The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study the optimum scheduling of a pushing-based information delivery system, where information is sent from a server to mobile users by using server-initiated pushing actions. Information arrives at the server at random. The server adopts a “hold-then-serve” strategy, where new information is temporarily stored in queue for a later one-time transmission. Based on the current queue status, at any...
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced location spoofing detection using audibility (ELSA), which can be implemented at the backend server without modifying existing legacy IoT systems. ELSA is based on a statistical decision theory framework and uses two-way time-of-arrival (TW-TOA)...
Malwares always query DNS names to locate their C&C servers and keep regular communication with them, either for fetching instructions or checking updates. Traditional works consider such regular communication as a single-cycle behavior. However we find that many malwares communicate with their C&C servers in a multi-cycle way, which makes them more like normal and evading existing defense...
This paper presents a model for location anonymous area estimation, which establishes the related Bayesian inference network by making full use of the time-varying characteristic of person traffic or vehicle traffic, thus implementing the dynamical estimation method of minimum anonymous area. Integrating the real data, the method makes the prediction, therefore it is more accurate. The model in this...
According to the statistics, there is low resource utilization and high energy consumption in traditional servers. To reduce the cost, more and more companies begin to build virtual servers. Sever virtualization implements the mapping from virtual resources to physical resources and deal with resource contention among all VMs. Because of complexity of virtualized server systems, it is necessary to...
Flash memory SSD has emerged as a promising storage media and fits naturally as a cache between the system RAM and the disk due to its performance/cost characteristics. Managing such an SSD cache is challenging and traditional cache replacements do not work well because of SSDs asymmetric read/write performances and wearing issues. This paper presents a new cache replacement algorithm referred to...
In this paper, we consider a collaborative sensing scenario where sensing nodes are powered by energy harvested from the environment. In each time slot, an active sensor consumes one unit amount of energy to take an observation and transmit it back to a fusion center (FC). After receiving observations from all of the active sensors in a time slot, the FC aims to extract information from them. We assume...
In order to maintain data in an SSD (solid-state disk) cache durable after a crash or reboot, metadata information needs to be stored persistently in SSD. There are two typical metadata methods, update-write-update and write-update. While write-update method has one less SSD write operation than update-write-update for each write I/O, it limits the amount of cached data that can be used after a system...
Denial-of-service (DoS) attacks are on the rise in recent years and many cryptographic client puzzle schemes have been proposed for mitigating such attacks. Nonetheless, these schemes lack a strategy for setting the puzzle difficulty parameter which is an important issue for the legitimate users as they should not be unfairly delayed during low server loads. In this paper, we propose a leaky bucket...
In the current, the structured P2P-based time-shifted streaming system exist the problems that the copy of time-shifted streaming cannot be fully found and the maintenance costs are higher. For resolving the problems a structured P2P-based hierarchy search model for time-shifted streaming, namely Hier-DHT, is proposed. In Hier-DHT, the hierarchy is divided according to the first video block in the...
Refering to single area crawler model based on p2p-chord network, designed and implemented a multi-area crawler model based on own design Skipnet-YL network which based on Skipnet protocol. It use better performance router protocol Skipnet-YL and the idea of SuperNodes and OSPF. Sequentially, it can solve the problem of low performance and the large of communication traffic during increasing nodes...
In this paper, a new authentication mechanism is proposed, which reverses the protocol validation process into biometrics recognition to resolve uncertainty in the biometric data under the conditions of the inherent fault-tolerance in a variety of biometric technologies. The new signature scheme presented in this paper is based on the elliptic curve discrete logarithm problem (ECDLP) and large integer...
The technology of implementing virtual laboratory based on Java language was proposed in this paper, and this paper designed a network virtual laboratory based on Browser/serve architecture, and the key technologies to achieve the client and the server and gave the illuminations of codes.
This paper proposed the construction algorithm of chaotic Hash function based on He??non-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can't resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.