The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computation offloading has received much attention to improve the performance or energy efficiency of mobile systems that have usually limited and constrained resource capacities. Yet, applying the computation offloading technique in opportunistic networks that are highly dynamic and often become volatile still remains a challenge due to the following reasons: (1) technical difficulties in constructing...
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless devices co-existing in the same radio spectrum. They demand harmonized, frequently even coordinated...
Peer-to-Peer (P2P) overlays and Mobile Ad hoc Networks (MANETs) exhibit some common characteristics, such as dynamism, self-organization and decentralized control. The synergy between the two has been utilized by researchers to design distributed applications over MANETs. However, the available simulation platforms are far from perfect to evaluate the proposed designs. In most of the simulation platforms,...
In order to respond to drastically increased traffic demands in mobile networks such as cellulars, opportunistic communication has been introduced as a data offloading strategy. Delivering the contents using peer-to-peer data dissemination is more preferable compared to epidemic diffusion schemes. To implement peer-to-peer dissemination, one needs to define the peer selection and content dissemination...
One important feature of Content-centric Networking (CCN) is to utilize built-in network caches to improve the transmission efficiency of content dissemination. In CCN, all nodes have the function of caching contents. Consequently, caches are ubiquitous and diverse. How to make full use of these caches to reduce the network load and the transmission delay has become a hot research topic in recent...
In this paper we study mobile ad hoc wireless networks by using the notion of evolving connectivity graphs. In such systems, the connectivity changes over time due to the intermittent contacts of mobile terminals. In particular, we are interested in studying the expected flooding time when full connectivity cannot be ensured at each point in time. Even in this case, due to finite contact times durations,...
In this paper, we propose a trustworthy data management framework for wireless networks in Cyber-Physical System (CPS), in which the trust values of both CPS data and the reporting devices are assessed. In addition, a set of policy rules are declared to accurately describe how we determine the trustworthiness of each reporting device based on the contextual factors. Experimental results on both simulation...
The rapid spread of wireless mobile devices and the advances of wireless communication have fueled the interest about streaming 3D graphics on mobile devices to be used in augmented reality based classes of applications. In these types of applications, a real world is mapped into the virtual world and thin mobile devices are employed to navigate in the virtual simulated environment (VE). In evidence,...
Coding has traditionally been used at the physical layer in communication networks to prevent and correct errors and erasures incurred in transmission of data. In the past decade, other benefits of coding have been demonstrated, in particular in environments with unpredictable dynamics and limited resources. In this paper, we are concerned with using coding to reduce delay in communications environments...
In this paper, we investigate the mobile P2P file-sharing problem, and proposed a mobile P2P content distribution architecture. Due to mobile specific influence factors, a hybrid architecture has been employed. We assume that the P2P mobile terminal can publish, index and retrieve resources on the Index Server, and collect the real-time state and cache content resource through Resource Management...
Privacy and anonymity have become an increasing requirement in today's wireless networks. However, current mobile peer-to-peer architectures have not taken into account anonymity, especially the mutual anonymity between two nodes. In this paper, we propose a Secure-Information-Dispersal-Algorithm-based Mutual anonymity protocol (SIDAM), for mobile P2P networks. SIDAM achieves mutual anonymity in mobile...
Conceivably, the ubiquity and ease-of-access of future wireless networks will encourage users to share the content they own and look for contents that match their interests. Peer-to-peer systems can be used in conjunction with cellular networks to download (e.g., from the Internet) the data items of interest. However, relying exclusively upon them, novel applications such as mobile multimedia are...
Mobile application developers and content providers usually need to develop mobile applications with concerns for mobility for specific wireless networks and device platforms which are used by network carriers. In order to provide standard mobile applications with interoperability and mobility support, in this paper we propose a comprehensive mobile application framework to support interoperability...
File sharing is an essential daily task. This includes for instance the sharing of pictures, music, and learning material. Common file sharing applications, however, are not suitable for mobile networks as the induced network load is too high. In this paper a prototypically implemented topic-based file sharing application for hybrid wireless networks is presented and evaluated. For the evaluation...
Coming with the development of the wireless equipment, more applications can be transplanted onto a mobile platform. So the transmission of multimedia in the wireless network enters our sight. In order to improve the efficiency of system, we propose the p2p structure. For peers in the wireless network are less stable than normal, we use the mobile node ID instead of the static node ID in Kademlia...
Peer to peer (P2P) utilizes the resources of an offered service without the need for a central server or preexistent server-client, making it a desirable network environment for data exchange based on direct connection between peers. Proposed by Sun Microsystems, JXTA is a typical P2P system and distributed computing model that does not require central service resources and is flexible to deal with...
The emergence of new mobile and wireless networks offers opportunities to expand traditional Internet applications. At the same time peer-to-peer systems become widely deployed and allow users to obtain and provide resources in a stable, scalable and reliable manner. In this paper we consider the deployment of P2P auctions over ad hoc networks. We propose a communication architecture and a protocol...
The upcoming 3G environment is surely of heterogeneous mobile devices and heterogeneous wireless networks. Many applications such as multimedia streaming, online games and peer-to-peer file sharing will be widely used in such an environment in which users can have their own individual choices of devices and services. In particular, users can carry heterogeneous mobile devices with different cache...
Information storage and storage sharing are key components of modern networked computer systems. Mobile devices such as PDAs and cell phones normally have very limited storage capacities compared with PCs or laptops, while storing a large number of media objects (such as e-books, pictures and videos, etc.) on mobile devices could take a lot of space. In this paper, we study collaborative storage with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.