The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, we present the design, implementation, and evaluation of an asymmetric virtual machine monitor (AVMM), which is an asymmetric partitioning-based...
Data aggregation is generally considered an important method used to reduce traffic and increase lifetime of wireless sensor networks in both two- and three-dimensional space. It is challenging to develop efficient data aggregation solution for the wireless sensor networks since quality-of-service, such as end-to-end delay, is considered as a severe criterion required in many scenarios. In this paper...
The field of parallel and distributed computing has become increasingly significant as recent advances in electronic and integrated circuit technologies. Peer-to-Peer (P2P) cloud computing networks are the largest contributor of network traffic on the Internet. Measurement plays an important role in different P2P applications, we should enhance the measurement-based optimization of P2P networking...
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on cryptography, many schemes for preventing prefix hijacks have been proposed. Securing binding between IP prefix and its owner underlies these schemes. We believe that a scheme for securing this binding should try to satisfy these seven critical requirements: no key escrow, no other secure channel, defending against...
This paper propose a method for sentence ordering in multi-document summarization task, which combine support vector machine (SVM) and Grey Model(GM). Firstly, the method train the SVM with sentences of source documents and predict sentences sequence of summary as primary dataset. Secondly, using Grey Model to process the primary dataset, and achieve the final sequence of summary sentences. Experiments...
Optimal design with the production cost of the manufacturing technology is carried out by the Dijkstra algorithm, the best processing lines and the relevant technological methods with condition of the lowest production cost are obtained. Practical instance with CAD procedure is given.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.