The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Single-Camera Video Surveillance (SCVS) has mainly been applied in the passive monitoring. Video surveillance covers small area, the video information is not sufficient without the joint tracking capability. Currently poor performance in most similar networks is mainly due to unintelligence and low real-time. In this paper we proposed a distributed smart multi-eyes camera network by utilizing smart...
Email has become widely used in recent years bringing with it new problems. Although this event doesn't happen often, misdirected emails can bring out great information leakage. It is not easy to detect these misdirected emails from legitimate ones since they may be only distinguishable in the sender's perspective. Existing methods discover misdirected emails from user agent or gateway but are not...
With the rapid developments of information technology, various industries become much more dependent on networks. Driven by economic interests and the game between countries reflected by growing cyberspace confrontations, evasive network attacks on information infrastructures with high-tech, high concealment and long-term sustainability become severe threats to national security. In this paper, we...
As one of the most popular anonymous communication systems, Tor has become a research hotspot in this area. Recently, Tor nodes from Tor families (referred to as family nodes) have played an increasingly important role and caused significant influence on the Tor network. However, existing research about Tor mostly focuses on the entire Tor network without much consideration about the difference between...
Virtual machine (VM) based virtual infrastructure has been adopted widely in cloud computing environment for elastic resource provisioning. Performing resource management using VMs, however, is a heavyweight task. In practice, we have identified two scenarios where VM based resource management is less feasible and less resource-efficient. In this paper, we propose a lightweight resource management...
Simplifying the process of deploying applications is almost essential in the cloud. However, existing techniques can automate applications' initial deployment but have not yet adequately addressed their scaling problem. In this paper, a deployment platform to enable a novel dynamic scaling technique is introduced. This platform employs: (i) an extensible specification that describes all aspects of...
Xunlei [1] is a new P2P content distribution system which is popular in China. It composes traditional HTTP/FTP downloading and P2P content distribution features which attract many people including researchers. Xunlei's network is Bit Torrent-like and the measurement is more difficult than other P2P networks [2]. There are many constrains on Xunlei tracker, so we can not obtain information from tracker...
The computing resource level architecture allows end-users to directly control its underlying computer resources, such as VM (virtual machine) operations, scaling, networking, etc. However, setting up and maintaining a working environment is complex and time consuming for end-users and resource management is also a heavy-weight task for the providers. In contrast, the application resource level architecture...
Fast-flux based service network is first introduced as a technique used to improve the reliability and quality of a service system. But recently, this technique is also adopted by cyber-criminals and Internet miscreants to evade identification and to frustrate law enforcement and anticrime efforts aimed at locating and shutting down the illegal service. Previous work on this topic focuses mostly on...
Different operating systems have different network share techniques or protocols. Centralizing files and printers not only simplifies administration, it helps maintain consistency of shared resources. To realize resources sharing between different network flats, we analyzed concerned protocol, such as TCP/IP protocol, SMB protocol, IPX/SPX protocol, NFS protocol and FTP protocol. We also confirmed...
Load balancing is critical to the performance of parallel processing systems. It is more difficult for network systems such as NIDS and Web Servers, because they must preserve flow order. But traditional flow-based load balancing schemes of network parallel processing systems, such as LLF, cost much resource and introduce lots of communication overhead. With the rapid popularization of multi-core...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.