The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
In-memory key-value store is a crucial building block of large-scale web architecture. Given the growth of the data volume and the need for low-latency responses, cost-effective storage expansion and fast large-message processing are the major challenges. In this paper, we explore the design of key-value middleware that takes advantage of modern NVMe SSDs and RDMA interconnects to achieve high performance...
Thespis is a middleware that innovatively leverages the Actor model to implement causal consistency over an industry-standard database, whilst abstracting complexities for application developers behind a REST open-protocol interface. Our evaluation considers correctness, performance and scalability aspects. We also run empirical experiments using YCSB to show the efficacy of the approach for a variety...
Massive multiplayer online games are large-scaled distributed systems to handle a huge amount of simultaneous players. Thus, development costs can be enormous. To deal with this, it is necessary to reduce redundant development steps in such distributed systems, e.g. by using code generators and model analysers to build components from already existing knowledge. Such knowledge could be the unique...
The one-way messaging pattern, in which a message sender does not expect any response, is fast and convenient for many applications, but whenever reliable communication is needed, developers either use heavy-weight middleware, such as JMS, or implement request-response interactions, based on TCP. However, TCP is poorly adapted to one-way messaging, because it offers a streaming channel with no mechanisms...
Internet of Things (IoT) applications consist of diverse Things (sensors and devices) in terms of hardware resources. Furthermore, such applications are characterized by the Things' mobility and multiple interaction types, such as synchronous, asynchronous, and streaming. Middleware IoT protocols consider the above limitations and support the development of effective applications by providing several...
The Transport Layer Security (TLS) protocol is designed to allow two parties, a client and a server, to communicate securely over an insecure network. However, when TLS connections are proxied through an intermediate middlebox, like a Content Delivery Network (CDN), the standard endto- end security guarantees of the protocol no longer apply. In this paper, we investigate the security guarantees provided...
Communication systems in today's world are no longer traditional in nature. Platforms required for Industry 4.0 that fall under Control and Monitoring systems, are datagathering units which gather data from remote devices and monitor them. Such platforms have various components which communicate with each other for data handling and monitoring. In the traditional peer-to-peer model, every module communicates...
Many approaches have been proposed to build a unified IoT platform where physical and digital objects are accessible by applications crossing different organization and domains, and are based on IP-overlay architecture. These solutions inherit the constraints of the current internet, especially in terms of naming, heterogeneity, mobility and security. In this paper, we propose a new Information-Centric...
In distributed systems and service oriented architecture, message middleware is a key component to have services and applications interact with each other, independently of their location and connectivity requirements. However, most of traditional message systems are designed for high throughput of message delivery and can not satisfy the strict low latency demand of message transmission in several...
Partitioned Global Address Space (PGAS) programming models like Open SHMEM and hybrid models like Open SHMEM+MPI can deliver high performance and improved programmability. However, current implementations of Open SHMEM assume a fully-connected process model which affects their performance and scalability. We address this critical issue by designing on-demand connection management support for Open...
Desktop Grid is among the success stories during last years by using volunteers nodes participating into projects. Now, with the emergence of Cloud Computing, the questions become where to take resources? and how to coordinate the resources? Our assumption is that Desktop Grid will continue to survive if we are able to transform the old-fashioned client/server architecture to new web oriented architecture...
Supervisory control and data acquisition (SCADA) systems are usually distributed applications designed and developed by using a middleware technology. In this paper, it is proposed a solution for interoperability of SCADA systems that are based on different middleware technologies. The proposed solution allows the interconnection of SCADA system based on the following middleware technologies: OPC...
Thanks to the advances of wireless communications, embedded systems, and IP-networks, developments in Machine-to-Machine communications grow rapidly. In the part of network layer of M2M, various vertical M2M solutions of local wireless networking have been developed, these include Bluetooth, ZigBee, and WiFi direct. Every kind of wireless local network has their own techniques in device discovery,...
According to the specific business requirements of the meteorological wireless sensor network (MWSN), we analyze and summarize the principles and problems of the existing Web real-time communication technology, and put forward the realtime meteorological information publishing platform (RT-MIPP) solution based on WebSocket. We first analyze and classify the observational data of MWSN, and design the...
While originating as an instant messaging infrastructure, the eXtensible Messaging and Presence Protocol (XMPP) has its applications as a lightweight middleware for real-time event distribution, e.g. for mobile computing or the Internet of Things. Services based on XMPP are traditionally realized as server components with simple local registration for discovery, which is not appropriate for distributed...
The ever-growing gap between the computation and I/O is one of the fundamental challenges for future computing systems. This computation-I/O gap is even larger for modern large scale high-performance systems due to their state-of-the-art yet decades long architecture: the compute and storage resources form two cliques that are interconnected with shared networking infrastructure. This paper presents...
Wireless sensor networks (WSNs) typically consist of sensor nodes and gateways that operate on devices with limited resources. As a result, WSNs require bandwidth-efficient and energy-efficient application protocols for data transmission. Message Queue Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP) are two such protocols proposed for resource-constrained devices. In this paper,...
Digital Living Network Alliance (DLNA) has developed guidelines for interoperability among home devices for media content sharing. However, the sharing of the content is limited inside local area networks. On the Internet, users can share the media resources through the Social Network Service (SNS) websites. In order that users in DLNA networks can easily access resources shared by friends in SNS...
Distributed virtual reality systems (DVR systems) have evolved significantly over the past twenty years and found wide spread in many applications for training, educational and entertainment purposes. Modern DVR systems require sophisticated data exchange mechanisms to provide consistent interaction of a large number of users over the Internet. While many of these mechanisms have been well studied,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.