2012
DOI: 10.1109/tpds.2012.39
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…In the future we plan to explore other trust-based MAN-ET applications such as trust-based intrusion detection [2,11,20,23,38] and service composition [70,71] with which we could further demonstrate the design notion of application-level trust optimization proposed in this paper. We also plan to investigate if other trust formation methods (other than the linear function considered in this paper) would be more effective for such MANET applications, and perform a comparative performance analysis with existing methods (e.g., Bayesian [21] or fuzzy logic [14]).…”
Section: Resultsmentioning
confidence: 98%
“…In the future we plan to explore other trust-based MAN-ET applications such as trust-based intrusion detection [2,11,20,23,38] and service composition [70,71] with which we could further demonstrate the design notion of application-level trust optimization proposed in this paper. We also plan to investigate if other trust formation methods (other than the linear function considered in this paper) would be more effective for such MANET applications, and perform a comparative performance analysis with existing methods (e.g., Bayesian [21] or fuzzy logic [14]).…”
Section: Resultsmentioning
confidence: 98%
“…On the other hand, the pull method [9], [10] enables a node to advertise its service availability only when a peer node (i.e., a SR) shows interest. That is, the push method is proactive and consumes more resources while the pull method reactively serves upon request, trading off delay for resource consumption.…”
Section: Service Advertisementmentioning
confidence: 99%
“…There are several kinds of formats to simplify a differential equation such as the forward, backward and central difference approximations. For space approximation, this paper applies the seven-point stencil FDM described in Equation (1). For time approximation, the partial differential equation is handled by the backward Euler method which is a fully implicit method described in Equation (2).…”
Section: The Parallel Fdm Overlapping Domain Decompo-mentioning
confidence: 99%
“…In this context, smart things communicate with each other, collect and aggregate data in network for satisfying certain requirements of end-users [1]. In recent years, IoT technologies have been widely used in many applications such as environmental quality and protection, natural resource management, groundwater management, farmland and greenhouse [2,3], etc.…”
Section: Introductionmentioning
confidence: 99%