The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Named Data Networking (NDN) is a clean state Internet paradigm that considers some security primitives in its original design, and one of the promising candidates for the future Internet architecture. However, it may suffer from the specific threats such as Interest Flooding Attacks (IFA). Most researches are focused on the defense against fake IFA, where the PIT resources in victim routers are exhausted...
Web Security Gateway (WSG) is a new type of network security product that maintains the security of trusted networks. In this paper, a WSG model for evaluating WSG performance is presented. This paper advances discussion of previous studies on series services under multiple service windows. The proposed model consists of a two-stage queuing system. The first stage is a network layer simulation. The...
Transparent computing is an implementation of ubiquitous computing that is aimed at providing active services for users. In transparent computing, the execution (computation) of computer instructions and data is temporally and spatially separated from their storage. Cloud computing solves the issue of data cloudlization, while transparent computing solves the one of software cloudlization. This paper...
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
Recently, peer-to-peer (P2P) networking has been proposed to deliver contents efficiently in Distributed Virtual Environments (DVEs) without overloading servers. Due to the nature of the real-time communications in DVEs, peers should carefully select neighbors and content pieces with prioritization in order to achieve the best streaming quality. In this paper, we proposed a prioritization framework...
Content-Centric Networking (CCN) is a novel networking paradigm that treats the named contents, not the hosts, as the first-class citizens of the network. In the forwarding plane, CCN employs a stateful forwarding scheme, which maintains per-packet state information in Pending Interest Table (PIT). By employing stateful forwarding, CCN enables native support for content requests aggregation and multicast...
Intelligence has become more and more popular, especially in smart grid. Nowadays, the inspection for power elements has changed from a traditional method to a more intelligent way using mobile terminals, which has greatly improved the work efficiency. However, this new method may reveal individual privacy such as workplace, work hours and personal habits, which may become background knowledge for...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
We investigate the problem of processing a large amount of continuous spatial-keyword queries over streaming data, which is essential in many applications such as location-based recommendation and advertising, thanks to the proliferation of geo-equipped devices and the ensuing location-based social media applications. For example, a location-based e-coupon system may allow potentially millions of...
We present a cloud resources integrated provisioning architecture utilizing coordinated virtualization of distributed datacenters and operator's multi-domain software define optical network. The overall feasibility and efficiency of two proposed virtual network composition schemes are investigated on our testbed.
This paper designed a circuit breaker on-line monitoring system based on S3C2440A core controller. With the high speed and high precision extended A/D, this device can sample signals on real time. It is fast, easy networking and convenient for remote data transmission by Ethernet. The embedded linux operating system, which can be cut arbitrarily and easy to translate, is used in this device. This...
Information-centric networking (ICN) is designed to decouple contents from hosts at the network layer, using in-network caching as a key feature to improve the overall performance. However, the en-route caching strategy used in many ICN implementations generally yields redundancies in the cached contents across different routers. There are also some recent works focusing on cache optimization by respectively...
To construct various Virtual Environments (VEs) is essential for geographically dispersed users to real-time interact and roam in various virtual worlds(e.g., virtual city, massively multiuser online games). However, this operation has been hindered by the contradiction between explosively growing 3D contents and relatively slower increasing resources (e.g., bandwidth, CPU resource). This work thus...
We study the multi-resource allocation problem in cloud computing systems where the resource pool is constructed from a large number of heterogeneous servers, representing different points in the configuration space of resources such as processing, memory, and storage. We design a multi-resource allocation mechanism, called DRFH, that generalizes the notion of Dominant Resource Fairness (DRF) from...
With the rapid development of cloud computing, physical resources of the cloud data centers have been increasing and how to improve the utilization of server resources is an important research direction. The virtual machine migration method proposed in this paper achieves the reallocation of server hardware resources by migrating the virtual machines between servers in order to realize the resource...
In the traditional cockpit display-control system, pilots have to face more and more instruments and response to the complex information simultaneously. In order to study the change characteristics of the mental workload under such multi-task condition, take the virtual instruments for design objects to set up a series of tasks. With the increase of information quantity and frequency of m instruments,...
Recent technical progress on the Internet and virtual reality has enabled the proliferation of distributed virtual environments (DVEs). In a DVE, high-resolution 3D contents may generate huge data, and the peer-to-peer (P2P) streaming takes advantages to carry these huge traffic in a cost-effective manner. In this P2P paradigm, peers can cache and share DVE data cooperatively to reduce server workload...
Live data migration is an important technique for key-value stores. However, due to the stateful feature, new virtualization technology, stringent low latency requirements and unexpected workload changes, key-value stores deployed in cloud environment have to face new challenges for data migration: effects of VM interference, and the need to trade off between the two ingredients of migration cost,...
This paper discusses the data description and organization of HGML, the data exchange standards of G/S model. Proposed the description of spatial data to show and the description of spatial data organization to solve scheduling, exchange and display problems in G/S model G-side and organization, storage and management problems in G/S model S-side. Also, described the geometric model and feature model...
This paper describes an enterprise data warehouse management technology in practical application, proposes the establishment from the data warehouse. With the problem emerging in aspects of real-time and regulatory warehouse management, it applies technology combining RFID and the WSN technology to the storage management. It achieves intelligent storage environment which meet the requirement of materials...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.