3 resultados para Internet Things Web Middleware Cloud Computing

em Cochin University of Science


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing. One of the key issues in mobile cloud computing is the end to end delay in servicing a request. Data caching is one of the techniques widely used in wired and wireless networks to improve data access efficiency. In this paper we explore the possibility of a cooperative caching approach to enhance data access efficiency in mobile cloud computing. The proposed approach is based on cloudlets, one of the architecture designed for mobile cloud computing.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Page 1. Towards Web 3.0... • Web 1.0 • Web 2.0 • Web 3.0 • Technology hype? • Internet as seen by our kids? Page 2. Random Trivia: Brazil has more Orkut users than citizens Page 3. The war is over. Platforms have won. Applications have lost Page 4. Page 5. Blogosphere • The blogosphere is made up of all blogs and their interconnections Page 6. Social bookmarking Page 7. Page 8. Page 9. Page 10. Page 11. Page 12. Page 13. Page 14. Towards Web 3.0 Page 15. Page 16. Wolfram Alpha Page 17. Page 18. Page 19. Page 20. Page 21. Page 22

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands is designed with a view to providing authentication as also to encrypt the message as well as the hash code using a fast stream cipher MAJE4 with a variable key size of 128-bit or 256-bit for achieving confidentiality. Both nested Hash function and MAJE4 stream cipher algorithm use primitive computational operators commonly found in microprocessors; this makes the method simple and fast to implement both in hardware and software. Since the memory requirement is less, it can be used for handheld devices for security purposes.