The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the limited computing resources in mobile devices, it is desirable to offload the computation intensive and time sensitive tasks to the network edge. This paper aims at optimizing the total consumption cost incurred by the usage of the limited computational resources in mobile edge (e.g. small cell, access point, macro base station) while satisfying all the computational demands from each network...
Modern datacenters involve a rich mix of workloads, each of which puts forward different service-level objective, including high throughput, low latency, etc. Currently, most datacenters introduce statistical multiplexing technology and oversubscription to the network design for lowering the total cost, which can easily lead to the occurrence of network congestion (loss), especially when the network...
Recently, iBeacon is popular used in many fields to push notification to visitors or customers by smart phone APP installed beforehand. Local culture protection organization, such as museum, historic relics park, etc., has the task to disseminate local culture via new IT. iBeacon and smart phone APP, two hotspots research, can be used to push and illustrate local culture information. This research...
Byzantine fault is the fault that can make the components behave arbitrary and may cause disastrous results. With the increasing malicious attacks and software errors, Byzantine fault tolerance has begun to draw more attention it deserves. Previous Byzantine fault tolerant algorithms have strong assumption that all the replicas is synchronous and do not support replicated calling services, which make...
For information island of traditional learning platform, a collaborative learning platform model has been proposes. Analysis the structure and working principle of the open source portal platform-Liferay Portal, the standards and models of Web components Portlet. And the design the structure of the model, using Liferay binding model developed digital learning platform successfully. The practical application...
Recently, Hadoop Distributed File System (HDFS) has been widely used to manage the large-scale data due to its high scalability. HDFS can natively support sequential queries, which are the most common queries in the applications. However, there still exist many applications that need to apply random queries of large-scale data. So the random queries in large-scale data are becoming more and more important...
Distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in Alibaba, is driven by observations of specific application workloads, internal demands and technological environment. In such systems, the metadata service is a critical factor that can...
This paper discusses DNS and its security extension and analyze its lack of security. A DNS system based on Byzantine fault tolerance is proposed .The DNS system is able to tolerate Byzantine fault tolerance using redundant servers and Byzantine intrusion tolerant technique and voting mechanism. With the method of distributing zone table into several DNS servers, using an improved Byzantine fault...
This paper presents a Byzantine fault tolerant protocol for composite Web Services. We extend Castro and Liskov's well-known practical Byzantine fault tolerance method for the server client model and Tadashi Araragi's method for the agent system to a method for the composite Web Services. Different from other Byzantine tolerant methods for single web service, in composite Web Services we have to create...
Current advances in portable devices, wireless technologies have created a mobile computing environment which is characterized by a large scale of dynamism. But mobile computing is quite different from traditional middleware while addressing the dynamic and pervasive aspects of mobile systems. This paper represents the experience of our project related to next generation middleware systems, with high...
In college, based on the existing network storage, full use of IP networks, increasing support for IP networks supporting ISCSI IP storage routers and disk array devices. School information construction strive to build a high-performance, high reliability, low cost and scalable storage solution. To make the new IP-SAN can be seamlessly linked to an existing FC-SAN, college campus network to optimize...
Recent success deployment of P2P streaming can provided hundreds of media channels of users at any given time. This evokes an interesting question can the streaming server allocate channel resources efficiently with limited capabilities? In this paper, we propose an auction-based new strategy for resources allocation. The mechanism enable streaming server can provide service according to peer's bidding...
Grid computing has a significant impact on the next generation information infrastructure where job schedules plan an important role. High performance grid schedule must select the appropriate resources which meet the requirement of the clients and ensure the jobs can be finished within deadline. However, current time-based grid schedule only consider part of the time factors to estimate the job execution...
A scheme of constructing shipping monitoring and control system has been provided: consists of monitor and control center, data communications, ship-borne terminals and user terminals; Hardware Structure of ship-borne terminal has been discussed: consists of central processing unit, GPS module, GPRS module, memory modules, I/O interfaces, keyboard and display modules etc. And the overall structure...
The material control plays an important role in current discrete manufacturing industry. Commonly, modeling the material flow is a very complex work in the assembly line. In this paper, an event-based material control modeling is proposed to model the material flow in detail. The static elements of production line and the dynamic events are modeled. The implementation technology is also discussed...
Wireless distributed network is a distributed system based on wireless communication technology to achieve resource share and cooperation. With the gradual consummation of wireless communication network, wireless distributed network has played a more and more important role in distributed testing and controlling field. SMS is a simple text transfer protocol on GSM network. It has been widely used...
Faults and failures are the biggest obstacles that limit high-performance computing systems (HPCs) to exert their functions and performance. To minimize or dispel their influences, the HPCs must be supervised to obtain correlative information in time, according to which effective actions could be taken as soon as possible. To probe into this solution, an integrated fault-supervising system (IFS) designed...
With the rapid development of computer network, constructing enterprise information system has been improved greatly. When designing information system for certain enterprise, we usually compile it with some standard components instead of developing a thorough new version. This presents us some new problems, for example information overload, complicated system, data conflict and so on. If the components...
DNS was not designed to be secure. The biggest security hole in DNS is the lack of support for data integrity authentication, source authentication, and authorization. In this paper, a secure DNS scheme based on intrusion tolerance is proposed. This secure DNS is intrusion-tolerant by using Byzantine intrusion tolerant technique and voting mechanism. The scheme provides high integrity, robustness,...
The Internet-based robot is a popular topic in robot control research recently. A platform build to provide information for robot can increase its intelligence and performance of teleoperation greatly. This paper implements the robot system based on the Robot Autonomous Perception Model (RAPM) can get the information on the Internet through autonomous perception, optimize paths based on Genetic Algorithms,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.