The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ever-increasing big data forces enterprises to migrate data to cloud storage systems. Data retrieval time from the cloud will directly affect the overall application performance. Meanwhile, sensitive data stored on cloud necessitates a robust security arrangement against cyberattacks. Therefore, it is imperative that both data retrieval time and data security should be taken into account simultaneously...
As scientific applications become more data intensive, finding an efficient scheduling strategy for massive computing on network-based computing systems has drawn increasingly attention. Most existing scheduling models assume that all processors are idle at the beginning of workload assignment. In fact, in the real distributed computing environments, processors may still be occupied with any previous...
In crowdsourcing database, human operators are embedded into the database engine and collaborate with other conventional database operators to process the queries. Each human operator publishes small HITs (Human Intelligent Task) to the crowdsourcing platform, which consists of a set of database records and corresponding questions for human workers. The human workers complete the HITs and return the...
Local area network (LAN) security evaluation has not only become more important but also affected the LAN or internet advancement and development. Above all, the LAN security characteristics of are analyzed. On the basis, the quality evaluation system framework of LAN security indicator is established. Fuzzy evaluation index system is established to consider various influential factors. As to indexes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.