1,357 research outputs found

    JXTA-Overlay: a P2P platform for distributed, collaborative, and ubiquitous computing

    Get PDF
    With the fast growth of the Internet infrastructure and the use of large-scale complex applications in industries, transport, logistics, government, health, and businesses, there is an increasing need to design and deploy multifeatured networking applications. Important features of such applications include the capability to be self-organized, be decentralized, integrate different types of resources (personal computers, laptops, and mobile and sensor devices), and provide global, transparent, and secure access to resources. Moreover, such applications should support not only traditional forms of reliable distributing computing and optimization of resources but also various forms of collaborative activities, such as business, online learning, and social networks in an intelligent and secure environment. In this paper, we present the Juxtapose (JXTA)-Overlay, which is a JXTA-based peer-to-peer (P2P) platform designed with the aim to leverage capabilities of Java, JXTA, and P2P technologies to support distributed and collaborative systems. The platform can be used not only for efficient and reliable distributed computing but also for collaborative activities and ubiquitous computing by integrating in the platform end devices. The design of a user interface as well as security issues are also tackled. We evaluate the proposed system by experimental study and show its usefulness for massive processing computations and e-learning applications.Peer ReviewedPostprint (author's final draft

    Mobile support in CSCW applications and groupware development frameworks

    No full text
    Computer Supported Cooperative Work (CSCW) is an established subset of the field of Human Computer Interaction that deals with the how people use computing technology to enhance group interaction and collaboration. Mobile CSCW has emerged as a result of the progression from personal desktop computing to the mobile device platforms that are ubiquitous today. CSCW aims to not only connect people and facilitate communication through using computers; it aims to provide conceptual models coupled with technology to manage, mediate, and assist collaborative processes. Mobile CSCW research looks to fulfil these aims through the adoption of mobile technology and consideration for the mobile user. Facilitating collaboration using mobile devices brings new challenges. Some of these challenges are inherent to the nature of the device hardware, while others focus on the understanding of how to engineer software to maximize effectiveness for the end-users. This paper reviews seminal and state-of-the-art cooperative software applications and development frameworks, and their support for mobile devices

    A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform

    Get PDF
    This is a copy of the author's final draft version of an article published in the journal Soft computing.The reliability of peers is very important for safe communication in peer-to-peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different services. However, for deciding the peer reliability there are needed many parameters, which make the problem NP-hard. In this paper, we present two fuzzy-based systems (called FBRS1 and FBRS2) to improve the reliability of JXTA-overlay P2P platform. In FBRS1, we considered three input parameters: number of interactions (NI), security (S), packet loss (PL) to decide the peer reliability (PR). In FBRS2, we considered four input parameters: NI, S, PL and local score to decide the PR. We compare the proposed systems by computer simulations. Comparing the complexity of FBRS1 and FBRS2, the FBRS2 is more complex than FBRS1. However, it also considers the local score, which makes it more reliable than FBRS1.Peer ReviewedPostprint (author's final draft

    Data-Centric Collaboration for Wired and Wireless Platforms

    Get PDF
    With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obtain a subset of the shared data and the data may be visualized differently for different users. The data amount and the visualization technique reflect the user’s interests and/or computing and communication capabilities. The users collaborate on and exchange data, and the data is dynamically transformed to adapt to the particular computing/network platform. The resulting design is simple yet very powerful and scalable. It is implemented and tested by developing several complex groupware applications

    Data-Centric Collaboration for Wired and Wireless Platforms

    Get PDF
    With the proliferation of mobile computing devices there is an increasing demand for applications supporting collaboration among users working in the field and in the office. A key component for collaboration in this domain is sharing and manipulation of information using very different devices and communications. We propose a novel, data-centric collaboration paradigm, where each user can obtain a subset of the shared data and the data may be visualized differently for different users. The data amount and the visualization technique reflect the user’s interests and/or computing and communication capabilities. The users collaborate on and exchange data, and the data is dynamically transformed to adapt to the particular computing/network platform. The resulting design is simple yet very powerful and scalable. It is implemented and tested by developing several complex groupware applications

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    A CONCEPTUAL FRAMEWORK FOR MOBILE GROUP SUPPORT SYSTEMS

    Get PDF
    The rapid development of wireless communication and mobile devices has created a great opportunity to support mobile group coordination at a more efficient level than before. This article presents a framework for Mobile Group Support Systems (MGSS) that considers four dimensions: supporting whom, supporting what, where to support and how to support. A good MGSS design should take consideration with the characteristics of each dimension: the system should be able to support mobile users working jointly with members from multiple parties; using available and advanced mobile technology, the system should be able to support context freedom, context dependent, and ad hoc coordination under dynamic, uncertain, frequent disrupting, time and space stretched and fluid context. To meet these requirements, we discuss the issues related to three basic functions of MGSS: mobile communication, group coordination, and context awareness

    Resource Aware Application for Mobile Device In An Ad Hoc Wireless Network Environment

    Get PDF
    Ad hoc wireless networks can be applied in a collaborative computing in which the requirements of a temporary communication infrastructure for quick communication with minimal configuration between a group of people in a conference or gathering. The main purpose of this research is to develop an application that allows mobile nodes in a collaborative environment to share files among nodes. For this project, the application will be implemented on nodes in an ad hoc wireless network that have a strong incentive to collaborate and share resources. This paper presents the results of our preliminary study which are based on the previous research. It is divided into five sections where in the first section is an introduction of ad-hoc wireless network, then in the next section is regarding motivation of doing research in this area. In section four and five, the paragraphs focused on the evaluation for Mobile Ad Hoc Networking and related works respectively

    Domino: exploring mobile collaborative software adaptation

    Get PDF
    Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach

    A novel Big Data analytics and intelligent technique to predict driver's intent

    Get PDF
    Modern age offers a great potential for automatically predicting the driver's intent through the increasing miniaturization of computing technologies, rapid advancements in communication technologies and continuous connectivity of heterogeneous smart objects. Inside the cabin and engine of modern cars, dedicated computer systems need to possess the ability to exploit the wealth of information generated by heterogeneous data sources with different contextual and conceptual representations. Processing and utilizing this diverse and voluminous data, involves many challenges concerning the design of the computational technique used to perform this task. In this paper, we investigate the various data sources available in the car and the surrounding environment, which can be utilized as inputs in order to predict driver's intent and behavior. As part of investigating these potential data sources, we conducted experiments on e-calendars for a large number of employees, and have reviewed a number of available geo referencing systems. Through the results of a statistical analysis and by computing location recognition accuracy results, we explored in detail the potential utilization of calendar location data to detect the driver's intentions. In order to exploit the numerous diverse data inputs available in modern vehicles, we investigate the suitability of different Computational Intelligence (CI) techniques, and propose a novel fuzzy computational modelling methodology. Finally, we outline the impact of applying advanced CI and Big Data analytics techniques in modern vehicles on the driver and society in general, and discuss ethical and legal issues arising from the deployment of intelligent self-learning cars
    • 

    corecore