The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances have demonstrated the potential of network MIMO (netMIMO), which combines a practical number of distributed antennas as a virtual netMIMO AP (nAP) to improve spatial multiplexing of an WLAN. Existing solutions, however, either simply cluster nearby antennas as static nAPs, or dynamically cluster antennas on a per-packet basis so as to maximize the sum rate of the scheduled clients...
Data intensive computing (DIC) offers an attractive option for business to remotely execute applications and load the computing resources from cloud in a streaming way. A key challenge in such environment is to increase the utilization of cloud cluster for the high throughput processing. One way of achieving this goal is to optimize the execution of computing jobs on the cluster. We observe that the...
Recently, the fact that mobile devices with various kinds of hardware and software platforms constantly appear on the market has resulted in huge amount of mobile applications coming out based on different platforms. Thus a big challenge has emerged to design applications on the heterogeneous devices and operating systems (OSes). This paper proposes a completely cross platform mobile transparent computing...
User authentication plays an important role to ensure that only authorized users can access resources. Kim et al. proposed a remote user authentication scheme based on the Rabin cryptosystem to resist well-known attack such as offline password guessing attack, unlimited online password guessing attack and server impersonation. In their scheme, a user will be issued a smart card for authentication,...
Because of marketing demand of user-centric video dissemination, promoting video content via interactive distribution platforms has received considerable attention recently. In addition, the preferences of clients are heterogenous and dynamic, effectively utilizing the network bandwidth to distribute user-centric content becomes a challenging problem, especially when the number of users in the systems...
Mobile ad hoc network is a new multi-hop wireless communication network. It has wide application, but it is exposed to kinds of security threats. Key management is vital important in ad hoc network security research field. Firstly the related work about key management in mobile ad hoc network is analyzed, and then an algorithm is proposed based on identity-based generalized signcryption. Lastly a...
Based on the techniques of power electronics, fault diagnosis and network, a remote monitoring and fault diagnosis system with combination of a three-layer C/S structure and Internet is presented, which achieves with high compatibility between different equipment. Furthermore, the paper focuses on the discussion about the structure of compatibility between systems, the compatibility design of remote...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.