The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attack graph technique is a common tool for the evaluation of network security. However, attack graphs are generally too large and complex to be understood and interpreted by security administrators. This paper proposes an analysis framework for security attack graphs for a given IT infrastructure system. First, in order to facilitate the discovery of interconnectivities among vulnerabilities in a...
The increasing number of smart vehicles and their resource hungry applications pose new challenges in terms of computation and processing for providing reliable and efficient vehicular services. Mobile Edge Computing (MEC) is a new paradigm with potential to improve vehicular services through computation offloading in close proximity to mobile vehicles. However, in the road with dense traffic flow,...
Cloud-based vehicular networks is a new paradigm to improve the vehicular services through distributing computation tasks between remote clouds and local vehicular terminals. To further reduce the latency and the transmission cost of the computation offloading, we propose a cloud-based Mobile Edge Computing (MEC) offloading framework in vehicular networks. In the framework, efficient computation offloading...
In this paper, we propose CGM-PS, a partial-decentralized, un-starving, work-conservative, and preemptive coflow scheduling scheme to shorten the Coflow Completion Time (CCT) for TCP flows in data center networks (DCNs). In CGMPS, we propose both inter- and intra- coflow scheduling policies. In inter-coflow scheduling, we present P-SEBF, which adopts a connected-graph model based novel concept Partialcoflow,...
Power consumption is a critically important issue for data centers. Virtual machine (VM) consolidation is fundamentally employed to improve resource utilization and power optimization in modern data centers. In general, VM consolidation is formulated as a vector bin packing problem, which is a well-known NP-hard problem. Hence, heuristic algorithms, such as single dimensional heuristics (e.g., first...
A safe and stable web mail is a major component of office automation. However because of the low security, its development in E-commerce and E-government is limited greatly. This text introduces the technical framework and working principles of a secure web mail system based on FreeBSD UNIX together with the problems of stability and security of an enterprise mail system. A Secure web mail system...
This paper realizes the K-Means clustering algorithm in the cloud computing. the MapReduce programming ideas are applied to text clustering in hadoop platform, and improve text clustering processing speed on the basis of ensuring the accuracy of clustering. Experiments prove that the cloud computing can significantly improve the clustering algorithm processing speed.
Distributed storage is a scheme to store data in networked storage services, which is the basis of popular cloud storage solutions. Although this scheme has huge benefits in reducing maintenance and operation cost, it has several security concerns. Among them, malicious file deletion by the storage providers is a top concern. In this paper, we develop a novel error-tolerant solution, ET-DME, to effectively...
As the Internet technology, speech technology progress and development, VOIP gradually become the mainstream of the present and future voice technology. VOIP and operation in IP network application system based on IP other as common security threat and weaknesses, including all the threat from IP network layer. VOIP technology safety problems also gradually revealed, more and more get more extensive...
TCP Incast, also known as TCP throughput collapse, is a term used to describe a link capacity under-utilization phenomenon in certain many-to-one communication patterns, typically in many datacenter applications. The main root cause of TCP Incast analyzed by prior works is attributed to packet drops at the congestion switch that result in TCP timeout. Congestion control algorithms have been developed...
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the Website, the security of its account is even more a focus of network security. According to the encrypt and encryption algorithm characteristics of database, to protect the security of database account , method...
The paper raises a load schedule strategy of web server cluster, which comprehensively applies the multistage fuzzy system and the technique of artificial neural network to carry on fuzzy prediction for the user request of response delay, as considering prefix caching and patch prefetching technology of the Web node server, raises the load schedule algorithm based on the threshold value of response...
It has been a challenge as how to apply effective knowledge management tools in information systems for modern libraries that deliver the most up-to-date, relevant information to end users in a quick, efficient, and user-friendly manner. In this paper, the author presents the design of a library catalogue by principally using open source software. The integrated web-based library system takes client/server...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.