scispace - formally typeset
Search or ask a question
Topic

Shared resource

About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.


Papers
More filters
Journal ArticleDOI
TL;DR: The proposed access control model provides a quick and efficient authorization decision support for administrators in collaborative domain and ensures a secure access in resource sharing in MIoT.
Abstract: Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration. Access control in resource sharing is very important for MIoT operation safety. This paper presents an access control model for resource sharing based on the role-based access control intended for multidomain MIoT. In multidomain systems, in order to response on the assigning request for permission for the certain role from the certain user, an authority action sequence named the authorization route is employed to determine an appropriate authorization state. In this paper, the best authorization route with the least spread of permissions is defined as an optimal authorization route. We employed an intelligent planning theory to model the authorization route problem and to develop a solution algorithm called PGAO*, which can support external evaluation of both single-goal-role authorization routes and multi-goal-role authorization routes. In addition, some simple policies for solving the authorization route problem are presented. The proposed access control model provides a quick and efficient authorization decision support for administrators in collaborative domain and ensures a secure access in resource sharing in MIoT.

62 citations

Journal ArticleDOI
TL;DR: In this article, the critical sequence, defined as the set of activities which are connected by technology and/or resource sharing, is suggested as an alternative to the critical path, and an algorithm based on existing computer software is suggested for identifying a critical sequence.

62 citations

Journal ArticleDOI
TL;DR: The exNode is introduced, a data structure that aggregates storage allocations on the Internet and follows a very simple philosophy, very similar to the Internet Protocol, and the resulting semantic might be too weak for some applications.

62 citations

Journal ArticleDOI
TL;DR: By indicating the level of congestion and the user tolerance of it in their networks, congestion pricing can inform operators about when to re-provision and increase network capacity.
Abstract: Network congestion is a fundamental problem facing Internet users today. A network where users are selfish, and thus reluctant to defer to other users, may result in the famous "tragedy of the commons", where, in the absence of controls, a shared resource is overconsumed by individuals who consider only their personal costs and not the cost to society as a whole. In terms of the Internet, the "tragedy" could be viewed as congestive collapse, resulting from overconsumption of the shared network resource. It is important to distinguish congestion pricing from other forms of network pricing. Charging network users for the congestion they cause can lead to more efficient network utilization by forcing them to take social costs into account. In a congestion-pricing framework, the congestion charge would replace usage and QoS charges. Users would pay their ISPs a subscription charge to cover fixed costs and a congestion charge only when appropriate. This pricing scheme is feasible because, in the absence of congestion, the marginal cost of a network link is practically zero. Congestion pricing can also benefit network operators. By indicating the level of congestion and the user tolerance of it in their networks, congestion pricing can inform operators about when to re-provision and increase network capacity.

62 citations

Journal ArticleDOI
TL;DR: Overall, the results of the study suggest that MeshChord can be successfully utilized for implementing file/resource sharing applications in wireless mesh networks.
Abstract: Wireless mesh networks are a promising area for the deployment of new wireless communication and networking technologies. In this paper, we address the problem of enabling effective peer-to-peer resource sharing in this type of networks. Starting from the well-known Chord protocol for resource sharing in wired networks, we propose a specialization that accounts for peculiar features of wireless mesh networks: namely, the availability of a wireless infrastructure, and the 1-hop broadcast nature of wireless communication, which bring to the notions of location awareness and MAC layer cross-layering. Through extensive packet-level simulations, we investigate the separate effects of location awareness and MAC layer cross-layering, and of their combination, on the performance of the P2P application. The combined protocol, MeshChord, reduces message overhead of as much as 40 percent with respect to the basic Chord design, while at the same time improving the information retrieval performance. Notably, differently from the basic Chord design, our proposed MeshChord specialization displays information retrieval performance resilient to the presence of both CBR and TCP background traffic. Overall, the results of our study suggest that MeshChord can be successfully utilized for implementing file/resource sharing applications in wireless mesh networks.

62 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Software
130.5K papers, 2M citations
80% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202381
2022194
2021223
2020298
2019381
2018373