The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Memory price will continue dropping in the next few years according to Gartner. Such trend renders it affordable for in-memory key-value stores (IMKVs) to maintain redundant memory-resident copies of each key-value pair to provision enhanced reliability and high availability services. Though contemporary IMKVs have reached unprecedented performance, delivering single-digit microsecond-scale latency...
The admissible tracking consensualization problem and the admissible containment consensualization problem of singular multi-agent systems are discussed. The sufficient and necessary condition to achieve the above two admissible consensus problems are provided. At the same time two constructive algorithms are presented to design the gain matrices of protocols. Two numerical examples are given to show...
Selection cooperation is a preferable cooperative scheme for wireless sensor networks (WSNs) for its simplification and easy implementation. In this paper, we present a selection cooperation experimental platform (CEP) based on IEEE 802.15.4 WSNs using cheap radios. This work concentrates on employing the lightweight selection cooperation protocol (LSCP) with feedback to govern the cooperation between...
Selection cooperation is an effective solution for cooperative communications and the automatic repeat request (ARQ) protocol can provide additional diversity gain for wireless networks. In this work, considering a large network where direct transmissions only exist in the neighbors of each node, we investigate an improved diffusion selection cooperation protocol integrated with ARQ, and taking into...
This paper proposes a multi-protocol automotive gateway, which supports three popular communication protocols, CAN bus, Wi-Fi, and RS-232. The proposed gateway is implemented on an embedded Linux system ported to an ARM development board. A dedicated application is designed to deal with the information exchange among the ports of the gateway. An ACL is implemented to control the permission of data...
In this paper, we describe our experiences and lessons learned from building a general-purpose in-memory key-value middleware, called HydraDB. HydraDB synthesizes a collection of state-of-the-art techniques, including continuous fault-tolerance, Remote Direct Memory Access (RDMA), as well as awareness for multicore systems, etc, to deliver a high-throughput, low-latency access service in a reliable...
The traditional Kerberos protocol exists some limitations in achieving clock synchronization and storing key, meanwhile, it is vulnerable from password guessing attack and attacks caused by malicious software. In this paper, a new authentication scheme is proposed for wireless mesh network. By utilizing public key encryption techniques, the security of the proposed scheme is enhanced. Besides, timestamp...
Extended three-particle GHZ state decoy is introduced in controlled quantum secure direct communication to improve eavesdropping detection probability and prevent correlation-elicitation (CE) attack. Each particle of extended three-particle GHZ state decoy is inserted into sending particles to detect eavesdroppers, which reaches 63% eavesdropping detection probability. And decoy particles prevent...
The consensus problem of linear multi-agent systems with directed switching topologies is investigated. An observer-based consensus protocol is designed, under which the final consensus value may be nontrivial if the agent is stabilizable and observable. An algorithm is presented to construct the consensus protocol to achieve the joint design of the final consensus value and the prescribed convergence...
Data centers are increasingly being re-designed for workload consolidation in order to reap the benefits of better resource utilization, power savings, and physical space savings. Among the forces driving savings are server and storage virtualization technologies. As more consolidated workloads are concentrated on physical machines -- e.g., the virtual density is already very high in virtual desktop...
This paper introduces a new and low-cost tissue stiffness simulation technique for surgical training and robot-assisted minimally invasive surgery (RMIS) with pseudo-haptic feedback based on tissue stiffness maps provided by rolling mechanical imaging. Superficial palpation and deep palpation pseudo-haptic simulation methods are presented. Although without expensive haptic interfaces users receive...
Handwritten signature is often used for verification of important documents. Attackers can fake someone's handwriting signature in a paper-based document, or deliberately attach someone's handwriting signature in binary image to an electronic document, which may print later, claiming the agreement of the signer. In order to solve this problem, we propose a novel signature-in-signature verification...
The Controller Area Network (CAN) protocol is a real-time, serial, broadcast protocol with a very high level of security. The AT90CAN128 CAN controller is fully compatible with the CAN Specification 2.0 Part A and Part B, and high cost performance, but its internal structure is different from independent CAN controllers. In order to explore the AT90CAN128 CAN controller unique communication mechanism,...
The main idea of the verifier-based protocol is to mitigate the amount of damage that can be caused by corruptions in the server. Some verifier-based PAKE protocols in the three-party have been suggested by now. In this paper, we present a verifier-based PAKE in the three party based on ECC which is secure against several attacks and provides perfect forward secrecy. Users can share multiple session...
The fundamental issue in sensor networks is the quality of monitoring provided by the networks under the energy constraint. The quality is usually measured by coverage. In this paper, unlike previous research, the k-coverage problem is investigated in the directional sensor networks with turnable orientation. Furthermore, probabilistic sensing model is adopted for more realistic than deterministic...
Wireless sensor network (WSN) consists of tiny nodes with sensing, actuating, computation, wireless communications capabilities. Because of node's limited energy, many routing, topology control, media access control (MAC) protocol have been specially designed. This paper discussed power management of topology control, media access control protocol and routing protocol in wireless sensor network. Based...
With the evolvement of grid applications, the need for user controlled network infrastructure is apparent in order to support emerging dynamic and interactive services. In this paper, a novel fast light-path set-up protocol, named forward reserve backward release protocol, is proposed to meet these requirements. The proposed protocol addresses the signaling over head for dynamic wavelength networks...
Identifying anomaly detection such as failure and attacks rapidly and accurately over the Internet holds interest of both network operators and researchers. Network behavior analysis (NBA) system is usually disposed over an intranet, passively collects SNMP data or flow data, and uses signature and anomaly mechanisms to identify and analyze interesting network activities, including traffic anomaly...
In modern Collaborative Manufacturing, different security mechanisms of systems bring usage complexities and security risks. Grid Security Infrastructure (GSI) enables secure authentication and communication over computer networks. It is designed and developed on the technology of Java GSS-API, JAAS, Kerberos. The key technologies such as integrating with application server are specially discussed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.