The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With increasing evidence on the breadth and potency of side-channel attacks based on resource sharing, virtual machine (VM) placement in infrastructure cloud services, such as Amazon EC2, has become an important security problem. In this paper, we present a new approach to this problem by letting users specify their own trust profiles, and then incorporating such information into VM placement decisions...
Ongoing research in the field of positioning in cellular devices has led to several Location Based Services (LBSs) and its application flooding the market. However, these applications are neglecting user privacy in order to generate highly accurate results for user queries. While most traditional Location Based Service use the K-anonymity principle to blur user?s exact location information, these...
Online advertising involves an advertiser, who provides the advertisements to be displayed on the publisher's content and a publisher, who integrates advertisements into his online content. The existing advertising systems do not support regional languages in India. The number of local language internet users is growing at 47% year-on-year in India. There is no provision from Google AdSense to give...
Session Initiation Protocol (SIP), which is an IP based telephony protocol, is used mainly for the purpose of starting, sustaining and ending sessions related to multimedia communications on the Internet. The SIP protocol, which works on the top of TCP or UDP, is basically an open text-based protocol. Hence, to ensure security is of utmost importance. The original SIP used HTTP-digest based challenge-response...
Mobile devices such as smartphones and tablets are provisioned with multiple network interfaces capable of data connectivity such as the cellular radio, WiFi, bluetooth, and others. However, restrictions from the carrier side allow us to use only one of the interfaces at any given time, and not allow us to fully utilize all the data links in a mobile device's arsenal. We propose MIC, an architecture...
With the growing use of Internet and its services, a large number of organizations are making use of it to provide and seek information of the people using those services. This has raised the chances of attacks on such services by interrupting them sending multiple requests to the servers providing these services programmatically. CAPTCHA (Completely Automated Public Turing test to tell Computers...
Our project is a remotely controlled robot capable of surveying disaster situations or act as a security countermeasure. It utilizes a stationary network of passive infrared sensor nodes interconnected through a multi-hop Zigbee network. The sensors are motion sensitive and using regional localization can be used for identifying the location of survivors or intruders based on the situation. The robot...
To improve the IT resource utilization using Internet base computing we use virtualization technology. Virtualization put the foundation of cloud computing. To deploy the Cloudlet in Cloud computing environment we need to select the Load balancing policy across virtual machine. Virtual machine is hosted on physical hardware inside the Data Center. Hence we want to test the comparative performance...
Content Delivery Networks (CDN) are overlay network of servers being used to deliver growing traffic demands on the Internet. As a result, CDNs are facing ever-increasing operating costs. Internet Service Providers (ISP) charge CDNs on server traffic, computed using common usage-based charging models, e.g. 95th Percentile charging. We propose Network Cost Aware Request Routing, NetReq, that assign...
Advertisements (ads) are a common source of revenue for monetizing free mobile applications, but increase the energy consumption of a mobile device because the advertisement have to be fetched and displayed. In particular, the radio communication needed for the data transfer is power hungry and therefore advertisement sponsored free applications consume more energy than paid apps. This energy cost...
Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due...
With the development of Internet GIS also known as Web-GIS, there has been an increase in the development of various information systems dealing with geospatial data. Open source softwares being cost effective, reliable and flexible is becoming a preferred technology by researchers and academicians. Presently the integration of geospatial data scattered around various organization which refers to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.