Browse All Reviews
Computer Systems Organization (C)
Computer-Communication Networks (C.2)
Distributed Systems (C.2.4)
> Distributed Applications (C.2.4...)
All Media Types
1-10 of 92 Reviews about "
Distributed Applications (C.2.4...)
The Internet of Things: a survey
Li S., Xu L., Zhao S. Information Systems Frontiers 17(2): 243-259, 2015. Type: Article
Undisputedly, the Internet of Things (IoT), extending the classic computer-bound Internet to the physical world and all the “things” contained therein, will be a really big thing. Equally unanimously, connecting and...
Oct 11 2016
An architecture to implement the Internet-of-Things using the Prometheus methodology
Manaţe B., Fortiş F., Moore P. International Journal of Distributed Systems and Technologies 6(4): 1-20, 2015. Type: Article
The Prometheus methodology is a set of detailed processes of specifying, designing, implementing, and testing agent-oriented software systems. An agent-oriented system consists of multiple agents, each of which has characteristics of a...
Oct 11 2016
Wireless routing and control: a cyber-physical case study
Li B., Ma Y., Westenbroek T., Wu C., Gonzalez H., Lu C. ICCPS 2016 (Proceedings of the 7th International Conference on Cyber-Physical Systems, Vienna, Austria, Apr 11-14, 2016) 1-10, 2016. Type: Proceedings
Utilization of wireless sensor networks at automated industrial processing plants, not only for monitoring aspects but also for actuator ones, opens a new horizon for their deployment. In this platform, sensing components, control adap...
Oct 6 2016
Declarative framework for specification, simulation and analysis of distributed applications
Ma J., Le F., Russo A., Lobo J. IEEE Transactions on Knowledge and Data Engineering 28(6): 1489-1502, 2016. Type: Article
Distributed applications are normally overlaid on a network of computing elements (nodes). Their specification requires the declaration of each task and role of each node over a period of time, along with protocols and services. The au...
Sep 23 2016
Distributed event-triggered path construction in wireless sensor networks
Lee C., Choi S. Wireless Networks 19(1): 1-16, 2013. Type: Article
An important requirement in some wireless sensor network (WSN) applications is the need to guide a mobile agent, such as a mobile robot, user, or unmanned aerial vehicle (UAV), toward event-triggered sensor nodes or a specific event lo...
Feb 4 2014
Accelerating the mobile web with selective offloading
Wang X., Shen H., Wetherall D. MCC 2013 (Proceedings of the 2nd ACM SIGCOMM Workshop on Mobile Cloud Computing, Hong Kong, China, Aug 16, 2013) 45-50, 2013. Type: Proceedings
Offloading the page load process to the cloud is not new to the mobile web. This paper proposes a measurement-based framework for offloading portions of the process, but unlike other browsers such as Opera Mini that offload fixed parts...
Oct 9 2013
Efficient cooperative backup with decentralized trust management
Tran N., Chiang F., Li J. ACM Transactions on Storage 8(3): 1-25, 2012. Type: Article
With an increase in computer technology usage comes an increase in data and the need for secure data storage. Valuable stored data must be kept safe from disk failures, operator mistakes, theft, and even natural disasters. For many org...
Mar 26 2013
Achieving long-term operation with a capacitor-driven energy storage and sharing network
Zhu T., Gu Y., He T., Zhang Z. ACM Transactions on Sensor Networks 8(4): 1-37, 2012. Type: Article
Contemporary computing resources are network intensive, and thus energy management is quite challenging. Energy management is important in the context of environmental factors. Any small contribution that saves energy and compensates f...
Jan 10 2013
REST and linked data: a match made for domain driven development?
Page K., De Roure D., Martinez K. WS-REST 2011 (Proceedings of the Second International Workshop on RESTful Design, Hyderabad, India, Mar 28, 2011) 22-25, 2011. Type: Proceedings
Representational state transfer (REST) and linked data are two Web architecture styles that have been increasingly adopted in recent years. In spite of these parallel developments, little research exists with regard to combining the tw...
Jun 9 2011
An algorithm for selective undo of any operation in collaborative applications
Shao B., Li D., Gu N. GROUP 2010 (Proceedings of the 16th ACM International Conference on Supporting Group Work, Sanibel Island, FL, Nov 7-10, 2010) 131-140, 2010. Type: Proceedings
In the field of collaborative applications, the ability to undo an earlier operation is a valuable feature. Shao, Li, and Gu have written a technically detailed paper on their algorithm, which is based on operational transformation (OT...
Mar 9 2011
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud