The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, load balancing is defined as the process of allocating workload to reduce the mean job waiting time. In a distributed multi-server system, load balancing is a challenging task if there is no central coordination or time-synchronization among users. In this paper, we present a queuing model for a distributed asynchronous multi-server system. To realize load balancing, we propose a distributed...
Organizations and individuals nowadays are more and more willing to outsource their data to save storage and management costs, especially with the push of cloud computing which offers both storage and computation scalability. However, the data, once being released to a server, is no longer under its owner's control, and its privacy and security herein become a primary concern. To this end, users usually...
NoSQL (Not only SQL) data stores become a vital component in many big data computing platforms due to its inherent horizontal scalability. HBase is an open-source distributed NoSQL store that is widely used by many Internet enterprises to handle their big data computing applications (e.g. Facebook handles millions of messages each day with HBase). Optimizations that can enhance the performance of...
Secure and efficient data storage and computation for an outsourced database is a primary concern for users, especially with the push for cloud computing that affords both compute and resource scalability. Among the diverse secure building blocks for secure analytical computations on outsourced databases, the encrypted set intersection operation extracts common sensitive information from datasets...
Solid State Drives (SSDs) based on NAND flash have been widely studied. Most related works focus on improving SSDs' performance. Many novel techniques have been proposed to achieve this goal. In this paper, we don't focus on any given technique, but explore several principles to design an SSD. Beforehand, we build an analytical model for SSDs by resorting to queueing theory. The model covers most...
As more and more individuals have multiple computing devices, how to maintain the consistency of user files stored on multiple devices becomes a challenge. Cloud-based file synchronization services (FSS), e.g., Drop box and iFolder, are promising approaches. However, we haven't seen any public documents discussing the consistency protocol, which plays a vital role in any FSS. This paper focuses on...
The key techniques to implement system for mine gas disaster prevention are introduced. Based on the sensitive indexes of predicting coal and gas outbursts, the reasoning knowledge models for the regional prediction and working face prediction of coal and gas outbursts are built. Making advantage of the developing tool of SuperMap Objects, an integrated system based on GIS for mine gas disaster prevention...
Storage systems are more distributed and more subject to attacks. One basic security requirement is to authenticate the stored data. This paper describes SDI-MAC, a static, dynamic and incremental MAC combined approach to guarantee end-to-end data integrity to clients in distributed data storage environment. SDI-MAC associates two different integrity codes to different granularities of the stored...
The time based feature facilitates the new opportunity to understand the network user behaviors. Research on user behavior patterns varying with time is a hot point recently. In multi-dimensional mining of user profiles, time division contributes to decline the complexity of data process. Time division consistent with user on-line regularities is significant to obtain accurate user behavior information...
This paper designs a framework for the new media services platform in China. By analyzing the functions of key modules, we establish an ontology semantic framework for description and organizing the heterogeneous new media resources of data, data flows, streams, and rules of the services detected from the user interactions context and node trust evaluation. Also we establish an optimal model for RSS...
Enterprise legacy systems contain a great reuse value, how to make good use of these systems actively has become a hot spot of software engineering. In this paper we mainly study the reuse of enterprise legacy systems based on Web service, and a college credits and tuition calculating system is used as a case study throughout this paper to expand on the methods and ideology of reusing legacy systems.
This paper studies the methods and strategies of the network update of the land survey spatial data based on embedded terminal equipment and server and application of multi-level distributed heterogeneous land spatial database.Web services network model has been used to do the design and implementation work of embedded system of land survey data update. The main procedure of spatial data real-time...
This paper takes at a possible abstract application, which can use WPKI for its security. This will help demonstrate how WPKI can provide security services to other applications with similar security requirements and also provide the reader with a high level technical understanding of WPKI. Then the security requirements for this particular application will be discussed prior to an in-depth analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.