Web services are used to support different applications which may contain PII, such as healthcare applications. Thus, the information access control mechanism for Web services must be embedded into privacy-enhancing technologies. Further as application...
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.