The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, the demand of low cost large scale storage increases. We developed VLSD (Virtual Large Scale Disks) toolkit for constructing virtual disk based distributed storages, which aggregate free spaces of individual disks. However, in order to construct large-scale storage, more than or equal to 3 fault tolerant RAID is important. In this paper, we propose MeshRAID that is 3 fault tolerant orthogonal...
Many public-key cryptographers have recently focused on cryptographic schemes based on pairing, which is a bilinear map from two elliptic curve groups to a group in an extension field. In order to provide efficient pairings, several kinds of pairing-friendly curves have been proposed. Since most of the pairing-friendly curves are defined over a certain extension field, arithmetic operations in extension...
Recently, wireless LANs are spread rapidly. It is excellent at their mobility, portability and easy installation. These advantages are suitable for use it as disaster information networks. However, in the actual disaster case, electric power line is also damaged and those wireless LANs cannot be functioned. In this paper, we introduce a power saving wireless LANs for disaster use with combination...
The dynamic nature of mobile ad-hoc networks (MANETs) can easily lead to data being inaccessible due to constant route changes and network partitions. One method often used for increasing reliability and availability of data is replication. However, replication comes with costs, those of transferring and storing data and keeping track of consistency between replicas. For that reason, we have identified...
We have to reduce the total electrical power consumption in information systems. In this paper, we consider communication based applications where a server transmits a large volume of data to a client like file transfer protocol (FTP). We discuss a power consumption model for communication-based applications, where the total power consumption of a server depends on the total transmission rate and...
Wireless and in particular 802.11 is one of the major technologies for accessing the Internet at home, in coffee shops or other public places, and in enterprises and university campuses. While most recent work on modeling wireless sites focuses on user mobility, this paper presents and compares a number of models for characterizing access point (AP) usage; moreover, rather than looking at throughput...
The mobile Internet has come to permeate into everyday life. It is expected to accommodate a larger part of the digital economy in the near future. Mobile digital ecosystems have more complicated dynamisms due to the mobile-specific dependencies among their stake-holders. The author presents a framework for mobile digital ecosystems with an entity model, a dynamics model, and an acceptance model....
In recent years, MANETs are continuing to attract the attention for their potential use in several fields such as military activities, rescue operations and time-critical applications. In this paper, we present the implementation and analysis of our implemented MANET testbed considering AODV and OLSR protocols for wireless multi-hop networking. We investigate the effect of mobility and topology changing...
Any trials to reduce carbon dioxide emissions are performed as global warming countermeasures. We use sensors and record the life environment in the indoor. In a house, the sensors measure the temperature, humidity, intensity of illumination, the existence of person, and the door opening/closing state. The measured elements are related to human action and living environment closely. A life log is...
In current content delivery service, contents are usually encrypted for access control mechanism, so several key distribution schemes have been proposed. In this paper, we propose a new key derivation scheme for hierarchy-based access control. We assume that content consumers are listed in digraph structure, and all nodes are assigned seeds(pre-keys) for decryption keys. All decryption keys are generated...
In VANETs and MANETs, the topology of the network changes very often, therefore implementation of efficient routing protocols is very important problem. In MANETs, the Random Waypoint (RW) model is used as a simulation model for generating node mobility pattern. On the other hand, in VANETs, the mobility patterns of nodes is restricted along the roads, and is affected by the movement of neighbour...
Geiselmann and Steinwandt proposed an ASIC based hardware design “YASD” for the sieving step in the number field sieve (NFS) method of integer factorization in 2004. The design is attractive since its regular structure seems suitable for implementation, however, performance valuation for 1024-bit integers has not been provided. This paper firstly evaluates the performance of YASD for 1024-bit integers...
Grid computing assists people to accomplish collaborative tasks and hides complex processes from them. In such environments, transaction management is one of core technologies, guaranteeing the system consistency in face of various failures. In this paper, we proposes a Grid transaction development kit (GridTDK) for programming reliable applications. GridTDK has the three advantages. Firstly, it separates...
The real-world applications of ocean acoustic field computations present serious computational requirements for high performance computing technologies. At the same time, more and more engineers and researchers are using parallel processing technologies to improve computational performance using emerging parallel hardware architectures. In this paper, we introduce latest parallel computing technologies...
Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily met with each other physically. In a broad sense Quality of Service assessments could be...
A wireless sensor network (WSN)consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor is communicated to the base station, which forwards the data to the end user. Clustering is introduced to WSNs because it has proven to be an effective approach to provide better data aggregation and scalability...
Wireless sensor networks are specific adhoc networks. They are characterized by their limited computing power and energy constraints. This paper proposes a study of security in this kind of network. We show what are the specificities and vulnerabilities of wireless sensor networks. We present a list of attacks, which can be found in these particular networks, and how they use their vulnerabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.