The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so...
Single-Camera Video Surveillance (SCVS) has mainly been applied in the passive monitoring. Video surveillance covers small area, the video information is not sufficient without the joint tracking capability. Currently poor performance in most similar networks is mainly due to unintelligence and low real-time. In this paper we proposed a distributed smart multi-eyes camera network by utilizing smart...
Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it divides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes...
Recent developments of modern technologies such as cloud computing, wearable sensor devices and big data have significantly impacted people's daily lives, and offer real potential for an Internet-wide, people-centric ecosystem. These advances in technology will considerably extend human capabilities in acquiring, consuming and sharing personal health information. A future in which we are all equipped...
We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors and detectors. We also describe how the framework...
Virtual machine (VM) based virtual infrastructure has been adopted widely in cloud computing environment for elastic resource provisioning. Performing resource management using VMs, however, is a heavyweight task. In practice, we have identified two scenarios where VM based resource management is less feasible and less resource-efficient. In this paper, we propose a lightweight resource management...
The computing resource level architecture allows end-users to directly control its underlying computer resources, such as VM (virtual machine) operations, scaling, networking, etc. However, setting up and maintaining a working environment is complex and time consuming for end-users and resource management is also a heavy-weight task for the providers. In contrast, the application resource level architecture...
Schema matching is a difficulty in many database application domains, e.g., data integration, E-business, data warehousing and semantic query processing. We can get correct schema mapping by mining the semantics of elements from the elementspsila own information (e.g., elementspsila names and elementspsila data types and domains), data instances and structure information. But in fact, most existing...
The demand on mobile and real-time database application and service is becoming increasingly extensive, since the workload cannot be precisely predicted so that they can become overloaded possibly. Many update transactions often missed their deadline because of competing for the limited system resources severely, so data freshness could not be guaranteed in RTMDBS (mobile and real-time database systems)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.