The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization has been widely used as a key technology in cloud computing. Although facilitating the deployment of applications, virtualization introduces huge processing overheads, among which is network I/O virtualization that has become a critical bottleneck of a virtual system. DPDK-vhost is currently the fastest para-virtualized network I/O backend, however it performs poorly when exchanging...
High fluctuation of signal strength is evident in wireless channel under mobile environment. IEEE 802.11n and IEEE 802.11ac based wireless technologies experience a challenge for selecting link configuration parameters, like number of spatial streams, channel bonding, advanced modulation and coding schemes, frame aggregation etc., dynamically under mobility. Selection of the best possible data rate...
The importance of frequent backups is uncontroversial. Their creation is simpler than ever today thanks to widespread availability of cheap cloud storage. Common backup solutions, however, tend to be either insecure, inflexible or inefficient in typical backup scenarios.,,,,In this paper, we present triviback, a lightweight and almost trivial, yet powerful solution for outsourcing backups to untrusted...
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern network security solutions. They help to detect and prevent network attacks and intrusions. However, they show critical performance problems in today's high speed networks. Filters have been proposed to reduce the amount of traffic to be analyzed by a NIDS, yet, such filters need to be very carefully designed...
This paper studies how to place the least number of sensor nodes to ensure confident information coverage in an area with obstacles, while maintaining the connectivity of the placed nodes. For this constrained optimization problem, we propose a sensor placement scheme based on an improved genetic algorithm with our new problem-specific operations, including the Delaunaytriangulation-based population...
Multi-cloud promises to substantially improve faulttolerance, by tolerating disasters affecting a subset of providers. Unfortunately, multi-cloud solutions are premature and none of them are fully fledged. Their main impediment is the lack of network services: to date, it remains impossible for a customer to setup and control a multi-cloud network. Moreover, manually inter-connecting multiple clouds...
In this paper we analyze the applicability of onion routing on Predictable Delay-Tolerant Networks. We show that a simple approach for providing anonymity through the application of a simple onion routing can be feasible in some scenarios. To that end we evaluate our proposal on a network based on a city public bus transportation network.
Software Defined Networking (SDN) is a new network architecture that separates control plane and data plane. SDN switch models in the literature primarily use queueing theory in two distinct categories: (i) single shared buffer for control plane traffic and data plane traffic, and (ii) buffer with two priorities to isolate control plane and data plane traffic. Several research works have independently...
Recently, the demand for wireless networks to treat periodic traffic is increasing, which includes healthcare wireless sensor networks. This tendency causes the problem of continual packet collisions among different periodic flows. In this paper, we propose a new formula for predicting whether two heterogeneous periodical flows from different source nodes have overlapping packet transfer durations...
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
We propose a privacy preserving mobile advertising system for in-app ad placement, that enables user profiling and targeted ads without revealing user interests to the mobile advertising companies. Our proposal relies on device-based user profiles, derived from app activity, on the use of Private Information Retrieval (PIR) to query ads database(s) for matching (to profile) ads, without the database(s)...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Software Defined Networking (SDN) enables a centralised entity - the controller - to monitor the network’s status by collecting traffic statistics such as packets, bytes, etc. Each statistic is associated with a forwarding table entry (FTE) in a switch whose structure and format is specified by the OpenFlow standard (de-facto SDN standard). For a flow with a FTE, its statistic is easily...
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network...
BTLive is a novel, unique, mesh/push-based peer-to-peer (P2P) live video streaming mechanism. Previous studies show that it achieves significantly lower streaming delays than other approaches but suffers from a high overhead, where peers receive up to 33% duplicate video chunks. Other P2P streaming mechanisms, most of which are either mesh/pull or tree/push-based, do not experience duplicates at such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.