The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inter-vehicular communication (IVC) can be explored to build a live map of vehicles for enhancing collaborative vehicular applications related to traffic statistics, safety by accident prediction and prevention, and energy efficient route planning. For enhancing the abovementioned applications, a live map of vehicles associated with their communication identities (e.g., IP/MAC addresses) of other...
Multi-screen sharing system is the common applications of digital home. While users obtain poor experience because of the delay time of frames. In this paper, we propose an adaptive initial quantization parameter (QP) selection for the multi-screen sharing system based on H.264/SVC. First, the image complexity is estimated using a method based on the image gradient information. Second, the bits per...
High-density computer racks become increasingly commonplace in supercomputing centers and data centers. With tight integration of high-powered computing components in the racks, hot spots or pockets of elevated temperatures on the chips and system can be easily formed when room air circulation is not effective. Hot spots reduce the reliability of high-density systems and increase the chances of thermal...
Traditional NAC system in enterprise network is in coarse granularity (e.g. IP or MAC address) and lack of flexibility. Recently the demand in tight control of the enterprise network to defense the misuse and security issues become more and more urgent. Based on the TCG TNC standard, an application level network access control mechanism is proposed and implemented. With TNC client/server model in...
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID(Radio Frequency Identification), this paper proposed a new ticketing system based on C/S architecture and two-dimensional(2-D) barcode on mobile...
Botnet has become a prevalent platform for malicious attacks, which poses a significant threat to Internet security. Recently, botnets are inclined to utilize HTTP to route their command and control (C&C) communication instead of using the protocol Internet Relay Chat (IRC). And these web-based C&C bots try to blend into normal HTTP traffic, which makes them more difficult to be identified...
With the development of information society and the improvement of people's needs, E-ticket is an inevitable trend, which means a common platform for online ticketing has become a priority. This paper presents an integrated ticketing system based on two-dimensional (2-D) barcode on mobile phone, using coding and decoding technology of 2-D code and MD5 Message Digest Algorithm. There are also presentations...
Discussed the basic principles of terminal equipment of Linux pseudo, as well as the naming process and a typical structure of pseudo-terminal. Analyzed how access to and use of pseudo-terminals pseudo-terminal master and slave data communications equipment dynamically. Combination of layer two tunneling protocol (L2TP) to achieve the Linux process, it gives the flexibility to increase end-user VPN,...
SVGT which is based on XML is one of suitable map formats used in Mobile GIS. However, the tags used in SVGT are still the large amount of data. Moreover, there is no existing SVGT map for applications often. To bridge the MapInfo map and SVGT, this paper presents a compact mobile map format called SSVGT, which simplifies the representation and process of map data for mobile devices. SSVGT exploits...
Location based services (LBS) has become the key feature for wireless phones, and its wheeled vehicle equivalent, telematics. The essential elements to LBS have been a two-way wireless data communications link plus navigation data inputs to permit a screened flow of information from LBS data servers. Today, most LBS system designers consider the fusion of Global Position Satellite (GPS) receivers...
Least privilege is a basic principle to be conformed to when design computer systems. For file access control, the paper decomposes least privilege as user least privilege and program least privilege. User least privilege is a set of file with the corresponding access mode with which the user can access the file, and program least privilege is a set of file with the corresponding access mode with...
This article analyzes the current Web graphic processing technique, and then it puts forward a new model of object grouping database and technology of rapid graphic refreshment based on the incremental data. Later on it discusses collaborative graphic editing technology to organize GIS data more effectively and improve graphics interaction processing efficiency under network environment.
Huge data storage and complex topology computing are the two main problems in social network service (SNS). In order to overcome the premature problems, this paper develops optimized models and algorithms for these two aspects respectively, and also proposes a distributed SNS framework. Some experiments have been done and the results show the new models and algorithms perform well on SNS problems.
The dynamic and cross-organizational aspects of Grid introduce challenging management and policy issues for controlling access to the resources. Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are protected by access control policies which may also be communicated to the other...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.