Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

Index

Note: Page numbers followed by f indicate figures and t indicate tables.

A Application layer, 361


Abductive reasoning, 235 Application-level security, 459–460, 469, 470t
Acceleration, 238 APs. See Access points (APs)
Accelerometer, 239f, 240–241, 245f Architecture
Access-control mechanisms, 9 cloud-based application, 450–451
Access points (APs), 195 cryptography-based security, 451–452
dense wireless spaces, 201 encryption-based security, 470
design, 199 location-based security, 469
Accrual FDs, 412 TPA and, 470
Accumulation rate, 422 URI, 450
Accuracy, 397 and VMs, 463
Activity monitoring, 236–237 ARM algorithms. See Association rule mining
Actuator, 256 (ARM) algorithms
Adaptation manager (AM), 400–401 Artificial neural networks (ANNs), 235, 358–359,
and failure detector, 393–394, 400–401 369, 374–375, 379–380
self-healing module, 402–403 Assisted living, 236, 428–429
Adaptors implementation and system deployment, Association rule mining (ARM) algorithms, 366,
118–124, 119f 377
publisher adaptor, 120–122, 121f Association rules
run-time modifications, 124 item, 370
subscriber adaptor, 122–124, 122f itemset, 370
Advanced encryption standard (AES), 11–12 MinSup, 370
Adverse reactions, 263 rule confidence, 370
AE. See Airflow efficiency (AE) rule support, 370
AES. See Advanced encryption standard (AES) support count, 370
AEU. See Air economizer utilization (AEU) Asynchronous, 396–397, 406
Air economizer utilization (AEU), 315 Atomic operations, 163–169
Airflow efficiency (AE), 314 Authentication, users’ authorization and, 457–458,
Air management 468, 468t
efficiency, 330 Automatic drug distributors, 285–286
problems, 321–325 Autonomic computing, 393, 395
Airplane Health Management system, 262 Autonomous systems (AS), 422
Ambient Assisted Living (AAL), 256 Auxiliary
Ambient health monitoring, 237 EWIF index, 317–319
American Society of Heating, Refrigerating, metric, 317
and Air-Conditioning Engineers Average mistake rate, 407, 410–411
(ASHRAE), 357
Angular velocity, 240, 244–245 B
ANNs. See Artificial neural networks (ANNs) Balancing strategies, 168–169
Anonymity, in cloud computing, 10–11 BAN. See Body Area Network (BAN)
Anonymized data, 269–270 Battery
Anonymizers, 3–4 context-aware management system, 451
AnonymousCloud architecture, 16–17, 17f lifetime, 451, 456
operation of, 18f limitation, 456
AnonymousCloud project, 16 power, 445–446
ANOVA method, 366–367 Baysian Inference, 235
Application dependent delay, 182 Beacons, 201–202

499
500 Index

Behavior, user, 452–453, 456 cloud-based applications, 447f, 457


Benchmark, 337, 378–380 communication, 446–447, 456
values for metric, 308–310, 330, 339 message delivery performance, 453
Big Data, 263, 299 network connection, 450–451
stream systems, 396 quality-based service, 447–448
technologies, 363, 371–372, 378–379 user’s privacy, 459
Bio-inspired P2P overlays Chiller efficiency (Ch-E), 314
Honeycomb 2014, 38 Chinese wall model, 7–8, 8f
P2PBA 2011, 37 Chord 2003, 34–36, 35f
Self-CAN 2012, 37–38 CI. See Capture index (CI)
Self-Chord 2010, 37 CICM. See Cross Interference Coefficients Matrix
SPIDER 2015, 38 (CICM)
BitTorrent 2003, 30 CIF/QCIF, 436, 438
Black box steady-state models, 358 Cisco, 276
Black-hole attack, 459, 468–469 City dynamics, PSNs, 63–65, 64f, 65f
Blocked, 162, 165–168 Classical Inference algorithms, 235
blockedew , 180 Classification algorithms, 368–369
Bluetooth, 450 CLF. See Cooling load factor (CLF)
Body Area Network (BAN), 232, 247–248, Client-Server (C/S) streaming model, 418
256–260, 267 Clinical trials, for medical devices, 282–283
Boeing Operations Control Centers, 262 Cloud APIs, 211
Boolean logic, 378 Cloud architecture, 363, 364f
Botnet attack, 463, 471 Cloud-based applications, 445–448, 447f
Bottom-up approach, 377 application-level security, 459–460
Building energy modeling approaches, 357–359 data confidentiality, 464–465
Building energy performance, 354, 357, 379–380 data storage protection, 460–462
Building-related data, 354, 356, 371–382, 372f device constraints, 451–452
Business process model, 264 heterogeneity of networks, 450–451
Busy, 164–165, 179 high mobility of nodes, 449–450
location-related privacy issues, 465–466
C risks in multitenancy, 462–464
CA. See Certification authority (CA) security point of view, 467
CADE index. See Corporate average datacenter unpredictable user behavior, 452–453
efficiency (CADE) index user identity, 458–459
Calibrated simulation approach, 358 users’ authorization and authentication, 457–458
Call centers, technical support, 279–280 Cloud-based solutions
CAP principle, 153 scalability, 462
Capture index (CI), 328–330 usage of, 445, 450, 460
Carbon emission factor (CEF), 317 Cloud computing (CC), 4–5, 333–334, 342–343,
Carbon usage effectiveness (CUE), 317 431
Cardiovascular devices, 265–266 anonymity in, 10–11
CART, 373–374 architecture, 7f
CC. See Cloud Computing (CC) privacy in, 7–10, 8f
CCF. See Cooling capacity factor (CCF) productivity metrics in, 333–334
CDN. See Content distribution network (CDN) reference model, 5–7
CEE. See Coefficient of energy efficiency (CEE) ToR in, 16–22
CEF. See Carbon emission factor (CEF) types, 5f
Certification authority (CA), 15 Cloud provider (CP), 4–6
CFD model. See Computational fluid dynamics Clustering algorithms, 367–368
(CFD) model CODEC, 430
Challenged environment Coefficient of energy efficiency (CEE), 308
battery lifetime, 451 Coefficient of performance (COP), 311–314
Index 501

Cohort, unbalanced, 288 Cooling capacity factor (CCF), 314–315


Complementary data fusion algorithm (CDFA), Cooling load factor (CLF), 310–311
236–237, 242, 244f, 247f Cooling system component, 304, 308, 315
vs. KDFA, 248t Cooling system efficiency (CSE), 311–314
Complementary filter, WBASN, 242 Cooling system sizing (CSS) factor, 314
comparison, 246 Cooling tower efficiency (To-E), 314
on real-time data, 245 COP. See Coefficient of performance (COP)
on test basis, 244–246 Coral 2004, 36
Completeness, 397, 401 Corporate average datacenter efficiency (CADE)
Complex events, detection, 258, 259f index, 319–321
Component CRAC. See Computer room air conditioning
cooling system, 304, 308, 315 (CRAC)
DC, 306, 330–332 Critical resource, 156, 161, 176–179, 181, 184–185
HVAC system, 311, 313t Critical section, 156–158, 160–161, 171–174
power delivery, 304, 308 CRM system. See Customer relationship
Compression, 417, 423f, 430, 436, 438–439 management (CRM) system
Computational constraints, 233 Cross Interference Coefficients, 330–332
Computational fluid dynamics (CFD) model, Cross Interference Coefficients Matrix
thermal metrics, 327–333 (CICM), 332
Computational intelligence, 235 Cross-layer monitoring system, 131
Computer room air conditioning (CRAC), 332–333 CSE. See Cooling system efficiency (CSE)
return temperature index, 327–328 CSS factor. See Cooling system sizing (CSS) factor
thermal metrics, 321, 324–325, 327–328 CUE. See Carbon usage effectiveness (CUE)
Confidence degree, 394, 396 Customer relationship management (CRM) system,
Confidentiality, data, 464–465, 468t, 469 279–280
Consumer, knowledge exploitation, 370–371 Cyber attacks, 287–288
Content addressable network (CAN), structured Cyber-physical system, 97, 255–256
peer-to-peer overlay (2001), 31–33, 32f smart medical devices, 260–262
Content delivery network (CDN), 425–428 Cycloid 2006, 36
Content distribution network (CDN), 131–133,
426, 439 D
establishment of, 420 DailyMotion, 422
Google, 427–428 Data
Hulu’s mechanism, 427 anonymized, 269–270
multimedia, 428 health support, 267–269
Context-aware system medical research, 270–271
delivery manager, 138–141, 140f, 142f quality assurance, 269–270
discovery manager, 143–144, 144f smart medical devices, 266–271, 266f
effective content distribution mechanisms, Data aggregation, WBASN, 233–236, 234f
133–135 Data analytics, smart medical devices
HTTP gateway, 146–147, 147f clinical trials, 282–283
Peer-to-Peer network instantiation inside HB, multiple variants, 286–287
136–138, 137f, 139f problem complexity, 283–284
publishing manager, 141–143, 143f quality, 284–286
service publication/management, 135–136 unbalanced cohort, 288
Streaming Gateway, 144–146, 146f variability, 287–288
Contextual driver, 380 Data analytics technologies
Conventional WiFi stack, 205 benchmarking, 378–380
Converged information-centric space, parameters building energy consumption, prediction,
for, 212–213 372–375
Converged wireless network, 224 energy profiling in buildings, 375–376
Converged wireless space, 204–205 fault detection and diagnosis, 377–378
502 Index

Data analytics technologies (Continued) proposed architecture, 277–280


occupant behavior, 380–382 research institute, 280
physics of, 355f Data integrity
Database management system (DBMS), 362–363 alternative mechanism, 460
Data center infrastructure efficiency (DCiE), 308, during data transmission, 470
310, 319–321 device constraints, 451–452
Data center IT utilization (DCIU), 337 fastening, 460
Datacenter performance efficiency (DCPE), 337 maintaining, 455
Data center performance per watt (DCPpW), 337 securing, 456
Data centers (DCs) Data isolation, 452, 463
components, 306, 307f Data management
electricity consumption, 299, 306 health support, 268–269
element, 315, 325, 332–333 medical, 270–271
energy efficiency, 299 quality assurance, 269–270
concept, 299, 301 stakeholders and interests, 271f
measurement, 299–300 Data mining algorithms, 361
metrics challenges, 338–343 knowledge discovery phase, 367–370
metrics selection, 303–306 Data preparation, 364–365
power/energy metrics, 306–321 Data pre-processing, 364–366
problem statement, 300–303 Data quality, in building management system,
productivity metrics, 333–338, 335t 364–365
thermal metrics, 321–333 Data reduction phase, 366
energy performance evaluation, 299 Data reuse, 267f
environmental impact, 317 Data scaling, 365–366
evaluation, 303 Data segmentation, 366–367
infrastructure, 304, 308–310, 309t, 339–341 Data separation problems, 274–275
life cycle assessment, 319 Data storage
linked nature of systems, 340f application-level security, 459–460
role of, 299 data confidentiality, 464–465
stakeholders, 308, 319, 321, 338 privacy issues, 448
thermal performance, 299–300 location-related, 465–466
Data cleaning process, 365 protection, 460–462, 470
Data confidentiality, 464–465, 468t, 469 risks in multitenancy, 462–464
Data Distribution Service (DDS), 97–98 user identity, 458–459
Data-driven approach, 380 users’ authorization and authentication,
Data-driven modeling, for energy-use evaluation, 457–458
357–358, 357f Data type transformation, 365–366
Data encapsulation, 177, 191 Data-warehouse technology, 363
Data fusion algorithm (DFA), WBASN, 233–236, DBMS. See Database management system (DBMS)
234f DBSCAN. See Density-based algorithms
Data Handover (DHO), 155–156, 176–181, 188, (DBSCAN)
190–191 DCcE. See DC computed efficiency (DCcE)
API model, 176–181, 177f, 178f DC4Cities project, 337, 341–342
cooperation model, 178–179, 179f DC computed efficiency (DCcE), 321
cycle evaluation with asynchronous locks, DCeP metric, 334
186–188, 187f DCiE. See Data center infrastructure efficiency
cycle evaluation with mobility of peers, (DCiE)
189–190 DCIU. See Data center IT utilization (DCIU)
life cycle model, 181, 182f DCnE. See DC network efficiency (DCnE)
request, path, 179–181, 181f DC network efficiency (DCnE), 321
Data integration platforms DCPE. See Datacenter performance efficiency
existing solutions, 276–277 (DCPE)
Index 503

DCPpW. See Data center performance per watt EHR system. See Electronic health record (EHR)
(DCPpW) system
DCs. See Data centers (DCs) Electricity consumption, data centers, 299, 306
DC storage efficiency (DCsE), 321 Electricity production rate (EPR), 315–317
DDS. See Data Distribution Service (DDS) Electronic health record (EHR) system, 255, 258,
Decision tree classifiers, 369 264–265
Defibrillator, 259–260 Electronics disposal efficiency (EDE), 319
Delay tolerant network (DTN) paradigm, 202, 449 Element, DC, 315, 325, 332–333
Demand-side management (DSM) strategies, 358 ELMP algorithm. See Exclusive locks with mobile
Dempster-Shafer Belief Accumulation Theory, 235 processes (ELMP) algorithm
Denial of service (DoS) attack, 14, 464 Empirical approach, 358
Dense wireless networks, 197 Encoding
Dense wireless spaces cloud based encoding, 431
access points, 201 digital video, 429–431
connectivity and congestion in, 197 H.264, 436
connectivity problem, 197–198, 198f identification, 418–419
devices and operation modes, 198–200, 199f non-scalable, 436–437
time slot division method, 202–204 qualities, 423–424
wireless interference and congestion, 200–202 temporal and spatial scalable, 438t
Density-based algorithms (DBSCAN), 367–368 Energy Analyst, knowledge exploitation,
Detection time, 407, 410–411 370–371
performance evaluation, 409 Energy carbon intensity (ECI), 317
Device constraints, 451–452 Energy consumption, building, prediction,
DFA. See Data fusion algorithm (DFA) 372–375
DHO. See Data Handover (DHO) Energy consumption index (ECI), 378
DHO life cycle, 177f, 181, 182f, 184–190 Energy data, collecting and storing, 361–363, 361f
Discrete co-sine transform (DCT), 429 Energy data Management and Mining System,
Distributed hash tables (DHT) CAN overlays, 31 359–361, 360f
DoS attack. See Denial of service (DoS) attack Energy efficiency, 353
Double-blind, 283 in buildings, 357–359
Drivers, 380 Energy efficiency, data centers, 299, 302, 318t
DropBox, ToR with, 18–19, 19f challenges, 338–343
DSM strategies. See Demand-side management concept, 299, 301
(DSM) strategies measurement, 299–300
Dynamic adaptive streaming (DASH), 424–425 metrics
Dynamic inverse models, 358 challenges, 338–343
Dynamic Multipath Onion Router (MORE), 14–15 power/energy, 306–321
productivity, 333–338, 335t
E selection, 303–306
EBM. See Evidence-based medicine (EBM) thermal, 321–333
ECI. See Energy carbon intensity (ECI); problem statement, 300–303
Energy consumption index (ECI) selection, 303–306
EDE. See Electronics disposal efficiency (EDE) Energy harvesting, 256
EDEN system, 384 Energy indicators, 378
Effective content distribution mechanisms, 133–135 Energy Manager, knowledge exploitation, 370–371
Effectiveness, 257, 303 Energy metrics, 303, 305–321
Efficacy, 257 business purposes, 320t
Efficiency, 257 DC broken down into sub-assemblies, 312t
Efficient resource sharing, 132 HVAC system, 313t, 314
E-health monitoring IT level, 322t
smart phones for, 236–237, 236t renewable energy sources, 315, 316t
E-health system, WBASN and, 232–237, 232f whole DC infrastructure, 309t
504 Index

EnergyPlus, 381 F
Energy profiling in buildings, 375–376 FaceBook, ToR with, 19–21, 19f, 20f
Energy reuse factor (ERF), 315–317 Facility efficiency (FE) index, 319–321
Energy saving Facility utilization (FU), 319–321
air-side free cooling, 315 Fail-stop model, 411
IT level equipment, 337 Failure detector (FD), 400–401, 411–412
over-cooling, 330 adaptation manager, 393–394, 400–401
strategies, 299 classification, 397t
Energy signature analysis (ESA) system, features, 401–402
378–379 heartbeat, arrivals estimation, 398–399
Energy simulation programs, 359 impact (see Impact FD)
Energy use intensity (EUI), 373–374 impact factor, 394, 399, 403, 405, 409, 412–413
Energy water intensity factor (EWIF) index, implementation, 398
317–319 message-pattern strategy, 398
ENERWIN, 380–381 motivation scenarios, 399–400
Engineering a commercial product, 262 performance evaluation
EPR. See Electricity production rate (EPR)
average mistake rate, 410–411
Equipment, IT
detection time, 409
formula and acronym, 304
environment, 405–407
power/energy metrics, 306, 308–310,
QoS metrics, 407
314, 319
query accuracy probability, 407–409
productivity metrics, 334, 337–338
set configuration, 407, 408t
RCI, 328
self-healing module, 401–402
scale, 304
status, 394, 403, 409, 411
thermal metrics, 319–328, 330, 332
threshold, 394, 396, 399, 403, 405, 407,
ERF. See Energy reuse factor (ERF)
409, 412
Error control mechanisms, 419
timer-based strategy, 398, 406
Estimation Algorithms, 236, 398–399
trust level, 394, 396, 403, 407–408
ETSI. See European Telecommunications Standards
unreliable (see Unreliable failure detector)
Institute (ETSI)
FastTrack unstructured P2P overlay, 30
EU FP7 Program, 341–342
EUI. See Energy use intensity (EUI) Fault detection and diagnosis (FDD), 355,
377–378
European Telecommunications Standards Institute
(ETSI), 310, 315–317 Fault tolerance, 399, 411
Evidence-based medicine (EBM), 273–274 Fault Tolerant Averaging, 236
EWIF index. See Energy water intensity factor Fault Tolerant Interval Function, 236
(EWIF) index FDA, 282–283
Exclusive locks with mobile processes (ELMP) FDD. See Fault detection and diagnosis (FDD)
algorithm, 156, 161–162, 163f Feature Maps Algorithms, 235–236
atomic operations, 163–168 FE index. See Facility efficiency (FE) index
balancing following fetchcr , 180–181, 182f
departure, 170 fetchew , 182f, 186–187, 191
new insertions, 169–170 FHE. See Fully Homomorphic Encryption (FHE)
token request, 170 Firewalls, 457
balancing strategies, 168–169 Flooding attack prevention (FAP), 464
connecting to the system, 168 Forward approach, 357, 357f
data structure, 162–163 Freenet unstructured P2P overlay, 28, 29f
proof of, 170–172 FU. See Facility utilization (FU)
Exergy balance, 332–333 Full function devices (FFD), 435–436
Exergy-based approach, 332–333 Fully Homomorphic Encryption (FHE), 9–10
Exiting, 165–166, 170, 174–175, 184 Fuzzy logic, 378
Exploratory data analytics algorithms, 354, 367 Fuzzy logic algorithm, 235
Index 505

G H
Gamification-based incentive mechanism, 77 Hadoop, 431
Garbage In, Garbage Out (GIGO), 289 Hadoop distributed file system (HDFS), 431
Gaussian process regression (GPR), 374 Handle, 156, 177, 179–180, 184, 188
GDPR. See General Data Protection Regulation HB. See Home-box (HB)
(GDPR) Healthcare
GEC. See Green energy coefficient (GEC) IoT, 434
General Data Protection Regulation (GDPR), telecare technology, 434
272–273 Health Insurance Portability and Accountability Act
Genetic algorithm (GA), 375 (HIPAA), 273
GET, 424 Health monitoring system, 260–262
G-force, 238 Health support system
Gia 2004, 30 data for, 267–269
Gini index, 369 medical problem, 277
Global positioning system (GPS), 261–262 real-life deployment of, 268
Gnutella unstructured P2P overlay, 29–30 Heartbeat, 399, 405–406, 411–412
Google Flu Trends (GFT), 289 arrivals estimation, 398–399
GOP. See Group of pictures (GOP) inter-arrival times, 408
GOPS, 424 sampling, 406t
GPS. See Global positioning system (GPS) Heat
return heat index, 325–327
grantcr , 182f
supply heat index, 325–327
grantew , 182f, 186–188
Heat power algorithm, 332
GRAS. See Grid reality and simulation environment
Heterogeneity of networks, 450–451
(GRAS)
Heterogeneous, 409
Gravity, 238, 241
Heterogeneous technologies, 99
Gray-box approach, 358–359
High-availability and integrity layer (HAIL),
Green energy, 315–317
461–462
Green energy coefficient (GEC), 315–317
HIPAA. See Health Insurance Portability and
Green Grid
Accountability Act (HIPAA)
DCeP metric, 334, 337–338
Home-box (HB), 131–132, 135
DCPE, 337
Peer-to-Peer network instantiation inside,
metrics, 321 136–138, 137f
power/energy metrics, 310, 315–317 Honeycomb 2014, 38
SpUE index, 321 Hospital centric cure, 231
white paper, 319 HTML 5, 420–421
WUE index, 317–319 HTTP. See Hypertext transfer protocol (HTTP)
Grid reality and simulation environment (GRAS), HTTPS. See Hyper text transfer protocol secure
185–186 (HTTPS)
Group connect, 204–205, 207–210, 208f Human in the Loop, 255–256
vs. 4G infrastructure, 220–222 Humidity, 299
vs. LTE-A spaces, 221f HVAC system
traffic offload function of, 210–211, 211f component, 311, 313t
virtualization technology, 208–209, 209f power/energy metrics, 306, 310–314, 313t
Group of pictures (GOP), 423–424 HVAC system effectiveness (HVACSE ), 314
frame, 429–430 H.264/5 video encoding standards, 429–430
patterns, 436, 438 for LowPANS, 436–438
starting position of first frame, 424 mean bit rates, 438t
structure, 436 non-scalable encoding, 437
Gyroscope, 240–241 Hybrid Peer-to-Peer overlay
Gyroscope accelerometer integration, WBASN, JXTA overlay, 39–40, 40f
240–241 MOPAR, 40
506 Index

HyPeer 2011, 36 IoT6 ecosystem, 108f


Hypertext transfer protocol (HTTP) motivating scenario, 99–101, 100f
filtering issues, 420 Intelligent computer systems, 359
streaming mechanisms with, 418, 420–425 Intelligent data analysis, 354–355
Hyper text transfer protocol secure (HTTPS), Interdisciplinary approach, smart medical devices,
11–12, 18–19 262–265
International Energy Agency (IEA), 353
I Internet
IaaS. See Infrastructure as a Service (IaaS) application protocol, 420
cloud computing, 431
ICD. See Implantable cardioverter defibrillator
C/S streaming model over, 418
(ICD)
ICT. See Information and communication ecosystem, 425–426
technology (ICT) and fluctuations, 439–440
popularization, 417
IDA-ICE, 381
traffic patterns, 426–427
Identity, user, 458–459, 468–469
YouTube, 427–428
Idle, 164, 166–167, 179–181
Internet of Things (IoT), 97, 260
IIS Smooth Streaming, 424, 425f
applications, 433–434
Impact factor
definition, 432
FD, 394, 399, 403, 405, 409
evolution of, 432f, 433f
query accuracy probability, 409
healthcare, 434
Impact FD, 403–405
mobile computing, 432
implementation, 406
safety and security, 434
QoS metrics, 407
surveillance, 434
Implantable cardioverter defibrillator (ICD), 283
transportation, 434
Implantable devices, 285
Internet Protocol (IP) address, 3
Incentives, 453, 457
Interoperability, 258
Inclinometer, 238
Invalid, 165, 182f, 184, 189
Indicator, 301–302, 311, 330–332, 341–342
IoT. See Internet of Things (IoT)
Inductive transfer of energy, 256
IPTV platforms, 133–138
Inertial Measurement Units (IMUs), 237, 239
IT. See Information technology (IT)
Inference algorithms, 235
ITEE metric, 337–338
Information and communication technology (ICT),
ITEU, 337–338
231, 300–301
Information-centric space
parameters for converged, 212–213 J
Information technology (IT) JXTA overlay, 39–40, 40f
component, 304
energy efficiency metrics, 339 K
hardware systems, 304 Kademlia 2002, 33–34
power consumption, 310 Kalman data fusion algorithm (KDFA), 236–237,
power/energy metrics, 308, 322t 244f, 247f
Infrared technologies, 339–341 vs. CDFA, 248t
Infrastructure as a Service (IaaS), 6, 383 Kalman filter, WBASN, 242–243
Infrastructure, DC, 304, 308–310, 309t, 339–341 comparison, 246
Integrating Data for Analysis Anonymization and on real-time data, 245
SHaring (iDASH), 276 on test basis, 244–246
Integration in IoT KDFA. See Kalman data fusion algorithm (KDFA)
integration issues, 101–103, 103f Key Performance Indicator of Task Efficiency
adaptation problem, 102–103 (KPITE ), 310
connection problem, 102 Key performance indicators (KPI), 341–342,
scalability problem, 102 359–361, 378–379
understanding problem, 102 building, 379
Index 507

climate, 379 Mashups, 458


inter-building, 379 Material recycling ratio (MRR), 319
intra-building, 379 Maximum Likelihood, 236
neighborhood, 379 Medical community, 265–266
Kinematic model, 237 Medical data management, 270–271
K-means clustering algorithm, 368, 381 Medical devices, clinical trials for, 282–283
K-medoids, 367–368 Medical statistics, 263
Knowledge discovery process Medical technology, state of the art, 256–258
clustering algorithms, 367–368 Medtech industry, 272
data pre-processing, 364–366 Medtronic Continuous Glucose Monitoring System,
data segmentation, 366–367 284, 285f
framework, 365f Message-pattern strategy, 398
knowledge exploitation, 370–371 Meteorological data, 360–361
Knowledge exploitation, 370–371 Methodology, metrics selection, 303–306
Knowledge layer, 361 Metrics, 303
KPI. See Key performance indicators (KPI) air/water economizer, 311
analysis of, 302
L benchmark values for, 308–310, 330, 339
Lawrence Berkeley National Laboratory (LBNL), challenges, 338–343
308 existing types, 303
Least squares, 236 framework, 303–305, 303t
L-EncDB, 9–10 power/energy metrics, 305
Life cycle assessment (LCA), data center, 319 productivity, 333–338, 335t
Lighting power density (LPD), 311 selection, 303–306
Linked list, 162–165, 167, 171–173, 173f, 174 thermal, 321–333
Liveness, 156–157, 159, 171, 175 M2M. See Machine-to-Machine (M2M)
Location-based social network, 48–49 Mobile ad-hoc networks (MANETs), 208, 208f
Location-related privacy issues, 465–466 Mobile clouds, 196, 208, 210
lockedcr , 182f network, 460, 462–463, 465
lockedew , 180, 182f, 186–187 technology, 445–448
Lock manager, 156, 177–181, 184, 189 Mobile-cloud technology
Long-term traffic flow forecasting (LTFF), 83 integration, 445–446
Low-power wireless personal area networks usage, 446
(LoWPAN) VMs in, 463
bandwidth, 435 Mobile computing, 417
H.264 for, 436–438 Mobile devices
issues, 435 cloud-based applications, 445–446, 447f,
packet size, 435 450–451
LPD. See Lighting power density (LPD) constraints, 451–452
LTFF. See Long-term traffic flow forecasting growth, 445
(LTFF) for information exchange, 446
opportunistic networks, 446–448
M unpredictable user behavior, 452–453
Machine learning techniques, 354 user identity, 458–459
Machine-to-Machine (M2M) Mobile networks
domain, 103–104 PSN, 75–76
interaction, 103–104 urban infrastructure of, 47–48
Magnetometer, 236, 238 Mobile P2P streaming, 428–429
MANETs. See Mobile ad-hoc networks (MANETs) Mobility, 189–190
Man in the middle (MITM) attacks, 465 heterogeneity of networks, 456
Mapping, 178–180 high, 449–450, 454
MapReduce model, 431 and interactions, 446
508 Index

MOPAR, hybrid Peer-to-Peer overlay, 40 O


MORE. See Multipath Onion Router Observational study, 288
(MORE) Occupancy grid, 235–236
Motion capture, 236–237 Occupant behavior, 380–382
Moving Average Filters, 236 OGE. See On-site generation efficiency (OGE)
MPEG4, 424, 429–431 OLF. See Other load factor (OLF)
codecs, 430 On-site generation efficiency (OGE), 315–317
MRR. See Material recycling ratio (MRR) OpenIoT, 98
MSensing Auction incentive mechanism, 76 Open standards, 259
MSensing Platform-Centric incentive Opportunistic networks, mobile device, 446–448
mechanism, 76 Orientation approximation, WBASN, 239–243, 240f
Multidimensional data, 273–274 complementary filtering, 242
Multidisciplinary team, 263 gyroscope accelerometer integration, 240–241
Multi-layer Peer-to-Peer overlay, 38–39, 39f Kalman filter, 242–243
Multi-level architecture, 176–185, 190 Orientation sensing, WBASN, 237–239
Multimorbidity, 273–274 sensor data fusion, layered approach, 237–239,
Multipath Onion Router (MORE), 14–15 238f
Multiple linear regressions (MLRs), 358, 373 Orion Context Broker, 109–110, 120
Multisensory data, 242–243 functionalities, 109t
Multitenancy, risks in, 462–464 with integration layer, 110f
Mutual exclusion, 157–161 Other load factor (OLF), 311
Overall Airflow Efficiency Evaluation Standard, 330

N P
Naimi and Tréhel algorithm, 158–160, 160f,
PaaS. See Platform as a Service (PaaS)
161f
Pacemaker, 261, 283
Near video-on-demand (NVoD), 134–135
Participatory sensor networks (PSNs), 45, 48f
Netflix, 422, 426–429
challenges and opportunities
Networking. See also Cloud-based applications
data sampling, 85
connection, 450–451
large volume of data, 86–87
device constraints, 451–452
privacy, 87–88
heterogeneity of, 450–451
city dynamics, 63–65, 64f, 65f
high mobility of nodes, 449–450 data collection, 62f
mobile APIs, 60–62
PSN, 75–76 applications, 62–63
urban infrastructure of, 47–48 Web Crawler, 62
mobile ad-hoc, 208, 208f data description, 50
opportunistic, 446–448 data sharing, 69f
unpredictable user behavior, 452–453 data stream users’ activities in, 69t
Network scans, 235–236 definition, 46–47
Network virtual environment (NVE), 40 example, 48–49
Nodes functioning, 47–48
attacker, 464 incentive mechanism
communicating, 454 challenges and opportunities, 77–78
data transmission, 465 gamification, 77
foreign-attacked, 469 preliminaries, 74–75
high mobility of, 449–450, 455 reward, 76–77
unpredictable user behavior, 452–453 user cooperation, 75–76, 75f
Non-blocking function, 155, 190 network coverage, 50–54, 51f, 52f, 53f, 54f, 55f
N-to-N approach, 97, 104–105 node behavior, 59, 59f
NVE. See Network virtual environment (NVE) privacy, 87–88
NVoD. See Near video-on-demand (NVoD) properties, 49–60
Index 509

quality of data from Platform as a Service (PaaS), 6, 383


challenges, 79–80 PLF. See Power load factor (PLF)
opportunities, 80–81 Plug-and-Play IP Security (PnP IPSec), 15
preliminaries, 78–79 Postmarket surveillance, 265–266, 288
routines and data sharing, 55–59, 57f, 58f Power consumption, 332, 339–341
sensing interval, 54–55, 56f computing servers, 342–343
social, economic, and cultural patterns, IT, 310
65–67, 67f total facility, 310
temporal dynamics whole infrastructure, 299–300, 303
challenges and opportunities, 73–74 Power delivery component, 304, 308
preliminaries, 71–73, 71f, 72f Power distribution units (PDUs), 311
and vehicular networks Power load factor (PLF), 310–311
challenges and opportunities, 84–85 Power metrics, 303, 305–321, 318t
monitoring events, 82 business purposes, 320t
preliminaries, 81–82 DC broken down into sub-assemblies, 312t
routines and behaviors, 82–83 HVAC system, 313t, 314
traffic management, 83–84 IT level, 322t
Particle filter, 236 renewable energy sources, 315, 316t
Patient centric cure, 231 whole DC infrastructure, 309t
PDE index, 333 Power usage effectiveness (PUE)
PDUs. See Power distribution units (PDUs) definition, 308
Peer-to-peer (P2P), 132 natural extension, 317
Peer-to-Peer Bee Algorithm (P2PBA) 2011, 37 power/energy metrics, 308–310
Peer-to-peer (P2P) overlay networks, 27 productivity metrics, 334
hybrid overlay, 28–30 scalability, 310
instantiation inside home-box, 136–138, 137f, thermal metrics, 332–333
139f P2P. See Peer-to-peer (P2P)
self-adaptive overlays, 36–39 Premarket approval, 257
structured overlay, 31–36 Premarket notification, 257
unstructured overlay, 28–30 Privacy
Peer-to-peer (P2P) streaming, 419, 428 challenges, 448
mechanisms, 419, 428 in cloud computing, 7–10, 8f
mobile, 428–429 issues
Peer-to-peer (P2P) WiFi, 200 due to networking and functional challenges,
capability, 205f 455t
connections, 196 location-related, 465–466
design, conventional vs., 206–207, 206f in mobile opportunistic/cloud-based networks,
stack, 206, 215–216, 225 465–466, 468t, 470t
Performance mobile opportunistic networks, 448, 453–454,
cloud-based solutions, 460 455t, 461, 466–467
coefficient of performance, 311–314 leakage, 449
data forwarding, 459 protection, 274, 276
DCPE, 337 PSNs, 87–88
message delivery, 453, 456–457, 469 vs. quality of research, 272–276
thermal, 299–300, 303 risks, 454
Personal weather stations (PWS), 360–361 Privacy-as-a-Service, 9–10
Physical activity monitoring, 236 Processes’ relevance, FD, 400–401, 411–412
Physical driver, 380 adaptation manager, 393–394, 400–401
Physiological driver, 380 classification, 397t
PKI certificate. See Public key infrastructure (PKI) features, 401–402
certificate heartbeat, arrivals estimation, 398–399
PlanetLab, 394–395, 405–407 impact (see Impact FD)
510 Index

Processes’ relevance, FD (Continued) control layer, 117


impact factor, 394, 399, 403, 405, 409, 412–413 entity layer, 117–118
implementation, 398 challenges and open issues, 106–107
message-pattern strategy, 398 domain model, 110, 111f
motivation scenarios, 399–400 integration layer, 108–109
performance evaluation PUE. See Power usage effectiveness (PUE)
average mistake rate, 410–411 Pump, 304, 308
detection time, 409 Pumping efficiency, 314
environment, 405–407
QoS metrics, 407 Q
query accuracy probability, 407–409 QCIF format, 438
set configuration, 407, 408t QoS metrics, impact FD, 407
self-healing module, 401–402 Quality assurance, data for, 269–270
status, 394, 403, 409, 411 Quality of research, privacy vs., 272–276
threshold, 394, 396, 399, 403, 405, 407, Quality (SNR) scalability, 430
409, 412 Query accuracy probability, 407, 412–413
timer-based strategy, 398, 406 detection time and, 409
trust level, 394, 396, 403, 407–408 performance evaluation, 407–409
unreliable, 396–399 threshold and, 408f
Productivity metrics, 306, 333–338, 335t
power usage effectiveness, 334
Program in Placebo Studies & Therapeutic
R
Rack cooling index (RCI), 328
Encounter (PiPS), 273–274
Rack power density (RPD), 321
Progressive download
Random early detection (RED), 419
DASH, 424–425
Randomized control trial (RCT), 283
HTTP, 420, 423–424 Read manager, 179, 188–189
Project, DC4 Cities, 337, 341–342 Read write locks for mobile processes (RW-LMP)
Proprietary standards, 259 algorithm, 156, 172
Protocol entering the critical section, 173
dynamic routing, 451 handling requests in linked-list, 172–173, 173f
HTTP, 418, 421 leaving the critical section, 173–174
IPv6, 435 leaving the system, 174–175, 175f
multicast, 419 proof of, 175–176
routing, 435 Real-life environment, 449, 452–453, 456
RTP, 418–419 Real-time control protocol (RTCP), 418–419,
RTP/RTCP, 418, 439–440 439–440
streaming, 418 Real-time transport protocol (RTP), 418–419,
TCP, 420 439–440
UDP, 418–419 Recirculation index (RI), 328–330
Prototype-based algorithms, 367–368 Reduced function devices (RFD), 435–436
PSNs. See Participatory sensor networks (PSNs) Redundancy, 399
Psychological driver, 380 Regression-based systems, 379–380
Public cloud environment, 457, 463 Release consistency model, 154
Public key infrastructure (PKI) certificate, 11 Reliable Abstract Sensing, 235–236
Publish/subscribe (P/S) framework, 97, 105–107 Renewable energy impact, 339
adaptors design, 109–116, 109t, 110f, 111f Renewable energy sources (RES), 315
behavior dimension, 115–116 reqcr , 182f
interaction dimension, 113–115, 114f reqew , 179, 182f
structure dimension, 111–113 Requesting, 164, 179
adaptors implementation and deployment, 116, RES. See Renewable energy sources (RES)
118f Research Domain Criteria (RDoC) Project, 273–274
boundary layer, 116–117 Resource-freeing attacks (RFAs), 463
Index 511

Resource manager, 177, 184–185 Self-service cloud (SSC) model, 463


Resource-related challenges, 462–464 Self-validated public data distribution (SvPDD)
Responsible disposal, 319 protocol, 15
Return heat index (RHI), 325–327 Sensing layers
Return temperature index (RTI), 327–328 challenges and opportunities, 70–71
RFD. See Reduced function devices (RFD) framework for integration of multiple layers,
RHI. See Return heat index (RHI) 68–70
RI. See Recirculation index (RI) preliminaries, 68
Risks Sensor data, 268
in multitenancy, 462–464 fusion, layered approach, 237–239, 238f
privacy, 454 open source information, 360–361
security, 454–455, 458, 460–461 Sensor integration, 233
Root of the tree, 158–159, 162, 167, 171–172 Sensor network, proliferation of, 354
RPD. See Rack power density (RPD) Sequential consistency model, 154
RTCP. See Real-time control protocol (RTCP) Servers, 333, 337, 342–343
RTI. See Return temperature index (RTI) Service Level Agreements (SLAs), 383–384
RW-LMP algorithm. See Read write locks for Service Oriented Architecture (SOA) paradigm,
mobile processes (RW-LMP) algorithm 106–107
Service providers (SPs), 131, 133–134
S Set top boxes (STB), 133
SaaS. See Software as a Service (SaaS) SHI. See Supply heat index (SHI)
Safety, 156, 158–159, 171, 175, 191 Short-term traffic flow forecasting (STFF), 83
Safety margin, 398, 407, 409 Single Connect communication paradigms,
Sampling frequency, 356, 356f 207–208, 208f
Samsung Simband, 276 Single-sign-on technique, 457–458, 468
Scalable video encoding (SVE), 430–431, 433–434, SkipNet 2003, 36
436–438 Smart City, 300, 341–342
Secure socket layer (SSL), 13–14, 461–462 cluster collaboration, 342t
Security issues, 446–448, 450, 455t IoT applications in, 433, 433f
Security risks, 454–455, 458, 460–461 Smart City Cluster, 341–342
Security threats, 448, 456 Smart medical devices
Self-adaptive overlays, bio-inspired P2P overlays, adoption of, 258–260
36–37 challenges for data analytics, 282–288
Honeycomb 2014, 38 clinical trials for, 282–283
P2PBA 2011, 37 complex events, detection, 258, 259f
Self-CAN 2012, 37–38 current information sources, 290–291
Self-Chord 2010, 37 Cyber-Physical Systems, 260–262
SPIDER 2015, 38 data, 266–271, 266f
Self-CAN 2012, 37–38 data collection, 269–270
Self-configuring, 395 data integration platforms
Self-healing, 393, 406–407, 411 existing solutions, 276–277
goals, 395–396 proposed architecture, 277–280
new challenges to design, 396 research institute, 280
property, 395–396 designing and operating, 255–256
Self-healing module, 401f distributing, 259–260
adaptation manager, 402–403 environment, 261f
class model, 402f evaluation, 265
components, 393–394, 400–401 goal of, 267
failure detector, 401–402 interdisciplinary approach, 262–265
Self-Managed Cell (SMC), 411 mentality mismatch, 262–265
Self-optimization, 395 multiple variants, 286–287
Self-protection, 395 postmarket surveillance, necessity of, 265–266
512 Index

Smart medical devices (Continued) Coral 2004, 36


primary/secondary use, 266–271 Cycloid 2006, 36
privacy vs. quality of research, 272–276 HyPeer 2011, 36
problem complexity, 283–284 Kademlia 2002, 33–34
quality, 284–286 SkipNet 2003, 36
responsibility for published results, 289–290 Tapestry 2004, 36
software applications and, 256 taxonomy, 41t
stakeholders and their interests, 271–272 Viceroy 2002, 36
stream distribution, 281–282 Subsets, 399–401, 403, 412
stream processing, 280–281 SUN Microsystems, 321
and telemedicine systems, 258 Supply heat index (SHI), 325–327
variability of, 287–288 Support vector machines (SVM),
Smartphones and apps, 286 374–375
Smart phones for e-health monitoring, 236–237, classifiers, 368–369
236t Support vector regression (SVR), 374
Smart textiles, 256 Surveillance systems, 434
Sniffing attack, 463 Survey data, 362
Social collaborations, user’s, 446 Suspected, 394, 397, 405, 409
Social driver, 380 SVE. See Scalable video encoding (SVE)
Social media, 46–49, 289 SvPDD protocol. See Self-validated public data
Social network, location-based, 48–49 distribution (SvPDD) protocol
Social wireless network, WDHs in center of, SVR. See Support vector regression (SVR)
214–216 SWaP. See Space, watts, and performance (SWaP)
Software as a Service (SaaS), 7 Swiss cloud, 275–276
Software-based systems, 261 Sybil attacks, 450
Space usage effectiveness (SpUE) index, 321 Symbolic Aggregate approXimation (SAX), 376
Space, watts, and performance (SWaP), 321 Synchronous systems, 396–397
Spatial scalability, 430 SYN cookie, 14
SPIDER 2015, 38 System
SPs. See Service providers (SPs) cooling, 314
SpUE index. See Space usage effectiveness (SpUE) within DC, 340f
index economizer, 315
Spurious correlations, 282 HVAC (see HVAC system)
SSL. See Secure socket layer (SSL) support, 306
Stakeholders System integration (SI), 101
data centers, 308, 319, 321, 338
and interests, 271–272 T
State concept, 156, 163–165 Tapestry 2004, 36
Statistical regression models, 359 TCP protocol
Status, 394, 403, 409, 411 congestion control algorithms, 422
Steady-state inverse models, 358 sending rate of, 419
STFF. See Short-term traffic flow video streaming, 418, 420
forecasting (STFF) TDHO , 170–172, 187f, 188–189, 189f
Storage Technical support
data (see Data storage) call centers, 279–280
data integrity at, 455 configurators, 278–279
and device processing power, 451 operators, 279
Store and forward information, 446 subunits, 278f
Stream distribution, smart medical devices, 281–282 Technologies
Stream process, smart medical devices, 280–281 ICT, 300–301
Structured Peer-to-Peer overlay, 31 information
CAN 2001, 31–33 component, 304
Chord 2003, 34–36, 35f energy efficiency metrics, 339
Index 513

hardware systems, 304 ToR. See The Onion Router (ToR)


power/energy metrics, 308, 322t Total Compute Capacity, 337
infrared, 339–341 Tower of Babel, 300
Telemedicine, 258, 260 Traffic offload function of group connect, 210–211,
Temporal scalability, 430 211f
Test set, 368–369 Training set, 368–369
The Onion Router (ToR), 3–4, 11 Transcoding, 431
attacks against, 13–14 Transparent distributed data management
in cloud computing, 16–22 connection and disconnection at application level,
connection/circuit setup in, 12–13 184
cryto-encapsulation, 13f contributions, 155–157
denial of service attack, 14 DHO
with DropBox, 18–19, 19f API model, 176–181
in existing implementations, 15–16 cooperation model, 178–179, 179f
with FaceBook, 19–21, 19f, 20f cycle evaluation with asynchronous locks,
network, 11–12, 12f 186–188, 187f
timing attack, 14–15 cycle evaluation with mobility of peers,
ToR Cloud Project, 16 189–190
website fingerprinting attack, 15 deviation from normal DHO cycle, 184–185
with YouTube, 21–22, 21f life cycle model, 181, 182f
Thermal influence indices, 330–332 request, path, 179–181, 181f
Thermal management multi-level architecture and data abstraction, 176
air performances, 302, 305, 325 mutual exclusion, 157–161
data centers, 321–325, 326t algorithm, distributed, 158
renewable energy sources, 315 Naimi and Tréhel algorithm, 158–160, 160f,
Thermal metrics, 305, 321–333 161f
air by-pass problems, 324 simultaneous requests, 160–161
air management problems, 324–325 objectives, 155
air recirculation problems, 324 observed delays, 182
CFD model, 327–333 shared and exclusive requests, 188, 189f
classification, 325 Transportation, IoT, 434
global thermal management, 326t Transport layer security (TLS), 461–462
global vs. local, 325, 330 protocol, 12
to investigate “glocal” aspects, 331t Trust
local phenomena, 329t mechanisms, 449
power usage effectiveness, 332–333 service providers, 472–473
Thermal performance, data centers, 299–300, 303 Trusted, 394, 397, 401, 403, 407, 411–412
Threats, security, 448, 456 Trusted platform module (TPM), 465–466
3G/LTE spaces vs. WDH, 222–224 Trust level, 394, 396, 403, 407–408
Threshold, 396, 399, 405, 412 TSDMA. See Time slot division multiple access
detection time, 409 (TSDMA)
Impact FD, 403–405 TWait , 182, 186, 187f, 188
input parameter, 394 TWblocked , 182, 186, 187f, 188
query accuracy probability, 407–409
sets and, 404t U
Timer-based strategy, 398, 406 Ubiquitous, 402–403, 405, 411
Time series data, 376 computing, 393, 395
Time slot division multiple access (TSDMA), 202 environment, 411–413
vs. traditional wireless access, 203f, 204f WSNs, 399–400, 400f, 403
Tlocked , 182, 188, 189f UDDI. See Universal Description, Discovery and
TLS. See Transport layer security (TLS) Integration (UDDI)
Top-down approach, 377 UDP, video streaming, 418–419, 439–440
514 Index

Unbalanced cohort, 288 content delivery networks, 425–428


Uniform resource identifier (URI), 450 encoding, 429–431
Uninterruptible power supplies (UPSs), 311 with HTTP, 420–425
Universal Description, Discovery and Integration IoT, 432–434
(UDDI), 135–136 low power personal area networks, 435–438
Unlock, 180 neighbors, 419–420
Unpredictable user behavior in mobile, 452–453 P2P streaming, 428–429
Unreliable failure detector, 393, 396–399, 403 Video Transcoding Systems, 431
accuracy, 397 Virtual machine monitors (VMMs), 462–463
completeness, 397 Virtual machines (VMs), 6f, 463–464, 466
Unstructured multisource multicast (UMM) Virtual resource, in cloud-based environment,
2010, 30 465–466
Unstructured Peer-to-Peer overlay, 28 Virtual wireless user (VWU), 208–209
BitTorrent 2003, 30
FastTrack 2006, 30
Freenet 2001, 28, 29f
W
Water economizer utilization (WEU), 315
Gia 2004, 30
Water pump efficiency (WP-E), 314
Gnutella 2002, 29–30
Water usage effectiveness (WUE) index,
taxonomy, 41t
317–319
UMM 2010, 30
Water usage effectiveness source (WUESource)
Unsupervised data mining algorithms, 365
metric, 317–319
Upsite Technologies, 314–315
WBASF. See Wireless body area sensor fusion
UPS-LF. See UPS load factor (UPS-LF)
(WBASF)
UPS load factor (UPS-LF), 311
WBASN. See Wireless Body Area Sensor Network
UPSs. See Uninterruptible power supplies (UPSs)
(WBASN)
UPS system efficiency (UPS-SE), 311
WDHs. See Wireless data hubs (WDHs)
Urban computing, 45, 70
Wearable device, 284–285
Urban social behavior, 58–60, 67, 85
Web
URI. See Uniform resource identifier (URI)
content delivery networks, 426–427
User behavior, unpredictable, 452–453, 456
digital content and services, 425–426
User identity, 458–459
HTTP, 420–421
User-programmable devices, 286
Web-based interface, 459
Users’ authorization and authentication,
Web Crawler, 62
457–458
Web Services Discovery Architecture (WSDA),
Users, knowledge exploitation, 370–371
135–136
Website fingerprinting attack, 15
V WEU. See Water economizer utilization (WEU)
Valid, 180, 184–185 Wide area network, communication, 267
Vehicular Networks (VANETs) and PSNs Wi-Fi, 471–472
challenges and opportunities, 84–85 Wireless body area sensor fusion (WBASF),
monitoring events, 82 236–237, 244–248
preliminaries, 81–82 Wireless Body Area Sensor Network (WBASN),
routines and behaviors, 82–83 231
traffic management, 83–84 data aggregation and data fusion, 233–236,
Vendor-independent research institute, 280 234f
Viceroy 2002, 36 data fusion algorithms, 235–236, 235f
Video compression, 417 and e-health systems, 232–237, 232f
Video frames, 419, 431 orientation approximation, 239–243, 240f
Video on demand (VoD), 131–133, 135 complementary filtering, 242
Video streaming gyroscope accelerometer integration,
architectures, 418–420 240–241
cloud computing, 431 Kalman filter, 242–243
Index 515

orientation sensing, 237–239 Wireless traffic offload


sensor data fusion, layered approach, 237–239, conventional vs. P2P WiFi design, 206–207, 206f
238f group connect, 204–205, 207–210, 208f
smart phones for e-health monitoring, 236–237, traffic offload function of, 210–211, 211f
236t virtualization technology, 208–209, 209f
Wireless data hubs (WDHs), 196, 209–210, two wireless stacks, 205–206, 205f
212–214, 213f Wireless virtualization, 209, 209f
boxes using manager with a smartphone, 216, Workload
216f artificial, 337
in center of social wireless network, 214–216 data centers and, 301
deployment models, 219–220 scheduling, 339–341
vs. 3G/LTE spaces, 222–224 WPANs. See Wireless personal area networks
group connect and, 219–220 (WPANs)
modeling and performance analysis WP-E. See Water pump efficiency (WP-E)
mobility traces and throughput datasets, WSDA. See Web Services Discovery Architecture
217–219, 217f (WSDA)
no-wires WDH space maintenance, 216 WSNs. See Wireless sensor networks (WSNs)
WUE index. See Water usage effectiveness (WUE)
parameters for converged information-centric
index
space, 212–213
WUESource metric. See Water usage effectiveness
role, 215f
source (WUESource) metric
Wireless local access networks (WLANs), 197
Wireless networks, 417, 428, 435
Wireless nodes, 286 Y
Wireless personal area networks (WPANs), 231 YouTube, 420–425, 426f
Wireless sensor networks (WSNs), 45, 47, 234–235, ToR with, 21–22, 21f
433–434
ubiquitous, 399–400, 400f, 403 Z
Wireless stacks, 205–206, 205f Z-score index, 378

You might also like