scispace - formally typeset
Search or ask a question

Answers from top 10 papers

More filters
Papers (10)Insight
To have better results, some monitors dynamically predict new timeout values based on observed communication delays to improve the performance and accuracy of the protocols.
The main contribution is a new analytical model that accurately predicts the timeout duration from given network parameters.
Proceedings ArticleDOI
Ting Dai, Jingzhu He, Xiaohui Gu, Shan Lu 
17 Apr 2018
20 Citations
Our study reveals timeout problems are widespread among cloud server systems.
Book ChapterDOI
Alexander Kesselman, Yishay Mansour 
17 Apr 2005
38 Citations
An important advantage of our algorithm is that it can be easily implemented based on the existing TCP timeout mechanism.
Open accessBook ChapterDOI
15 May 2006
9 Citations
This suggests that analytical model of TCP throughput should certainly benefit from the incorporation of the timeout loss rate.
Proceedings ArticleDOI
28 Oct 2015
24 Citations
Too long a timeout may slow the process and prevent observing and diagnosing short-duration events, depending on the experiment's design.
Proceedings ArticleDOI
Ting Dai, Jingzhu He, Xiaohui Gu, Shan Lu 
17 Apr 2018
20 Citations
Our results show that root causes of timeout problems include misused timeout, missing timeout, improper timeout handling, unnecessary timeout, and clock drifting.
did not support the use of extended periods of timeout, but suggested that 5 min duration was as or more effective than the other tested durations.
Proceedings ArticleDOI
Ting Dai, Jingzhu He, Xiaohui Gu, Shan Lu 
17 Apr 2018
20 Citations
Our study also shows that 60% of the bugs do not produce any error messages and 12% bugs produce misleading error messages, which makes it difficult to diagnose those timeout bugs.

See what other people are reading

How effective are current migration trategies in addressing the challenges posed by migration, and what alternatives have been proposed?
5 answers
Current migration strategies face challenges due to resource constraints on IoT devices, intermittent wireless connections, and high delays when communicating with cloud servers. To address these issues, a proactive approach involving threat modeling is proposed to mitigate security risks during cloud migration. Additionally, policy recommendations emphasize the need to strengthen institutions, frameworks, and data collection to enhance safe legal migration, especially in the context of the COVID-19 pandemic. Proposed alternatives include a DNN model migration framework that focuses on preprocessing, partition-offloading, and partition-uploading plans to overcome challenges and improve efficiency in DNN migration. These strategies aim to enhance security, optimize resource utilization, and ensure smoother migration processes in the face of evolving technological landscapes and global challenges.
How does IoT technology handle data security in home security systems?
5 answers
IoT technology addresses data security in home security systems through various means. It enables real-time sensor data communication and processing for custom-made home security systems, ensuring easy access for the elderly. By integrating machine learning models for threat detection, IoT networks can enhance security algorithms, detect vulnerabilities, and forecast risks effectively. The interconnected nature of smart homes poses security challenges, emphasizing the need for robust security measures to prevent data breaches and theft. Secure data transmission and authentication mechanisms are crucial for maintaining data integrity and confidentiality in IoT-based smart home appliances, safeguarding against data leakage and external interventions. Overall, IoT technology in home security systems prioritizes data security through advanced technologies and protocols to protect sensitive information effectively.
How does ICT relate to perceived quality of life in a city?
5 answers
ICT plays a crucial role in enhancing the perceived quality of life in a city by connecting urban activities, improving services, and promoting sustainability. Smart city initiatives leverage ICT to optimize traffic management, accident prevention, waste management, and more, ultimately creating a stress-less and eco-friendly living environment. Additionally, the Social Internet of Things (SIoT) model emphasizes the importance of invulnerable IoT devices in deploying smart city services successfully, highlighting the need for smart APIs and device parameters to ensure sustainability and quality of life. Furthermore, the integration of ICT in smart mobility initiatives not only optimizes traffic flows but also collects citizen feedback to enhance public transport services, influencing the overall impact on citizens' quality of life. Overall, ICT plays a multifaceted role in improving the quality of life in cities through connectivity, sustainability, and citizen engagement.
What are the data collection methods for smart cities?
9 answers
Data collection methods for smart cities are diverse and tailored to address the multifaceted needs of urban environments, leveraging the latest in technology and innovative approaches to improve the quality of life and operational efficiency. One primary method involves the use of Internet of Things (IoT) devices, such as sensors and actuators, which are deployed across the city to collect millions of data points on various aspects like traffic, environmental conditions, and resource usage. This data is then analyzed to manage assets, resources, and services more efficiently. Renewable energy sources have been integrated into sensor networks to extend their operational lifetime, especially in hard-to-reach areas, ensuring a sustainable and continuous data collection process. Advanced communication technologies, including vehicular delay-tolerant networks (VDTNs), facilitate data collection from delay-tolerant sensors through mobile vehicles, offering an efficient and cost-effective method. This approach is secured by employing trust verification schemes to mitigate the risk of false data reporting. Furthermore, the integration of fog computing with the Internet of Things Cloud (IoTC) enhances the sensing capabilities of IoT devices while addressing computation and storage limitations, thereby reducing communication costs and improving data delivery success rates. High-capacity data collection and analytics are achieved through next-generation gigabit vehicle-to-everything (V2X) data collection platforms, utilizing 60 GHz millimeter-wave technology for efficient data upload from vehicles to the cloud, significantly improving city visualization capabilities. Additionally, smart city data acquisition systems are being designed using artificial neural network algorithms to optimize the collection and processing of spatial data, further enriching the smart city data ecosystem. To support the decision-making process for urban transformation towards sustainability, real data collection methodologies are emphasized, moving beyond simulations to gather actionable insights through robust monitoring programs. Lastly, privacy concerns are addressed by employing de-identification and anonymization techniques in the data collection process, ensuring citizens' privacy in the smart city data lifecycle.
What is GO programming language?
5 answers
The Go programming language, created by a trio at Google, including Rob Pike and Ken Thompson, addresses issues like slow builds and uncontrolled dependencies in software development. Go is known for its structural subtyping, lightweight concurrency through goroutines, and message-passing communication, making it ideal for concurrent and distributed systems. Recently, Go 1.18 introduced bounded parametric polymorphism via generic types, enhancing type-safe code reuse through a hybrid approach combining monomorphisation and call-graph based dictionary-passing. Since its open-source release in 2009, Go has become a cornerstone in critical infrastructure at major cloud providers, showcasing its enduring relevance and widespread adoption in the industry.
What is prisma systematic reviw method?
5 answers
The PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) method is a systematic approach used in various fields of study for conducting comprehensive literature reviews. It involves a structured process for reviewing and analyzing existing research articles to provide a rigorous, transparent, and replicable summary of the current knowledge on a specific topic. PRISMA guidelines help researchers in selecting relevant articles, extracting key information, and synthesizing findings to identify trends, gaps, and recommendations for future work. This method ensures that the review process is conducted with precision and clarity, enhancing the quality and reliability of the synthesized information for researchers interested in a particular subject area.
What factors influence the adoption of cloud computing among postgraduate students?
5 answers
Awareness, perceived ease of use, and computer self-efficacy significantly influence the intention to use cloud computing services among postgraduate students. Additionally, social influence, performance expectancy, and facilitating conditions positively impact students' attitudes towards cloud adoption. Organizational factors like top management commitment and staff attitudes, as well as environmental and technological factors, play a crucial role in the adoption of cloud computing in academic institutions. User readiness, satisfaction, and awareness are key factors related to the use of cloud computing among students. Factors such as relative advantage, compatibility of technology, management support, technological readiness, and competition pressure influence decision-makers to adopt cloud computing technology in organizations, including educational institutions.
How security updates affects user expericence and performance in IoT devices?
5 answers
Security updates play a crucial role in enhancing user experience and performance in IoT devices. Research shows that many IoT devices often run outdated and vulnerable software components, leading to security risks. Implementing regular security updates can mitigate these vulnerabilities, ensuring a safer user experience. However, the update process can sometimes be slow, impacting device performance. To address this, automated software analysis frameworks like IoTAV have been proposed to verify the security of applications within updates transparently. By systematically analyzing software updates, IoT devices can maintain integrity and confidentiality while improving overall performance and user satisfaction. Additionally, technologies like secure world validation and cloud services help ensure the authenticity and reliability of updates, further enhancing security and user experience.
What are the factors that influence technology acceptance assessment among users in public service delivery?
5 answers
The factors influencing technology acceptance assessment among users in public service delivery include various key elements. Firstly, factors such as usefulness, service reliability, and security significantly impact users' intent to continue using AI-based services. Additionally, technology readiness factors, performance expectancy, compatibility, security, mobility, and social influence play a crucial role in cloud computing acceptance among public sector users. Moreover, factors like users' risk perception, trust, enjoyment, and innovative nature influence the adoption of Palm Vein biometric authentication devices. Lastly, the overall understanding of digital economy services contributes to the acceptance of the digital economy, emphasizing the importance of end users' perceptions in technology adoption.
How effective is the managing of canteen inventory for reports?
5 answers
The management of canteen inventory is crucial for efficient operations and profitability. Implementing IoT in canteen services can streamline food ordering processes, enhance transparency, and improve bill management. Traditional canteen ordering systems face challenges like lost account details and manual errors, highlighting the need for modernization. Digital management modes, supported by information systems, offer reliability and efficiency in large-scale canteen management, saving resources and aiding decision-making. Analyzing commodity stocks in enterprises, including public catering establishments, through methods like ABC analysis and food-cost analysis, can optimize inventory management, reduce financial risks, and enhance overall efficiency. By leveraging technology, data-driven approaches, and strategic analyses, canteens can effectively manage inventory for insightful reports and improved performance.
AMI in the smart grid
5 answers
The Advanced Metering Infrastructure (AMI) is a crucial component of the smart grid, enabling efficient electricity management. AMI involves measuring, collecting, storing, and analyzing electricity consumption data, facilitating uninterrupted and reliable electricity services by adjusting supply based on user demand. Challenges in AMI implementation include optimizing resource utilization, reducing costs, and ensuring secure communication. To enhance AMI performance, research focuses on communication protocols, such as QoS-aware scheduling models and transmission schemes, to improve data delivery rates and reduce latency. Additionally, the two-way communication model in AMI allows for monitoring grid-edge devices and distributed energy resources, contributing to the evolving power distribution system. Overall, AMI plays a vital role in enhancing the efficiency, reliability, and security of the smart grid infrastructure.