The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network I/O workloads are dominating in most of the Cloud data centers today. One way to improve inter-VM communication efficiency is to support co-resident VM communication using a faster communication protocol than the traditional TCP/IP commonly used for inter-VM communications regardless whether VMs are located on the same physical host or different physical hosts. Although several co-resident...
Paper has been modified R-AODV routing protocol, designed to improve the performance of Ad Hoc networks. The paper first describes the characteristics of routing protocols AODV and R-AODV that lack, and for this deficiency, a stablity routing protocol base on Reverse AODV(SR-AODV). Finally, through the NS2 simulation, compared to the AODV routing protocol, R-AODV routing protocol and SR-AODV packet...
With the pervasive computing and parallel computing time arrival, the traditional access control mechanism already ragged, this has prompted the dynamic access control technology, this technology makes access alter with the context of the changes, so it need to acquire dynamic context information. This paper gives the definition of the context information in dynamic access control, and on the bases...
Distributed Denial of Service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing, which is exploited by attackers to conceal source IP addresses and localities of malicious traffic. In this paper, we propose HPi (Hash-based Path Identification), a novel packet marking scheme to defeat DDoS attacks regardless of forged...
The aim of this paper is to make a review of the job performance dimensions and provide some theoretical background for the follow-up research. Although the research of employee performance has already continued for nearly one century, up to now, there have no a unified structural model yet. This paper combines the theories of organizational citizenship behavior, extra-role performance, task and contextual...
A novel fast link establishment method based on the combination with Multi protocol Label Switch (MPLS) and mobile agents(MA) for handoff during the mobile IP communication proceeding is proposed. By using the mobile agents for fast automatically information transforming the method can reduce the delay time dramatically. Simulations show that the transmission delay can be reduced to 27 to 41 percents...
Distributed denial of service (DDoS) attacks pose a major threat to today's cyber security. Defense against these attacks is complicated by source IP address spoofing. The Path Identification (Pi) mechanism is a promising technique to defend against DDoS attacks with IP spoofing. In the Pi scheme, each router marks forwarding packets to generate particular identifiers corresponding to different paths,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.