By Topic

Advances in Future Internet (AFIN), 2010 Second International Conference on

Date 18-25 July 2010

Filter Results

Displaying Results 1 - 25 of 29
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (2362 KB)  
    Freely Available from IEEE
  • [Title page i]

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (11 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (52 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (124 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): v - vi
    Save to Project icon | Request Permissions | PDF file iconPDF (171 KB)  
    Freely Available from IEEE
  • Preface

    Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • Program Committee

    Page(s): viii - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (68 KB)  
    Freely Available from IEEE
  • list-reviewer

    Page(s): x - xi
    Save to Project icon | Request Permissions | PDF file iconPDF (66 KB)  
    Freely Available from IEEE
  • Using Relevance Feedback in Bridging Semantic Gaps in Content-Based Image Retrieval

    Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (211 KB) |  | HTML iconHTML  

    Content-based image retrieval (CBIR) is a difficult area of research in multimedia systems. The research has proved extremely difficult because of the inherent problems in proper automated analysis and feature extraction of the image to facilitate proper classification of various objects. An image may contain more than one objects and to segment the image in line with object features to extract meaningful objects and then classify it in high-level like table, chair, car and so on has become a challenge to the researchers in the field. The latter part of the problem, the gap between low-level features like color, shape, texture, spatial relationships and high-level definitions of the images is called the semantic gap. Until we solve these problems in an effective way, the efficient processing and retrieval of information from images will be difficult to achieve. In this paper we explore the possibilities of how relevance feedback can help us solve this problem of semantic gap although lot of works have already been done using the concepts of relevance feedback in this area. This would enable efficient image retrieval for internet of the future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Service for Locator/Identifier-Split Architectures Based on Mobile IP Mechanisms

    Page(s): 6 - 10
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (595 KB) |  | HTML iconHTML  

    Concepts for a next generation Internet architecture quite often propose to decouple identifiers from locators. The so-called locator/identifier-split solves several problematic issues of today's Internet architecture. At the same time, however, a user's location is exposed within the whole network and any participant can be traced. Privacy considerations, therefore, need to be a key design element for any locator/identifier-split architecture. In this paper, we introduce a novel privacy service for locator/identifier-split architectures. The service is following Mobile IP's proxy idea and introduces mechanisms to overcome the unwanted side effects of such an approach. The concept decouples the privacy service from the network and leaves it open to the customer whether he wants to subscribe or not. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smoothing Selfishness by Isolating Non-cooperative Nodes in Ad Hoc Wireless Networks

    Page(s): 11 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (231 KB) |  | HTML iconHTML  

    Current ad hoc networks rely on a silent mutual agreement among nodes to relay packets to the destinations. The efforts made by each single node to serve the others are usually repaid with the chance to successfully set up its own traffic sessions. However, limited power, together with security concerns, can push certain nodes to refuse to cooperate. Such nodes will thus act as parasites, while the others will unawarely keep on trusting them for what concerns the agreement on mutual service. In this paper we present an algorithm inspired by the results of game theory, specifically designed to let the nodes of an ad hoc network become able to trace the behavior of the companion nodes. Traffic is forwarded only towards cooperative nodes, hence reducing the waste of power at the same time maximizing the delivery rate. In such a scenario, selfish nodes will be isolated as long as they refuse to cooperate. The algorithm is included in an existing ad hoc routing protocol and is shown to successfully stimulate cooperation among nodes in a simulated environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NOL: Name Overlay Service for Improving Internet Routing Scalability

    Page(s): 17 - 21
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (368 KB) |  | HTML iconHTML  

    Internet routing system is the fundamental components of Internet. As the Internet growth, Internet routing system is facing the scaling issues of global routing table expanding due to the wide use of multi-homing, traffic engineering, and mobility. Existing proposed solutions need to change host protocol stack or routing architecture, hence, no incentive for practical deployment. In this paper, we describe a new mechanism for the scaling issue. This mechanism adding a name overlay layer on TCP/IP protocol stack, Comparing with current solutions, it is easier to be deployed. It benefits the Internet edge users from multi-homing, traffic engineering and mobility, and also facilitates the reduction the global routing table size. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User-Provided Wireless Neutral Access Networks

    Page(s): 22 - 24
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (120 KB) |  | HTML iconHTML  

    Involving end-users in the creation of an overlay wireless access network, which provides nomadic connectivity by exploiting under-utilized residential connections, is an attractive perspective, which has motivated the emergence of WiFi communities worldwide. The practical exploitation of user-provided local loops, however, raises organizational, administrative, technical, and regulatory issues the solution of which strongly depends on the business models and network architectures adopted by local broadband operators. This paper discusses the relationship between access network architectures and user-provided local loops, pointing out the suitability of neutral access networks as a framework for exploiting end-users' networking potentials. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Oriented Multi Agent Middleware Using Information Fusion and Service Prediction in Pervasive Environments

    Page(s): 25 - 30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (556 KB) |  | HTML iconHTML  

    In the pervasive computing paradigm, there is a strong demand towards user-centric services based on the context and service management. For implementing the user-centric services recent researches on the service-oriented system is focused on the context recognition, analysis and reasoning. Furthermore, the service-oriented systems also need to manage the structural and hierarchical context model based on ontology including the situational and environmental contexts. These systems enhance the system scalability and increase the service diversity according to the service reasoning and the context analyzing. However, the conventional systems spend too much time and effort on the context analysis and the pattern learning. Moreover, the similarity of users, spaces, and service characteristics has not been adequately considered in the conventional systems. These facts reduce the effectiveness of the pattern learning and the service prediction. Therefore, we propose a Service-oriented Multi Agent Middleware which provides the information fusion and the group-based situation management for effectively managing the service prediction in pervasive environments. Our system dynamically analyzes the group-based situation and creates the novel services with patterns and policies. Our system reduces the service prediction delay up to 12% at the real home testbed and emulation system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MAC Protocol with Low Energy Consumption in Wireless Sensors Network

    Page(s): 31 - 36
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    Medium Access Control (MAC) protocols must perform the functionality required by the application while utilizing the limited resources available on sensor nodes. Limited energy resources place strict limits on the operations that a sensor node may accomplish and differentiate sensor networks from other networks. Application and protocol designers must utilize the hardware resources of the sensor nodes judiciously to conserve energy and prolong the network lifetime. Especially, when the sensors network becomes accessible from internet, where the end users can monitor, configure and send special requests to the sensors nodes. In this paper we present a new solution to improve collision avoidance and optimize the energy consumption. The simulation results show that the life time of sensor node has been improved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Innovative QoS Paradigm Based on Cognitive In-network Management of Resources for a Future Unified Network Architecture: I-NAME QoS Model

    Page(s): 37 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (631 KB) |  | HTML iconHTML  

    The goal of this paper is to present an innovative QoS solution of managing resources by knowing the service requests and the network context in a unified network architecture. Considering the nowadays technical solutions and the holistic vision of the future network of information, this solution is proposing a cognitive QoS model of self-managing resources by using the network virtualization concept in conjunction with the in-network management concept. Thus, the main goal of the paper is to solve resource management problem inside a unified network architecture remodeled by the actual trends in the field - virtualization and in-network management - by validating while evaluating the I-NAME QoS proposed model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Internet File Transfer Service for Mobile Phones with Limited Connectivity

    Page(s): 44 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (811 KB) |  | HTML iconHTML  

    Nowadays, users of mobile phones generate too many files that have to be frequently downloaded to an external storage repository (freeing local space), using a USB cable or a short-range wireless connection such as Bluetooth. This situation is very common in developing countries where there are not many available wireless networks, restricting the user mobility. This paper presents an Internet File Transfer Service (FTS) for mobile phones with limited connectivity. It is a service that can be used through a set of functions (API) that facilitates file transfer between mobile applications and external storage servers, taking advantage of different wireless networks. The FTS selects the best wireless connection (WiFi, GPRS or UMTS) taking into account accessibility and cost of the service. FTS is able to use the Multimedia Messaging Service (MMS) as an alternative options for transferring files, which is especially useful when the mobile phone connectivity is limited. It is based on the J2ME platform. As a use case, a mobile application named Swapper was built on top of the FTS. When the mobile phone memory runs out, Swapper automatically sends selected files to a web storage server using the best connection available, increasing the storage space in the mobile phone. Swapper includes an efficient replacement policy that minimizes the latency perceived by users. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Interoperability of Heterogeneous Devices in Ubiquitous Home

    Page(s): 50 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (673 KB) |  | HTML iconHTML  

    Ubiquitous home refers not only to home but also to logical space, including a wide range of out-home personal devices such as mobile phones, PDAs, laptops, car navigators, and office PCs. There are certain connection barriers among the devices, such as the dynamic IP address, NAT. In a home network, various devices coexist in heterogeneous networks, such as IP, IEEE1394, PLC, Bluetooth, ZigBee, UWB, and IrDA, all of which lack interoperability due to their different physical transmission characteristics and protocols. In ubiquitous home where an unrestricted collaboration of the devices is essential to offer services that meet the users' requirements, free interoperability among the devices must be guaranteed. This paper proposes a framework for interoperability of the heterogeneous devices in a ubiquitous home based on a virtual overlay network which hides the complicated physical network configurations and heterogeneity of the service protocols. Compared with conventional approaches, the framework offers improvements in terms of its capacity to support network and device types, its reliability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distance-Aware Avatar Interaction in Online Virtual Environments

    Page(s): 56 - 62
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3819 KB) |  | HTML iconHTML  

    Immersive Massive Multiuser Virtual Environments currently attract a lot of attention. Going beyond the hype, one discovers interesting concepts and opportunities for a supposed future Web which is commonly called the 3D Web. The global provision of such a vision is much more than another evolutionary step in content visualization, rather severe technical challenges need to be addressed by the future Internet infrastructure and protocols. Existing commercial approaches feature only limited scalability due to mostly relying on centralized solutions. With global-scale scenarios like a 3D Web in mind, the application of distributed and decentralized techniques becomes indispensable. In the HyperVerse project we have developed a two-tier Peer-To-Peer architecture, incorporating a federation of reliable server machines and user clients as basic infrastructure for an open and scalable 3D Web. Based on this federated infrastructure a hybrid avatar management scheme has been proposed that reduces the server load considerably. Using this scheme, servers get unburdened especially in highly populated regions of an online environment. Moreover, the flash crowd problem is tackled in a self-scaling fashion. This paper presents a series of improvements of this avatar management scheme, focusing not only on reducing server load, but also latency, client and overall network load. These improvements are achieved through utilizing free server capacities and considering the real-world distance between communicating nodes to minimize network traffic. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Opportunistic Multi-server Scheduling Approach for Service Guarantees through Mobile Routers

    Page(s): 63 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (867 KB) |  | HTML iconHTML  

    In this paper, we have presented an opportunistic multi-server scheduling scheme that distributes traffic on multiple wireless interfaces of a mobile router to improve service guarantees for competing flows during mobility. The proposed adaptive, scalable, multi-server (ASM) scheduling scheme extends guaranteed-rate(GR) service model to ensure bounded service delays for each packet of flows in accordance with their committed rates. The major challenges handled through ASM scheduling include the unification of mutable heterogeneous wireless links into a single virtual channel with higher capacity. This approach enhances service guarantees without resource reservation on individual wireless links for diverse traffic sources. Hence, the transmission deadlines for multiple flows are maintained through transparently hiding disconnections during mobility. The simulation results of proposed scheme show higher degree of reliability and scalability of service provisioning during mobility. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless Handoff in Heterogeneous Network for VoIP Applications

    Page(s): 69 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB) |  | HTML iconHTML  

    Rapid development has equipped mobile devices with heterogeneous wireless access capabilities. A lot of work has been done on WLAN-3G integration to support seamless connectivity and global roaming. Most recent research trends focus on interwork gateway or intersystem roaming framework. In this paper, we introduce an application framework providing seamless connectivity for mobile devices across heterogeneous networks to support Voice-over-IP (VoIP) applications with high Quality-of-Service (QoS) requirements. The experimental results showed that the proposed system is able to support seamless connectivity for VoIP applications on multihomed Symbian devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query Processing over Distributed Heterogeneous Sensor Networks in Future Internet: Scalable Architecture and Challenges

    Page(s): 75 - 81
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (496 KB) |  | HTML iconHTML  

    The wireless networked sensors embedded with everyday objects will become an integral part of Future Internet, where the interaction among people, computer and those objects will shift the current Internet to a new paradigm, namely the Internet of Things. The terabyte torrent of data generated by billions of sensors belonging to a large number of distributed heterogeneous sensor networks in Future Internet will only be valuable if they can be effectively used on purpose, which leads to the necessity of an Internet scale query processing framework. In this paper, firstly, we focus on the distinct challenges present in Internet scale query processing over distributed sensor networks. Then, we propose a flexible and scalable system architecture capable of handling the complex scenario that might arise from the integration of a large number of such networks in Future Internet. Finally, we discuss the overall query processing methodology over such system and present some directions on the possible solutions to a number of identified research challenges. The outcome of this paper would foster the sensor network research in Future Internet domain. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PHcenter: A Platform for Process Diagnosis and Control via Internet

    Page(s): 82 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1239 KB) |  | HTML iconHTML  

    The paper presents a platform, which offers to the possibilities to connect remotely via Internet to an industrial process in order to monitor, diagnose and control it remotely. In this way, several expensive resources like experts and powerful computers that simulate the complex processes from the customer site can be shared at distance through Internet in order to optimize the costs and to increase the stability and reliability of the process by reducing the time to intervention. This solution has the advantage of a great flexibility created by the use of complex models of the processes. Also it is free of dangerous events. The experts from the diagnosis center can extrapolate the data collected from the real process in order to estimate the behavior of the system and prevent the possible dangerous situations. In case of observing a potential danger the experts will contact the operators from the control room of the real process in order to inform about the potential dangers and take the appropriate actions. The paper presents the architecture of the diagnosis platform we proposed, its performances and the advantages related to the solutions currently used. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of AQM Routers in the Presence of New TCP Variants

    Page(s): 88 - 93
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (593 KB) |  | HTML iconHTML  

    In this paper, we study the performance of active queue management algorithms for packet queueing in Internet routers in the presence of new versions of the TCP congestion control mechanism. In particular, we compare the performance of tail drop, adaptive RED, AVQ, PI, REM and AN-AQM queueing in four TCP cases: (i) the classic New Reno protocol, (ii) the Sack protocol, (iii) the Fack protocol, (iv) the Cubic protocol. Apparently, the application of Fack and Cubic versions of TCP have (with some exceptions) minor impact on the basic performance characteristics (throughput and delay) of the router's queueing mechanism. However, application of Cubic TCP has often a positive impact on the stability of the router's queue size. As for the inter-flow fairness for different TCPs, the results are not univocal - both fairness improvement and degradation can be observed depending on the network congestion level. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Three-Phase Cross-Cloud Federation Model: The Cloud SSO Authentication

    Page(s): 94 - 101
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (797 KB) |  | HTML iconHTML  

    Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining unbounded computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting of extra physical resources. Our architecture introduces a new module named Cross-Cloud Federation Manager including three agents (Discovery, Match-making and Authentication). In this work, we specifically focus on the authentication agent, which is responsible for a secure federation. To address such problem we propose a technical solution based on the IdP/SP model along with the SAML technology. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.