About
11
Publications
236
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
80
Citations
Publications
Publications (11)
Exploiting the multirate capability in mobile ad hoc networks (MANETs) is more complex than in single-hop WLANs because of the rate-distance and rate-hop count tradeoffs. This paper proposes path-centric on-demand rate adaptation for MANETs (PRAM) protocol. A unique feature that sets PRAM apart from most of previous studies is its path-centric appr...
This paper presents an efficient semantic service discovery scheme called UbiSearch for a large-scale ubiquitous computing environment. A semantic service discovery network in the semantic vector space is proposed where services that are semantically close to each other are mapped to nearby positions so that the similar services are registered in a...
In this paper, we propose an efficient resource discovery scheme for large-scale ubiquitous computing environments, which supports scalable semantic searches and load balancing among resource discovery resolvers. Here, the resources are described based on the concepts defined in the ontological hierarchy. To semantically search the resources in a s...
The scale of MANET is expanding with the proliferation of mobile devices, and the number of services in MANET also increases. It raises the importance of scalability and semantic searching capability. However, existing service discovery protocols targeting MANET have been focused on either only scalability or only semantic matching. Some recent res...
In a mobile ad hoc network dificulties exist in supporting address autoconfiguration and naming resolution due to the lack of centralized servers. This letter presents a novel approach, called name-based autoconfiguration (NBA), which uses host names to determine IP addresses and provides address autoconfiguration and name revolution as a single pr...
Service discovery is an essential technique to provide applications with appropriate resources. However, user mobility and
heterogeneous environments make the discovery of appropriate resources difficult. The execution environments will be rapidly
changed, so developers cannot predict available resources exactly in design time. Thus, service discov...
Although all existing service discovery middlewares provide similar functionality, they are incompatible with one another
due to differences in approach and architecture. We believe that co-existence of various service discovery middlewares will
be indispensable since their target services and network environments are quite different to each other....
This paper presents our research progress for group context-aware service discovery supporting continuous service availability by providing an alternative service. We believe that service discovery system need to have efficient method for representing the context of a service and a good algorithm for matching and evaluation. We adopt IOPE model fro...
In this paper, we present, Active Surroundings, a group-aware middleware infrastructure for ubiquitous computing environments. Our system focuses on two key issues: group-awareness and transparent application reconfiguration. To achieve these goals, Active Surroundings is composed of four key component: environment sensing for abstraction of enviro...
Addressing is a basic step for communications among network nodes, and a naming service can help users easily and conveniently
use their applications. To the best of our knowledge, addressing is studied regardless of naming service and vice versa. In
this paper, we suggest an autoconfiguration scheme that allocates an address using a hash value of...
In multicasting multimedia data, effectively adapting to
heterogeneous receivers is very difficult. In this paper, we propose a
new scheme called the “active traffic control mechanism for
layered multimedia multicasting” (ATLM) in an active network
environment. The proposed scheme controls traffic at each router using
the traffic condition of immed...