A survey on content-centric technologies for the current Internet: CDN and P2P solutions
A Passarella - Computer Communications, 2012 - Elsevier
One of the most striking properties of the Internet is its flexibility to accommodate features it
was not conceived for. Among the most significant examples, in this survey we consider the …
was not conceived for. Among the most significant examples, in this survey we consider the …
A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks
Service and resource discovery has become an integral part of modern networked systems.
In this survey we give an overview of the existing solutions for service and resource …
In this survey we give an overview of the existing solutions for service and resource …
A Survey on Content Retrieval on the Decentralised Web
The control, governance, and management of the web have become increasingly
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …
A self-tuning failure detection scheme for cloud computing service
Cloud computing is an increasingly important solution for providing services deployed in
dynamically scalable cloud networks. Services in the cloud computing networks may be …
dynamically scalable cloud networks. Services in the cloud computing networks may be …
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which
means that in order for one peer to trust another, it needs to know the other peer's identity …
means that in order for one peer to trust another, it needs to know the other peer's identity …
Weak state routing for large scale dynamic networks
Routing in communication networks involves the indirection from a persistent name (or ID) to
a locator and delivering packets based upon the locator. In a large-scale, highly dynamic …
a locator and delivering packets based upon the locator. In a large-scale, highly dynamic …
Message fragmentation in opportunistic DTNs
Delay-tolerant networking is used for communication in challenged environments such as
MANETs, in which links are unstable and end-to-end paths between communicating nodes …
MANETs, in which links are unstable and end-to-end paths between communicating nodes …
Resilience metrics for service-oriented networks: A service allocation approach
We develop a graph-theoretic model for service-oriented networks and propose metrics that
quantify the resilience of such networks under node and edge failures. These metrics are …
quantify the resilience of such networks under node and edge failures. These metrics are …
Real-time activity recognition on smartphones using deep neural networks
L Zhang, X Wu, D Luo - 2015 IEEE 12th Intl Conf on Ubiquitous …, 2015 - ieeexplore.ieee.org
Real-time activity recognition is an important research problem, which has drawn the
attention of many researchers for many years. All previous works of real-time activity …
attention of many researchers for many years. All previous works of real-time activity …
[PDF][PDF] Cooperation as a Service in VANETs.
Vehicular Networks, including Vehicular Adhoc Networks (VANETs) and Vehicular Sensor
Networks (VSNs), stimulate a brand new variety of services, ranging from driver safety …
Networks (VSNs), stimulate a brand new variety of services, ranging from driver safety …