The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose using an approach based on the system-level programming language SystemJ extended with service oriented features, called SOSJ, to design dynamic interoperable software systems. The approach abstracts and integrates the worlds of automation and robotics systems by using a simple service interface based on abstract objects within SOSJ. We demonstrate our approach in a real-life...
With the explosive growth of mobile user in Massively Multiuser Virtual Environments (MMVE), it faces a challenge, how to deal with the request of rapid growth and reduce traffic to shorten the response time. Fog computing is a novel solution to free users from the requirement of hardware. We introduce a tree network to manage connecting layer in fog computing, which is termed as CAN (content-addressable...
In this paper, we present a home sleep care system to monitor function of activity measurement and sleeping position estimation via vision-based algorithms. The outcomes are integrated in a telecare middleware with a hierarchical software stack and visualized by a structural subsystem. Since smart TVs play an important role in home tele-healthcare system, we centralize and display additional sleep...
Energy consumption imposes a significant cost for data centers; yet much of that energy is used to maintain excess service capacity during periods of predictably low load. Resultantly, there has recently been interest in developing designs that allow the service capacity to be dynamically resized to match the current workload. However, there is still much debate about the value of such approaches...
With the technology of geographic information system (GIS) developing and the application of enterprise-level GIS gradually wide, it is necessary to build the high-availability spatial database. Now there are not commercial spatial database software which can realize the high-availability. The paper proposes the architecture of high-availability spatial database based on popular object-relation database...
Heterogeneous Computing is becoming an important technology trend in HPC, where more and more heterogeneous processors are used. However, in traditional node architecture, heterogeneous processors are always used as coprocessors. Such usage increases the communication latency between heterogeneous processors and prevents the node from achieving high density. With the purpose of improving communication...
Anonymity is an important feature in many two party communication systems. Its main meaning is that either the message sender or the receiver (or both) is unidentifiable to other users, even between themselves. Many mechanisms have been proposed to hide the identity of the sender, receiver, or both. Similarly, anonymity is an important feature in multi-party computing environments, but, little research...
It is challenging to establish accurate mathematical models for complex systems, and experiments on them are generally costly or even impossible, making it difficult to analyze, control, and manage them. The ACP approach provides a way to attack this difficulty. However, with the agent technologies for the A (artificial societies) part, the burdens from computing agent behaviors and the algorithms'...
The paper deals with the structure and the properties of a system implementing the remote laboratory, in the technical area, for university purposes. This system was intended for remote experiments on physical objects, but it allows virtual experimentation, too. The main contribution is the original software written for this laboratory, created by the authors and tested in the university. The key...
MapReduce is a partition-based parallel programming model and framework enabling easy development of scalable parallel programs on clusters of commodity machines. In order to make time-intensive applications benefit from MapReduce on small scale clusters, this paper proposes a new method to improve the performance of MapReduce by using distributed memory cache as a high speed access between map tasks...
IP multimedia subsystem (IMS) is considered as the main solution for the next generation multimedia rich communication. The hotspot topic of IMS has motivated many researches on the performance modeling and analysis based on SIP. In order to analyze expected performance characteristics of IMS more precisely, we proposed our novel work which is the first study to accurately describe SIP signaling in...
Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and auditing. In this paper, a novel proxy-based security audit system is designed and implemented in order to ensure security supervising and auditing remote desktop access. Our system effectively monitors all the accessing sessions of RDP, VNC, and X-window,...
P2P-based video-on-demand (P2P-VoD) streaming service has recently emerged as a new paradigm of Internet application. Unlike streaming live content, P2P-VoD system require each user to contribute a small amount of storage since it has less synchrony in the users sharing video content. At the same time, new mechanisms for peer service scheduling are carefully designed. On briefly describing the architectural...
IP multimedia subsystem (IMS) is considered as the main solution to the next generation multimedia communication.By examining potential security threats to IMS, we initiate a set of security policies for choice and consider their quality of protection (QoP) based on the strength of the security mechanism. In order to provide secure service to users, it is insufficient to just take the security benefits...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.