1,500,088 research outputs found

    Peer-assisted location authentication and access control for wireless networks

    Get PDF
    This paper presents the development and implementation of a location‐based, lightweight peer‐assisted authentication scheme for use in wireless networks. The notion of peer‐assisted authentication is based upon some target user equipment‐ (UE) seeking authentication and access to a network based upon its physical location. The target UE seeks authentication through the UE of peers in the same network. Compared with previous work, the approach in this paper does not rely on any cryptographic proofs from a central authentication infrastructure, thus avoiding complex infrastructure management. However, the peer‐assisted authentication consumes network channel resources which will impact on network performance. In this paper, we also present an access control algorithm for balancing the location authentication, network quality of service (QoS), network capacity and time delay. The results demonstrate that peer‐assisted authentication considering location authentication and system QoS through dynamic access control strategies can be effectively and efficiently implemented in a number of use cases

    Dynamic Multi-Vehicle Routing with Multiple Classes of Demands

    Full text link
    In this paper we study a dynamic vehicle routing problem in which there are multiple vehicles and multiple classes of demands. Demands of each class arrive in the environment randomly over time and require a random amount of on-site service that is characteristic of the class. To service a demand, one of the vehicles must travel to the demand location and remain there for the required on-site service time. The quality of service provided to each class is given by the expected delay between the arrival of a demand in the class, and that demand's service completion. The goal is to design a routing policy for the service vehicles which minimizes a convex combination of the delays for each class. First, we provide a lower bound on the achievable values of the convex combination of delays. Then, we propose a novel routing policy and analyze its performance under heavy load conditions (i.e., when the fraction of time the service vehicles spend performing on-site service approaches one). The policy performs within a constant factor of the lower bound (and thus the optimal), where the constant depends only on the number of classes, and is independent of the number of vehicles, the arrival rates of demands, the on-site service times, and the convex combination coefficients.Comment: Extended version of paper presented in American Control Conference 200

    2-Level-Service

    Get PDF
    2-level-service occurs when an inventory system has two or more locations and one location is the source to another location in the network.  The source location receives its stock from a supplier and -- when called upon -- replenishes the stock to another location, here called the 2-level-service location.  This paper shows how to control the inventory at each location and generates table values on inventory levels for a range of scenarios

    A reliable multicast for XTP

    Get PDF
    Multicast services needed for current distributed applications on LAN's fall generally into one of three categories: datagram, semi-reliable, and reliable. Transport layer multicast datagrams represent unreliable service in which the transmitting context 'fires and forgets'. XTP executes these semantics when the MULTI and NOERR mode bits are both set. Distributing sensor data and other applications in which application-level error recovery strategies are appropriate benefit from the efficiency in multidestination delivery offered by datagram service. Semi-reliable service refers to multicasting in which the control algorithms of the transport layer--error, flow, and rate control--are used in transferring the multicast distribution to the set of receiving contexts, the multicast group. The multicast defined in XTP provides semi-reliable service. Since, under a semi-reliable service, joining a multicast group means listening on the group address and entails no coordination with other members, a semi-reliable facility can be used for communication between a client and a server group as well as true peer-to-peer group communication. Resource location in a LAN is an important application domain. The term 'semi-reliable' refers to the fact that group membership changes go undetected. No attempt is made to assess the current membership of the group at any time--before, during, or after--the data transfer

    Data Mobility as a Service

    Full text link
    © 2016 IEEE. Cloud computing and cloud services provide an alternative IT infrastructure and service models for users. The users use cloud to store their data, delegate the management of the data, and deploy their services cost-effectively. This usage model, however, raised a number of concerns relating to data control, data protection and data mobility: 1) users may lose control of their resource, 2) data protection schemes are not adequate when data is moved to a new cloud, 3) tracking and tracing changes of data location as well as accountability of data operations are not well supported. To address these issues, this paper proposes a novel cloud service for data mobility from two aspects: data mobility and data protection. A data mobility service is designed and implemented to manage data mobility and data traceability. A Location Register Database (LRD) is also developed to support the service. Furthermore, data is protected by a data security service CPRBAC (Cloud-based Privacy-Aware Role Based Access Control) and an Auditing service that are capable of verifying data operations and triggering alarms on data violations in the Cloud environment

    The impact of VMI on performance in manufacturing company

    Get PDF
    The purpose of this paper is to shed the light on the impact of VMI element that lead to high performance of VMI in Malaysia manufacturing company.The VMI elements consist of inventory location, inventory ownership, demand visibility, replenishment decisions, and inventory control limits.Questionnaire was the main instrument for the study and it was gathered from 101 staff in departments of purchasing, planning, logistics and operation.Data analysis was conducted by employing descriptive analysis (mean and standard deviation), reliability analysis, Pearson correlation analysis and multiple regressions. The findings show that there are relationships exist between inventory location, level of demand visibility, inventory control limits and service performance of VMI, but not for inventory ownership and replenishment decisions.Meanwhile, for cost performance of VMI, only inventory location had significant relationship. Visibility of demand is the main predictor of service performance, followed by inventory control limits. However, only inventory location contributes to cost performance of VMI.It is recommended that future study to determine additional VMI element that are pertinent to firms’ current VMI practices. Logic suggests that further study to include more integration issues, other nature of businesses and research instruments
    corecore