The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The prediction of bus travel time is one of the key of public traffic guidance, accurate bus arrival time information is vital to passengers for reducing their anxieties and waiting times at bus stop, or make reasonable travel arrangement before a trip. Research aim at bus travel time prediction is comprehensive at home and abroad. This paper proposes a model to combine road traffic state with bus...
The load-balancing and server-consolidation policies extensively used by previous virtual infrastructure management tools for cloud-based resource pools, make VM deployment decisions based solely on the demands from the physical resource layer, neglecting the impact of the complementary effects among virtual peers within a distributed service system. On the contrary, this paper provides an efficient...
By collaboration, domains share resources effectively. To maintain security properties of individual domains during collaboration is a key issue. When domains employing heterogeneous RBAC policies collaborate by crossdomain role-role mappings, their local SMER constraints may be violated. However, the secure interoperation studied so far does not deal with this threat. We presents the requirement...
The open and autonomous nature of peer-to-peer (P2P) file-sharing invites the phenomenon of widespread decoys and free-riding. Reputation systems are introduced to assure data authenticity and to stimulate collaboration. We argue that, in a reputation-aided P2P file-sharing system, the faithful delivery of an authentic file depends on the authenticity of the file, its reputation (either the objective...
Among the five goals of peer-to-peer security, file authenticity and fair trading have attracted the most attention. Reputation and incentive are two traditional systems to deal with file authenticity and fair trading problems, respectively. In this paper, we propose a multilevel reputation system which also serves as the base of an incentive system. By introducing the concept of reputation level...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.