The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the management intelligent level and the level of information sharing for higher law college instructors, and improve the efficiency of management of higher law college counselors work, and promote the sharing of college counselors and educational resources and scheduling information, Higher Law College Counselors work management system is developed and designed. The system adopts...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
Efficient network communications are essential to enable network-centric warfare. However, tactical edge networks present an extremely challenging and heterogeneous networking environment due to heterogeneous architectures, dynamic topologies, unwanted adversarial behavior, interference, and other wireless channel conditions. In order to support end-user applications and guarantee system performance...
Quality of service and quality of experience are of increasingly interest for successful communication network applications, particularly for decentralized networks, such as peer-to-peer (p2p) networks. They need sophisticated monitoring mechanisms to be able to adapt the system's parameters to maintain a certain level of quality of service. In the literature, several well-studied approaches, classified...
Online social network services (OSNSs) have become an integral part of our daily lives. At the same time, the aggressive market competition has led to the emergence of multiple competing siloed OSNSs that cannot interoperate. As a consequence, people face the burden of creating and managing multiple OSNS accounts and learning how to use them to stay connected. This paper is concerned with relieving...
Internet-of-Things (IoT) is no longer just a research hype, but rather a reality in which ICT plays a fundamental role. Programming the behavior of Smart Environments not only enables designers to create innovative interactive experiences for intelligent spaces, but also empowers their inhabitants to tailor the intelligent facilities according to their preferences. To that end, this paper presents...
In the Industrial Internet of Things (IIoT) there is a clear need for a high level of interoperability between independently developed systems, often from different vendors. Traditional methods of interoperability including protocol gateways and adapters are often used at the network layer. Recent work on application interoperability has emphasized the use of middleware or protocol proxy/gateway....
Software systems in domains like Smart Cities, the Internet of Things or autonomous cars are coined by a high degree of distribution across several independent computing devices and the requirement to be able to adjust themselves to varying situations in their operational environment. Self-adaptive software systems are a natural choice to implement such context-dependent software systems. A multitude...
In-memory key-value store is a crucial building block of large-scale web architecture. Given the growth of the data volume and the need for low-latency responses, cost-effective storage expansion and fast large-message processing are the major challenges. In this paper, we explore the design of key-value middleware that takes advantage of modern NVMe SSDs and RDMA interconnects to achieve high performance...
The great expansion of the Internet of Things in every aspect of daily life requires expertise and considerable skills in different fields and at different levels to create ad-hoc applications, and deliver suitable user experience. Developers have to deal with heterogeneous technologies, communication formats and protocols. They, in general, ask for new solutions that speed up the prototyping of applications,...
The advent of non-volatile memory (NVM) technologies has added an interesting nuance to the node level memory hierarchy. With modern 100 Gb/s networks, the NVM tier of storage can often be slower than the high performance network in the system; thus, a new challenge arises in the datacenter. Whereas prior efforts have studied the impacts of multiple sources targeting one node (i.e., incast) and have...
Thespis is a middleware that innovatively leverages the Actor model to implement causal consistency over an industry-standard database, whilst abstracting complexities for application developers behind a REST open-protocol interface. Our evaluation considers correctness, performance and scalability aspects. We also run empirical experiments using YCSB to show the efficacy of the approach for a variety...
In the Internet of Things paradigm, the total number of interconnected smart objects tends to increase in elevate rates in the next years, creating an overload of objects to be controlled and configured by the users themselves. Alternatively, context-aware discovery services have potential to minimize this problem by applying rules to determine which smart objects are more suitable for users, at a...
The Internet of Things (IoT) is the ever-growing network of physical devices with IP addresses for Internet connectivity. Due to its ubiquitous nature and distributed architecture which includes devices, applications and humans, it presents a complex structure for security. Also, the incorporation of thousands of heterogeneous IoT devices with different characteristics into a single network creates...
Massive multiplayer online games are large-scaled distributed systems to handle a huge amount of simultaneous players. Thus, development costs can be enormous. To deal with this, it is necessary to reduce redundant development steps in such distributed systems, e.g. by using code generators and model analysers to build components from already existing knowledge. Such knowledge could be the unique...
Self-adaptive systems are modern applications in which the running software system should be able to react on its own, by dynamically adapting its behavior, for sustaining a required set of qualities of service, and dynamic changes in the context or in user requirements. They are typically involved in Future Internet development such as the Internet of Things where interoperability, flexibility, and...
Adopting new technologies in smart grid (SG) enables the improvement of reliable communication. A key factor for SG efficiency is reliable data exchange between different components and domains in the system. SG must allow remote and quick reaction for different events. This is not a trivial task especially with large scale power grids, which requires SG to have a reliable communication protocol....
The one-way messaging pattern, in which a message sender does not expect any response, is fast and convenient for many applications, but whenever reliable communication is needed, developers either use heavy-weight middleware, such as JMS, or implement request-response interactions, based on TCP. However, TCP is poorly adapted to one-way messaging, because it offers a streaming channel with no mechanisms...
We revisit core Service-Oriented Architecture –SOA– concepts to integrate advanced continuous processing techniques. The resulting architecture allows overcoming the high heterogeneity and the very large data scale that arise in the Internet of Things. Further, we discuss how to leverage the CoAP protocol so as to enable the resource-efficient deployment of the proposed architecture over the large...
In the era of the Internet of Things (IoT), data from sensors can give insightful enterprise information through analytics. As a result, several enterprises are adopting sensors and other wireless technologies for their needs. However, some challenges exist within the IoT space. Most of the devices in use have varied device semantics and protocol variations which can limit interoperability. As a result,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.