The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Forwarding information base (FIB) scalability and its lookup speed are fundamental problems of numerous network technologies that uses location-independent network names. In this paper we present a new network algorithm, Othello Hashing, and its application of a FIB design called Concise, which uses very little memory to support ultra-fast lookups of network names. Othello Hashing and Concise make...
Outsourcing middleboxes brings threats to the enterprise's private information including the trafflc and rules of middleboxes. We present a secure and dynamic middlebox outsourcing framework SICS, short for Secure In-Cloud Service. SICS encrypts each packet header and uses a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information...
Currently, education has become a business sector that provides service to students. This service is developing standards more similar to consumer goods marketing. As a higher education organization, Durham University aims to top education and research across all disciplines in 2020 in UK, which needs the support of the most able and motivated students, academic staff and sufficient money. During...
In this work, we propose Residual Attention Network, a convolutional neural network using attention mechanism which can incorporate with state-of-art feed forward network architecture in an end-to-end training fashion. Our Residual Attention Network is built by stacking Attention Modules which generate attention-aware features. The attention-aware features from different modules change adaptively...
In this paper, the dynamics of a flapping wing vehicle are studied. A quasi-steady model is developed to analyze its aerodynamic forces and moments. The unsteady effects are considered both in hovering state and forward flight state. Different from existing flapping wing vehicle dynamics model, the rudder's dynamics are concurrently considered in the proposed one. Numerical simulation is conducted...
Internet of Things has been widely applied in everyday life, ranging from transportation, healthcare, to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the...
This paper initiates the studies of parallel algorithm for core maintenance in dynamic graphs. The core number is a fundamental index reflecting the cohesiveness of a graph, which is widely used in large-scale graph analytics. We investigate the parallelism in the core update process when multiple edges and vertices are inserted. Specifically, we discover a structure called superior edge set, the...
An important function of smart environments is the ubiquitous access of computing devices. In public areas such as hospitals, libraries, and airports, people may want to interact with nearby computing systems to get information, such as directions to a hospital room, locations of books, and flight departure/arrival information. Touch screen based displays and kiosks, which are commonly used today,...
Computer networks are becoming increasingly complex today and thus prone to various network faults. Traditional testing tools (e.g., ping, traceroute) that often involve substantial manual effort to uncover faults are inefficient. This paper focuses on fault detection of the network data plane using test packets. Existing solutions of test packet generation either take very long time (e.g., more than...
Passive Radio Frequency Identification (RFID) tags have been widely applied in many applications, such as logistics, retailing, and warehousing. In many situations the relative locations of objects are more important than their absolute locations. However, state-of-art relative localization methods need continuing movement of tags and readers, which limit the application domain and scalability. In...
In a software defined network (SDN), the control plane needs to frequently collect flow statistics measured at the data plane switches for different applications, such as traffic engineering, flow re-routing, and attack detection. However, existing solutions for flow statistics collection may result in large bandwidth cost in the control channel and long processing delay on switches, which significantly...
With rapid development and popularity, smartphones have been of importance in our daily life. Despite of its convenience in communication and computing, smartphones also lead potential security threats to users. Existing methods on smartphones for protecting user's privacy mainly depend on password or fingerprint based authentication. Most smartphone passwords are very simple and easy to guess or...
Data center networks leverage multiple parallel paths connecting end host pairs to offer high bisection bandwidth for cluster computing applications. However, state of the art routing protocols such as Equal Cost Multipath (ECMP) is load-oblivious due to static flow-to-link assignments. They may cause bandwidth loss due to flow collisions. Recently proposed centralized scheduling algorithm or host...
Anonymous content sharing over the Internet protects user privacy and content confidentiality. Most overlay anonymous communication protocols employ some relay nodes as the proxies to forward content and require relays to perform cryptography or coding operations on messages. They have two major limitations. First, extra computation overhead may discourage overlay nodes from serving as relays. Second,...
Data center networks with random topologies provide several promising features, such as near-optimal bisection bandwidth and flexibility of incremental growth. However, network failures are ubiquitous and significantly affect the performance of cloud services, such as availability and bandwidth. Existing random topology based data centers do not provide specific fault-tolerance mechanisms to recover...
Due to flow dynamics, a software defined network (SDN) may need to frequently update its data plane so as to optimize various performance objectives, such as load balancing. Most previous solutions first determine a new route configuration based on the current flow status, and then update the forwarding paths of existing flows. However, due to slow update operations of Ternary Content Addressable...
7.09Gb/s real-time optical OFDM transmissions with record high spectral efficiency up to 6.93bits/s/Hz are experimentally demonstrated in DML-based 50km SSMF IMDD systems in cooperated with DACs/ADCs whose sampling rates are as low as 2GS/s.
The transmission distance of continuous variable QKD (CV QKD) protocol based on Gaussian modulation has been quite limited by the low efficient reconciliation protocol. On the other hand, noiseless linear amplifier (NLA) have greatly enhanced the ability of CV QKD. In this paper, we propose a Gaussian post-selection method simulating NAL in CV QKD, followed by a reconciliation process based on systematic...
Android is now the most popular mobile system and much attention is paid to its security. In this paper, contributions are made in three aspects. First, main work from 2010 to 2016 about Android security is surveyed. Second, a novel aspect proposed in this paper which divide the Android ecosystem into seven spheres. Third, it is found out that system development sphere, application development sphere,...
Server-centric data center networks enable several important features of modern data center applications, such as cloud storage and big data processing. However, network failures are ubiquitous and significantly affect network performance, such as routing correctness and network bandwidth. Existing server-centric data centers do not provide specific fault-tolerance mechanisms to recover the network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.