The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study worker selection in spatial crowdsourcing, which is the recruitment of human workers in a specific location to collect geographical data. To achieve better performance, spatial crowdsourcing task relies on both worker’s effort and skill. Therefore, to maximize the long-term platform utility, we exploit fog platform as a service to identify valuable workers through learning...
The growing storage and compute stacks in cloud data centers are expected to accommodate the majority of Internet traffic in the future. However, as the number of mobile devices significantly increases, getting massive data into and out of the cloud wirelessly inflicts high pressure on the bandwidth, and meanwhile induces unpredictable latency. Fog computing, which advocates extending clouds to the...
The use of MapReduce (MR) model has attracted much attention because of the reductions in the costs involved in satisfying the storage and computational demands. However, authentication methods proposed for such model is subjected with rooms for improvements. In the initial design and implementation of the MR model such as Hadoop, issues of security including authentication was not considered. It...
With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own...
The security and privacy of user data has become a major concern in the cloud computing era. Cryptographic solutions based on secure computation outsourcing have been extensively studied in order to protect the security and privacy of user data. However, these solutions either suffer from forbiddingly high computation overhead or are only applicable to certain special classes of computations. In this...
Many application classes, such as archiving, backup of thousands of nodes in an organization, video sharing, etc., require highly reliable and scalable storage systems. Since it is now feasible to build such storage systems with advanced open source technologies, the challenge becomes how to best utilize those technologies to build and operate such a storage system with optimized cost and performance...
In this paper, we propose an electronic mail system, namely VeMail, for handling messages between vehicles and Intelligent Transportation Systems (ITS), to improve the efficiency of transportation management. After elaborating the reasons of using Internet email as a basis of messaging for ITS, we describe the key components of the VeMail system, including mail server, mail client, and mail proxy...
Multiple Level Security (MLS) has always been a center of focus since the usage of computers in military and intelligence systems. Extensive studies have been done on how to utilize virtualization technologies to provide multiple level secured execution in the cloud, yet the general assumption is that all components in the cloud service provider are trusted. With the advanced persistent threats currently...
Wireless communication technology, Internet technology, and standardized transducer interfaces are serving to shape the landscape of next-generation's remote distributed control system. The paper proposes originally to build the DMCS integration use of GPRS and Internet technology. Based on the analysis of function demands of the market for the measurement and control system, the thesis makes sure...
In this paper, we propose a self-protection model based on distributed intelligent agents. The major feather of this model is that autonomic agents can manage themselves given high-level objectives from administers. System can detect attacks and compromise, and recovering from security incidents without human intervention. We describe the model and the existing prototype, as well as some design and...
Traffic engineering (TE) is an interesting application in IP-based networks. TE main objective is to optimize the performance of a network through an efficient utilization of network resources. We study a load balancing in optical networks based on measured link loads. As a result, WDM has become a technology of choice for meeting the tremendous bandwidth demand in the communications infrastructure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.