The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studied Xen's virtual device and virtual network environment structure. In this paper, the solution for trusted network connection of Inter-Domian on Xen virtual machine is proposed. According to this solution, the trusted network connect architecture is applied in Xen virtualization platform, which provides necessary policy measures and the active security defense in user terminal network...
With the development of the 3C integration technology and the increasing popularity of Consumer Electronics, the new products continue to emerge. In recent years, consumer electronics based on the standard of home networking are rapidly developing. IGRS and UPnP protocol have primary and deep effect on the application of family media in our country. In order to develop digital home terminal product...
Virtualization technology can reuse the hardware platform to provide multiple isolated virtual system environments; however, this also causes unsatisfactory performance of the virtual guest system, especially the display in virtual guest system. In this paper, we study the virtual device model and improve the way of original virtual device implement based on Xen virtualization. A new display method...
With the continuous development of embedded technology, embedded software is in great demand, which makes how to dynamically find the code that affect the efficiency of embedded software and optimize the embedded software performance with it critical for embedded software development. This paper begins with analysis into the shortcomings of current flaw-detection methods and related tools available;...
The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mechanism...
This paper studied the general principle about Xen's virtual network environment structure and the response process about character device during full visualization. In view of the network security and feasibility problem of Xen, we proposed the multiple-network isolated virtual network environment and an operable security switching system, which are implemented so that it can effectively safeguard...
With the rapid development of RFID technology in logistics industry, the integration of RFID and business process becomes an important factor for RFID projects. In this paper, we study the issues of RFID application in third-party logistics and propose a component-based solution by integrating OSGi (Open Service Gateway initiatives) and jBPM (Java Business Process Management) technology. The paper...
The integration of RFID technology and mobile smart device stimulates the daily increasingly popularity of mobile RFID-based applications, which makes its way to become a new hot zone of research and development. However, the diversities of the hardware and software as well as the resource constraints on devices are the first problems developer needs to resolve. One of the most highly effective solutions...
Nowadays, RFID (Radio Frequency Identification) mobile middleware technology is gaining growing attention due to its competitive business prospect and value. With the ability to be automatically identified and collect information, RFID mobile systems have been applied to various fields. Meanwhile, advancements in wireless communication technology have greatly increased the functionality of mobile...
With the continuous development of embedded technology, embedded applications are becoming increasingly popular in daily lives, and respectively embedded software is in great demand. As a result, how to profile embedded software to guarantee its quality becomes a focus of attention. This paper focuses on this issue. It analyzes current methods of embedded software profiling and their defects, and...
With the growing popularity of digital home, digital multimedia applications are in rapid development. Digital media adapter (DMA) in home network is very popular in recent years. However, some problems come out while applying the standard A/V application framework for DMA software, for examples, device's overloaded tasks, and low device's applicability of the DMA software, etc. Addressing these issues,...
This paper introduces the current status of semantic Web services and third-party logistic service briefly, and then according to the current defect of third-party logistic service, it presents a new semantic Web services and RFID middleware based logistic service mode with a aim to provide better service by employing semantic Web services technology to implement the semantic registration, semantic...
With the improvement of mobile equipment performance and development of Pervasive Computing, interactive computational applications such as multi-agent systems in PCE (Pervasive Computing Environments) become more and more prevalent. However, the traditional Multi-Agent framework cannot completely adapt to the features of this new environment, e.g. a diversity of applications and devices. This paper...
Due to its poor support of the newest flash standard, it may be harder to make wide application of embedded browser in pervasive computing area, especially the ones running on the uCLinux-based platform, which has no MMU support. This paper focuses on this issue. It chooses the open-source project Konqueror/Embedded Web browser as the research basis, and proposes a method of developing plug-ins on...
In order to respond quickly to the needs of enterprise applications of RFID technology, this paper describes the development of the reconfigurable RFID middleware for different RFID deployment environment and computing platforms, which has the advantage of the rapid development of new scene-oriented RFID middleware. Customization and reconfiguration are the goals of the RFID middleware in this paper...
Embedded browser is an important component to support Ubiquitous Computing in Information Appliances. How to develop an uCLinux-based embedded browser remains to be a big challenge and quite demanding. This paper uses Konqueror/embedded as a prototype. Based on the interactivity between the bottom network connection layers, it proposes a theory to turn the multi-process mechanism into multi-threads...
RFID middleware plays an important role in RFID system. A good RFID should be able to extract high-level business information from mass of raw RFID information. Recently, many scientists are working on this issue, from different points of view. However, rule match is the common issue in all these works. This paper firstly gives a summary of related works, and then introduces a temporal logic extended...
VOCAL (Vovida open communication application library) is an open-source code program that provides a SIP-based (session initiation protocol) VoIP (voice over Internet protocol) communication. So far, a lot of projects lay emphasis on the research of customized redevelopment based on VOCAL, but the technical documentation is not for sharing. Feature server is an important part of VOCAL. The Feature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.