132,287 research outputs found

    Addressing mobility issues in mobile environment

    Get PDF
    Realitzat en col·laboració amb el centre o empresa: Lappeenranta University of Technolog

    Addressing the Challenges in Federating Edge Resources

    Full text link
    This book chapter considers how Edge deployments can be brought to bear in a global context by federating them across multiple geographic regions to create a global Edge-based fabric that decentralizes data center computation. This is currently impractical, not only because of technical challenges, but is also shrouded by social, legal and geopolitical issues. In this chapter, we discuss two key challenges - networking and management in federating Edge deployments. Additionally, we consider resource and modeling challenges that will need to be addressed for a federated Edge.Comment: Book Chapter accepted to the Fog and Edge Computing: Principles and Paradigms; Editors Buyya, Sriram

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    A Revolving Door: Challenges and Solutions to Educating Mobile Students

    Get PDF
    The problem of students changing schools in the middle of the school year is not new. The consequences of these changes, however, are increasingly dire. Student mobility, defined as students' movement into and out of schools and school districts during a school year, is particularly prevalent among low-income, immigrant and minority children, whose families are often susceptible to changes in housing that precipitate changes in the schools they attend. In an era in which all students are held to high standards, the disruption caused by moving from school to school -- sometimes multiple times within one school year -- can have devastating results for mobile students as well as the teachers and non-mobile students in the schools from which these students depart and to which they arrive.The purpose of this report is to shed light on the challenges associated with high rates of student mobility in order to best identify and disseminate promising strategies for overcoming these challenges -- both inside and outside of schools. The report is intended to highlight the issue of student mobility and focus policymakers' attention on the changes needed in policy and practice at state and local levels to best serve these students. The ultimate goal is to ensure that mobile students are provided with every opportunity to receive the high quality education that will enable them to become successful, productive citizens.This report focuses on districts in Massachusetts' Gateway Cities; in these 11 school districts, 35,000 students moved at least once during the 2008 -- 09 school year, representing 35% of all mobile students statewide. In some of these districts, nearly one-third of the students changed schools during the course of the year. This report describes the scale of Massachusetts' student mobility problem and the challenges student mobility presents in 11 schools in 6 Gateway City districts (Brockton, Fitchburg, Haverhill, Holyoke, Springfield, and Worcester). Findings were gathered from interviews with 43 school and district staff members in the 6 Gateway Cities school districts listed above.The report also provides examples of promising school-, district- and state-level strategies for mitigating the negative impact of mobility. The final section puts forth considerations for action for Massachusetts policymakers. The report suggests that Massachusetts policymakers:develop the Readiness Passport and incorporate individual indicators of student mobility;expand current efforts to better understand the implications of student mobility and support the districts most impacted by it; develop a more flexible and responsive funding system; consider how to incorporate student mobility into the state accountability system while holding all students to high standards; encourage schools of education to incorporate training for working with mobile students; and promote interagency collaboration to address the root causes of student mobility. The report was the subject of discussion during a public event in Holyoke, MA on September 20, 2011

    Middleware Design Framework for Mobile Computing

    Get PDF
    Mobile computing is one of the recent growing fields in the area of wireless networking. The recent standardization efforts accomplished in Web services, with their XML-based formats for registration/discovery, service description, and service access, respectively UDDI, WSDL, and SOAP, certainly represent an interesting first step towards open service composition, which MA supports for mobile computing are expected to integrate within their frameworks soon. A middle-ware that can work even if the network parameters are changed can be a better solution for successful mobile computing. A middle-ware is proposed for handling the entire existing problem in distributed environment. Middleware is about integration and interoperability of applications and services running on heterogeneous computing and communication devices. The services it provides - including identification, authentication, authorization, soft-switching, certification and security - are used in a vast range of global appliances and systems, from smart cards and wireless devices to mobile services and e-Commerce

    Spectrum sharing security and attacks in CRNs: a review

    Get PDF
    Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics. The element of spectrum sharing in cognitive radio is a fundament al approach in utilising free channels. Cooperatively communicating cognitive radio devices use the common control channel of the cognitive radio medium access control to achieve spectrum sharing. Thus, the common control channel and consequently spectrum sharing security are vital to ensuring security in the subsequent data communication among cognitive radio nodes. In addition to well known security problems in wireless networks, cognitive radio networks introduce new classes of security threats and challenges, such as licensed user emulation attacks in spectrum sensing and misbehaviours in the common control channel transactions, which degrade the overall network operation and performance. This review paper briefly presents the known threats and attacks in wireless networks before it looks into the concept of cognitive radio and its main functionality. The paper then mainly focuses on spectrum sharing security and its related challenges. Since spectrum sharing is enabled through usage of the common control channel, more attention is paid to the security of the common control channel by looking into its security threats as well as protection and detection mechanisms. Finally, the pros and cons as well as the comparisons of different CR - specific security mechanisms are presented with some open research issues and challenges

    Proceedings of International Workshop "Global Computing: Programming Environments, Languages, Security and Analysis of Systems"

    Get PDF
    According to the IST/ FET proactive initiative on GLOBAL COMPUTING, the goal is to obtain techniques (models, frameworks, methods, algorithms) for constructing systems that are flexible, dependable, secure, robust and efficient. The dominant concerns are not those of representing and manipulating data efficiently but rather those of handling the co-ordination and interaction, security, reliability, robustness, failure modes, and control of risk of the entities in the system and the overall design, description and performance of the system itself. Completely different paradigms of computer science may have to be developed to tackle these issues effectively. The research should concentrate on systems having the following characteristics: • The systems are composed of autonomous computational entities where activity is not centrally controlled, either because global control is impossible or impractical, or because the entities are created or controlled by different owners. • The computational entities are mobile, due to the movement of the physical platforms or by movement of the entity from one platform to another. • The configuration varies over time. For instance, the system is open to the introduction of new computational entities and likewise their deletion. The behaviour of the entities may vary over time. • The systems operate with incomplete information about the environment. For instance, information becomes rapidly out of date and mobility requires information about the environment to be discovered. The ultimate goal of the research action is to provide a solid scientific foundation for the design of such systems, and to lay the groundwork for achieving effective principles for building and analysing such systems. This workshop covers the aspects related to languages and programming environments as well as analysis of systems and resources involving 9 projects (AGILE , DART, DEGAS , MIKADO, MRG, MYTHS, PEPITO, PROFUNDIS, SECURE) out of the 13 founded under the initiative. After an year from the start of the projects, the goal of the workshop is to fix the state of the art on the topics covered by the two clusters related to programming environments and analysis of systems as well as to devise strategies and new ideas to profitably continue the research effort towards the overall objective of the initiative. We acknowledge the Dipartimento di Informatica and Tlc of the University of Trento, the Comune di Rovereto, the project DEGAS for partially funding the event and the Events and Meetings Office of the University of Trento for the valuable collaboration
    • …
    corecore