This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provid...This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization.展开更多
Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network b...Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network bandwidth, and battery capacity in a mobile phone. While applications can be redesigned with client-server models to benefit from cloud services, users are no longer in full control of the application. This is also a serious concern. We propose an innovative framework for executing mobile applications in a virfualized cloud environment. With encryption and isolation, this environment is controlled by the user and protected against eavesdropping from cloud providers. We have developed efficient schemes for migrating applications and synchronizing data between execution environments. Performance and power issues within a virtualized execution environment are also addressed using power saving and scheduling techniques that enable automatic, seamless application migration.展开更多
In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, ...In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, which can take Collaboration, Commerce and Concurrence (3C) into realization during the product design stage. At the same time, this research adopts VPN (Virtual Private Network) technique to ensure the security of product data and information during transportation. By building CPC oriented and VPN based framework of X2D product concurrent design system, the paper explores a way for discrete enterprises adapting to the drastically competitive market and performing their product innovation.展开更多
The first component of a building implemented in a virtual prototype concerning the management of a building is a lighting system. It was applied in a study case. The interactive application allows the examination of ...The first component of a building implemented in a virtual prototype concerning the management of a building is a lighting system. It was applied in a study case. The interactive application allows the examination of the physical model, visualizing, for each element modeled in three-dimensions (3D) and linked to a database, the corresponding technical information concerned with the use of the material, calculated for different points in time during their life. The control of a lamp stock, the constant updating of lifetime information and the planning of periodical local inspections are attended on the prototype. This is an important mean of cooperation between collaborators involved in the building management.展开更多
Orientation update message filtering is an important issue in collaborativevirtual environments (CVEs). Dead-reckoning (DR) is a known effective mechanism for update messagefiltering. Yet, previous dead-reckoning tech...Orientation update message filtering is an important issue in collaborativevirtual environments (CVEs). Dead-reckoning (DR) is a known effective mechanism for update messagefiltering. Yet, previous dead-reckoning techniques mainly focus on the update message filtering forpositions. The existing orientation dead-reckoning algorithms are based on fixed threshold values.The drawbacks of fixed thresholding for orientations (FTO) are discussed in this paper. We propose avariable thresholding for orientations (VTO) based on average recent angular velocity. The mainadvantage of the proposed VTO is the ability of balancing the number of state update messages andshift frequency of direction and speed of rotation.展开更多
文摘This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization.
基金supported in part by a grant from the National Science Council under No. 98-2220-E-002-020, 99-2220-E-002-026, and 95-2221-E-002-098-MY3
文摘Smartphones and cloud computing technologies have enabled the development of sophisticated mobile applications. Still, many of these applications do not perform well due to limited computation, data storage, network bandwidth, and battery capacity in a mobile phone. While applications can be redesigned with client-server models to benefit from cloud services, users are no longer in full control of the application. This is also a serious concern. We propose an innovative framework for executing mobile applications in a virfualized cloud environment. With encryption and isolation, this environment is controlled by the user and protected against eavesdropping from cloud providers. We have developed efficient schemes for migrating applications and synchronizing data between execution environments. Performance and power issues within a virtualized execution environment are also addressed using power saving and scheduling techniques that enable automatic, seamless application migration.
文摘In order to fulfill the product concurrent design requirements of discrete manufacturing enterprises, this paper puts forth for the first time a Collaborative Product Commerce (CPC) oriented X2D (X to Design) theory, which can take Collaboration, Commerce and Concurrence (3C) into realization during the product design stage. At the same time, this research adopts VPN (Virtual Private Network) technique to ensure the security of product data and information during transportation. By building CPC oriented and VPN based framework of X2D product concurrent design system, the paper explores a way for discrete enterprises adapting to the drastically competitive market and performing their product innovation.
文摘The first component of a building implemented in a virtual prototype concerning the management of a building is a lighting system. It was applied in a study case. The interactive application allows the examination of the physical model, visualizing, for each element modeled in three-dimensions (3D) and linked to a database, the corresponding technical information concerned with the use of the material, calculated for different points in time during their life. The control of a lamp stock, the constant updating of lifetime information and the planning of periodical local inspections are attended on the prototype. This is an important mean of cooperation between collaborators involved in the building management.
文摘Orientation update message filtering is an important issue in collaborativevirtual environments (CVEs). Dead-reckoning (DR) is a known effective mechanism for update messagefiltering. Yet, previous dead-reckoning techniques mainly focus on the update message filtering forpositions. The existing orientation dead-reckoning algorithms are based on fixed threshold values.The drawbacks of fixed thresholding for orientations (FTO) are discussed in this paper. We propose avariable thresholding for orientations (VTO) based on average recent angular velocity. The mainadvantage of the proposed VTO is the ability of balancing the number of state update messages andshift frequency of direction and speed of rotation.