The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Soft resource allocation is an important factor of system configuration which plays a critical role in guaranteeing the performance of multi-tier web service systems. There is a tradeoff between real-time performance and resource consumption, and thus the real-time adjustment of soft resource allocation in response to dynamic workload is quite challenging. In this paper, we propose a real-time soft...
In multi-tier cloud service systems, performance evaluation relies on numerous experiments in order to collect key metrics such as resources usage. The approach may result in highly time-consuming in practice. In this paper, we propose an automated framework for performance tracking, data management and analysis to minimize human intervention in multi-tier cloud service systems. The framework support...
Combining with the characteristics and actual demand of medical English, network-based medical English autonomous learning platform is put forward. This platform adopts Browser/Server architecture and it is developed based on ASP.NET technology and SQL Server 2005 database. Overall architecture, function and database are designed in detail. The platform provides learning tool and learning resources...
Mobility support is one of the key use cases of Information-Centric Networking (ICN), and is also widely discussed as a potential advantage of ICN compared to IP. In this paper, we review the state-of- the-art solutions for supporting producer mobility in ICN networks. Through deep analysis of the procedures for handling pending Interests, we observe two issues in the previous mobility solutions,...
In this paper we propose an efficient Large-scale terrain visualization system in a cluster environment. Firstly, we implement level-of-detail (LOD) building in parallel, with an obvious time saving compared with a single-machine environment. The LODs are then stored in the server. While rendering, clients get LODs on demand. LODs are organized with a scene graph structure, thus view frustum culling...
Botnets are responsible for many large scale organized Internet attacks today. Along with the fight between botnet developers and defenders, the battle field has significantly evolved from traditional centralized IRC to various new approaches, aiming to make bots and command and control channel more and more stealthy. In this work, through prototype implementations, we demonstrate that browser extensions...
in this paper, the association rule in Data Mining was applied to the in-warehouse assorted pallet in the three-dimensional warehouse. The extraction of the association rules between materials and the realization of the in-warehouse assorted pallet strategy are discussed in detail. The experimental result shows: This method can reduce the job number of times.
In modern software development, software requirements and implementation are not always reconciled. This leads to difficulties for evolution tasks in future. Specifically, for modern context-aware systems, changes in stakeholders' requirements disclose that existing implementation is insufficient to meet the new requirements due to the limitations of the traditional techniques. In this paper, we propose...
For end-to-end encryption and special communication protocol-based Skype system, it is not feasible to recognize the Skype protocol by using traditional port-based or payload-based identification methods. By detailed analysis of Skype protocol, this paper explores the general characteristics and special behavior characteristics under certain circumstances of Skype application and proposes a connection...
Survivability is a key issue in optical grids. In this paper, a resilient Optical Burst Switching (OBS) / Generalized Multi-Protocol Label Switching (GMPLS) network scenario, in which both the protection/restoration in the OBS layer and GMPLS layer and the resilient resource discovery and management scheme are experimentally demonstrated and theoretically analyzed. The results show that the proposed...
In recent years, the application of grid computing has become more common in the scientific and business communities and is likely to be open to the consumer market in the future. The achievement of this scheme, referred to as consumer grids, requires not only an efficient network paradigm for job transmission, but also a scalable and robust architecture, since there is a large number of dynamic resources...
Three types of SIP and P2P hybrid architectures for consumer grids are proposed. Their feasibility, efficiency and scalability are experimentally verified and their performances are experimentally compared by using an OBS network testbed.
WBISD is a tool that utilizes Eclipse plug-ins and other World Wide Web tools as a debugger to help Web-based interactive service developers debug the Web pages. The users of our system simply start debugging by interacting with the provided GUI environment of the tool. They can view the Web-based interactive service parameters encoded in URLs of dynamic Web pages obviously. WBISD can improve development...
The fast spreading worm is becoming one of the most serious threats to today's networked information systems. A fast spreading worm could infect hundreds of thousands of hosts within a few minutes. In order to stop a fast spreading worm, we need the capability to detect and contain worms automatically in real-time. While signature based worm detection and containment are effective in detecting and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.