The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the sake of privacy in range search, a new privacy-preserving range search protocol is proposed using cryptology technology. First, a privacy-preserving vector dominance protocol is suggested. Then, on base of the protocol, our scheme is presented in semi-honest model. Security and complexity are analyzed in the end. Different from previous protocols, the servers are not allowed to get anything...
Cloud datacenters must ensure high availability for the hosted applications and failures can be the bane of datacenter operators. Understanding the what, when and why of failures can help tremendously to mitigate their occurrence and impact. Failures can, however, depend on numerous spatial and temporal factors spanning hardware, workloads, support facilities, and even the environment. One has to...
Memcached is an in-memory key-value caching system, which is used to resolve the principal contradiction of the disk-based database between the CPU and input/output, has been widely used as an effective way to solve the distance and improve the capacity of the source server. We optimize the performance of Memcached memory access through two ways: improve the density of memory storage and ameliorate...
Anycast is an internet addressing protocol where multiple hosts share the same IP-address. A popular architecture for modern Content Distribution Networks (CDNs) for geo-replicated HTTP-services consists of multiple layers of proxy nodes for service and co-located DNS-servers for load-balancing on different proxies. Both the proxies and the DNS-servers use anycast addressing, which offers simplicity...
For all sound reasons, more and more organizations are deploying their databases to the cloud as a viable option as part of their nowadays system architecture. Since we cannot be sure that our database access would never be compromised, data encryptions of various forms and levels have become the utmost techniques used to prevent malicious parties, internal or external, from inspecting an organization's...
Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. Our key insight is that there exists a diverse spectrum of tolerance to memory errors in new data-intensive...
Most recent distributed file systems have adopted architecture with an independent metadata server cluster. However, potential multiple hotspots and flash crowds access patterns often cause a metadata service that violates performance Service Level Objectives. To maximize the throughput of the metadata service, an adaptive request load balancing framework is critical. We present a distributed cache...
Based on the tourists' requirements for tourism information, the structure and function of tourism service WebGIS have been systematically designed with Silverlight technology. According to the requirement of systemic construction, the key technologies have been studied and analyzed, including Silverlight, WebGIS, and database technology. Finally, the tourism service WebGIS in Kaifeng city is developed...
Heterogeneous systems become popular in both client and cloud. A parallel program can incur operations on multiple processing resources such as CPU, GPU, and vector processor units. This paper investigates scheduling problems on functionally heterogeneous systems with the objective of minimizing the completion time of parallel jobs. We first present performance bounds of online scheduling and show...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
With the analysis of the principle and composition for the MQ Series, based on the features of steel MES(Manufacturing Execution System), this paper discusses the steel MES message communication system by using the middleware of MQ Series. The structure of the system, format of the message and designing of object are presented in detail. After careful analysis of system communication process, the...
In this paper, it presents an effective caching algorithm based on random access with the finite storage size in distributed server architecture for networked video services. Under the general video traffic condition, it is observed that the storage size and total popular contents of edge video server affect the performance of the total video sever system, and channel bandwidth between edge video...
Passenger line flow in China is so huge that current ticketing systems cannot be viewed optimistic. After pointing out the disadvantages of existing telephone and web network ticketing systems and further comparing barcode, two-dimensional barcode and RFID(Radio Frequency Identification), this paper proposed a new ticketing system based on C/S architecture and two-dimensional(2-D) barcode on mobile...
A project of mobile value-added service based on P2P is proposed. In this project, wireless devices can build a P2P network dynamically and they can access and transmit information point to point. The idea will adapt to the 3G wireless network and it will become a effective solution for mobile value-added services on 3G. Utilizing JXTA and J2ME, a platform based the project is realized. The module...
Recently, Tsai et al. have proposed a multi-server authentication protocol. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Tsaipsilas protocol does not provide perfect forward secrecy and is susceptible to a Denning-Sacco attack and server spoofing. We then present an enhanced...
Data Centers are energy consuming facilities that host Internet services such as cloud computing platforms. Their complex cyber and physical systems bring unprecedented challenges in resource managements. In this paper, we give an overview of the resource provisioning and utilization patterns in data centers and propose a macro-resource management layer to coordinate among cyber-and-physical resources...
In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed...
Under static frequency allotment scheme, each licensed operator is allocated a frequency band in which its user can transmit, but the spectrum may not be fully utilized either on geographical or at temporal level. On the other hand, on some hot spot business frequency bands, spectrum resources become in short supply. Dynamic spectrum access (DSA) technology based on cognitive radio is an effective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.