Packet level video quality evaluation of extensive H.264/AVC and SVC transmission simulationJournal of Internet Services and Applications - Tập 2 Số 2 - Trang 129-138 - 2011
Skupin, Robert, Hellge, Cornelius, Schierl, Thomas, Wiegand, Thomas
Video transmission over error prone channels as present in most of today’s communication channels, such as Mobile TV or some IPTV systems, is constantly subject to research. Simulation is an important instrument to evaluate performance of the overall video transmission system, but the multitude of parameters often requires large and time-consuming simulation sets. In this paper, we present a packe...... hiện toàn bộ
Social debt in software engineering: insights from industryJournal of Internet Services and Applications - Tập 6 - Trang 1-17 - 2015
Damian A Tamburri, Philippe Kruchten, Patricia Lago, Hans van Vliet
Social debt is analogous to technical debt in many ways: it represents the state of software development organisations as the result of “accumulated” decisions. In the case of social debt, decisions are about people and their interactions. Our objective was to study the causality around social debt in practice. In so doing, we conducted exploratory qualitative research in a large software company....... hiện toàn bộ
Middleware for wireless sensor networks: an outlookJournal of Internet Services and Applications - Tập 3 - Trang 31-39 - 2011
Luca Mottola, Gian Pietro Picco
In modern distributed computing, applications are rarely built directly atop operating system facilities, e.g., sockets. Higher-level middleware abstractions and systems are often employed to simplify the programmer’s chore or to achieve interoperability. In contrast, real-world wireless sensor network (WSN) applications are almost always developed by relying directly on the operating system. Why ...... hiện toàn bộ
Mission-oriented middleware for sensor-driven scientific systemsJournal of Internet Services and Applications - Tập 3 - Trang 133-139 - 2011
Alan Dearle, Simon Dobson
Coordinating the networks needed for modern scientific data collection and control presents a significant challenge: they are typically power- and resource-constrained, operating in noisy and hostile environments, and need to adapt their behaviour to match their operation to their sensed environment while maintaining the scientific integrity of their observations. In this paper, we explore several...... hiện toàn bộ
Heterogeneous resource federation with a centralized security model for information extractionJournal of Internet Services and Applications - Tập 4 - Trang 1-14 - 2013
Milad Daivandy, Denis Hünich, René Jäkel, Steffen Metzger, Ralph Müller-Pfefferkorn, Bernd Schuller
With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and computation resources capable of processing large amounts of data to allow ad-hoc co-operation becomes ever more important. Unfortunately different communities often use incompatible resource man...... hiện toàn bộ
Want to scale in centralized systems? Think P2PJournal of Internet Services and Applications - Tập 6 - Trang 1-12 - 2015
Anne-Marie Kermarrec, François Taïani
Peer-to-peer (P2P) systems have been widely researched over the past decade, leading to highly scalable implementations for a wide range of distributed services and applications. A P2P system assigns symmetric roles to machines, which can act both as client and server. This alleviates the need for any central component to maintain a global knowledge of the system. Instead, each peer takes individu...... hiện toàn bộ
Security models for delegated keyword searching within encrypted contentsJournal of Internet Services and Applications - Tập 3 - Trang 233-241 - 2012
Wei-Chuen Yau, Raphael C. -W. Phan, Swee-Huay Heng, Bok-Min Goi
Within modern internet infrastructure including networks that are ubiquitous, there is often a need for delegatable communication between nodes without compromising the confidentiality of information. In practice, this should be enforced while allowing some basic functionality for intermediate delegated nodes such as searching through encrypted content. This can be achieved using a Public key encr...... hiện toàn bộ
GARSAaaS: group activity recognition and situation analysis as a serviceJournal of Internet Services and Applications - - 2019
Amin B. Abkenar, Seng W. Loke, Arkady Zaslavsky, Wenny Rahayu
Human activity recognition using embedded mobile and embedded sensors is becoming increasingly important. Scaling up from individuals to groups, that is, group activity recognition, has attracted significant attention recently. This paper proposes a model and specification language for group activities called GroupSense-L, and a novel architecture called GARSAaaS (GARSA-as-a-Service) to provide se...... hiện toàn bộ
The path to openness: letter from the editorsJournal of Internet Services and Applications - Tập 3 Số 3 - Trang 243-244 - 2012
Fábio Kon, Gordon S. Blair, Lisandro Zambenedetti Granville, Raouf Boutaba, Lizhe Wang, Jie Tao, Achim Streit, Dieter Kranzlmüller, Luís Veiga
Tuning adaptive computations for the performance improvement of applications in JEE serverJournal of Internet Services and Applications - Tập 3 Số 2 - Trang 143-158 - 2012
Ying Zhang, Gang Huang, Xuanzhe Liu, Hong Mei
Abstract
With the increasing use of autonomic computing technologies, a Java Enterprise Edition (JEE) application server is implemented with more and more adaptive computations for self-managing the Middleware as well as its hosted applications. However, these adaptive computations consume resources such as CPU and memory, and can interfere with the norma...... hiện toàn bộ