The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High reliability, efficient I/O performance and flexible consistency provided with low storage cost are all desirable properties of cloud storage systems. Due to the inherent conflicts, however, simultaneously achieving optimum on all these properties is impractical. N-way Replication and Erasure Coding, two extensively-applied storage schemes with high reliability, adopt opposite and unbalanced strategies...
The network traffic has been growing explosively in recent years after users can watch the high quality video from the Internet. It is an important issue to reduce network traffic and increase the user quality of experience (QoE). Therefore, there have been in-network caching schemes to cache the content fetched by users in proxy servers. Recently, software defined networking (SDN) was proposed to...
The establishment of the seafloor cabled observatory network will help to learn how the ocean operates. This study reports the design of a shore-based terminal for the OUC-Raman (OUC: Ocean University of China) instrument node in an observatory network. Based on Raman spectrometry, it is used to detect radical ion in situ. The shore-based terminal is divided into three main modules: communication...
The existing music projects terminal are mostly websites that computer can access, the mobile client and rare television set-top box terminals. Under the new forms of triple play, network music system of integrated information system supports three nets four terminal and with key technology such as network music creation, transmission and display and so on. In computer, mobile phone, radio and television...
Today's cloud storage services must offer storage reliability and fast data retrieval for large amount of data without sacrificing storage cost. We present SEARS, a cloud-based storage system which integrates erasure coding and data deduplication to support efficient and reliable data storage with fast user response time. With proper association of data to storage server clusters, SEARS provides flexible...
Numerous enterprises are migrating their applications onto cloud platforms to gain benefit from cloud computing technology. These applications are composed of several service components with complicated dependency structures, especially for network applications which commonly take serial collaboration of service components. We call a group of VMs belonging to the same application a VM family. Finding...
High reliability, low space cost, and efficient read/write performance are all desirable properties for cloud storage systems. Due to the inherent conflicts, however, simultaneously achieving optimality on these properties is unrealistic. Since reliable storage is indispensable prerequisite for services with high availability, tradeoff should therefore be made between space and read/write efficiency...
In order to achieve secure authentication, an asynchronous challenge-response authentication solution is proposed. SD key, encryption cards or encryption machine provide encryption service. Hash function, symmetric algorithm and combined secret key method are adopted while authenticating. The authentication security is guaranteed due to the properties of hash function, combined secret key method and...
Mobile applications are widely used in many research areas as well as in current daily life. Applications on smart phones are closely related to the physical device. An application may run differently on different mobiles. It is hard and expensive for college students to adapt and test their applications on several types of smart phones. This paper presents a work in progress on the development of...
The Access Grid (AG) is one of the most widely used technologies for building advanced collaborative environment, and a distributed collaborative Augmented Reality (AR) environment has been established with AG and AR technologies. In such distributed shared environment, one of the most difficult tasks is maintaining a consistent view of the shared AR scene among all participants. This paper presents...
Job Management is the important step that the teacher instructs students. In order to realize job submission in the computer room of low configuration, this paper brings forward the job submission system based on VB and BPFTP Server, analyzes the setting methods of user management, and illustrates the implementation process of job submission.
Hadoop Distributed File System (HDFS) has been widely adopted to support Internet applications because of its reliable, scalable and low-cost storage capability. Blue Sky, one of the most popular e-Learning resource sharing systems in China, is utilizing HDFS to store massive courseware. However, due to the inefficient access mechanism of HDFS, access latency of reading files from HDFS significantly...
With the development of internet technology, the entire amount of data on the internet has shown the explosive growth. Some researchers have paid their attention to find an effective way to store and manage these data. In this paper, we introduce a load rebalancing algorithm to solve the load balancing problem among all chunk servers(compute nodes) in the distributed file system; it also ensures that...
How to rapidly disseminate a large-sized file to many recipients is a fundamental problem in many applications, such as updating software patches and distributing large scientific data sets. In this paper, we present the Bee protocol, which is a cooperative peer-to-peer data dissemination protocol aiming at minimizing the maximum dissemination time for all peers to obtain time-critical data, such...
SSL is a protocol which provides effective security for Web transaction. This paper introduces the principle of standard SSL handshake protocol and analyzes its performance at first. Then a CSK (combined symmetric key) based SSL handshake protocol is proposed. This protocol uses CSK technology to authenticate both communication sides and uses symmetric key to encrypt/decrypt the secret information...
A digital documents management scheme based on three-layer structure is presented. Symmetric cryptography, combined key and hardware encryption technology are adopted to implement the functions of encryption, digital signature, authentication and authorization. Therefore, the security of digital documents is guaranteed. Documents management system based on the above technique can be easily integrated...
Proposal of cloud computing is tightly coupled with low cost. Reduction of cost is considered as an important advantage of cloud. However, there are no available tools proper for cost calculation and analysis in Cloudenvironment. This paper presents our efforts towards filling in the gap. We format suits of metrics and formulas for the calculation of Cloud Total Cost of Ownership(TCO) and Utilization...
The wide spread of worms poses serious challenges to today's Internet.Various IDSes (intrusion detection systems) have been proposed to identify or prevent such spread. These IDSes can be largely classified as signature-based or anomaly-based ones depending on what type of knowledge the system knows. Signature-based IDSes are unable to detect the outbreak of new and unidentified worms when the worms'...
Memory detection computation, data intensive applications, demands large computing resources. Mainframes are usually used to accelerate its computation. However, this solution seems to be costly. In this paper, we present an alternative approach of using desktop grid, using PC computers' idle CPU time, to realize parallel processing of memory detection. In order to demonstrate the effectiveness of...
In allusion to construct CAD system integrating based on the traditional technologies indicates some prominent problems; this paper brings forward Web service-based service-oriented architecture to integrate CAD system. According to the special task requirement and characteristic of design and analyses, we put forward a new approach for integrating CAD system to adopt Web service-based service-oriented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.