The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an emerging technology, Mobile Edge Computing (MEC) is introduced to reduce network delay and provide context-aware services. MEC servers are located in close proximity to users, enabling users to seamlessly access services running on edge facilities. However, capacity and bandwidth constraints of MEC servers limit the number of services to be deployed. Therefore, an important problem is how to...
With the constant increase of multimedia internet penetration as well as rapid spread and sharing of various information, people pay more and more attention to the information related to daily power utilization. In order to realize the interaction between power companies and power utilization information of users, the power companies apply and register their public accounts to establish their own...
Multiple heterogeneous applications concurrently run in distributed cloud data centers (CDCs) for better performance and lower cost. There is a highly challenging problem of how to minimize the total cost of a CDCs provider in a market where the bandwidth and energy cost show geographical diversity. To solve the problem, this paper first proposes a revenue-based workload admission control method to...
Intelligence has become more and more popular, especially in smart grid. Nowadays, the inspection for power elements has changed from a traditional method to a more intelligent way using mobile terminals, which has greatly improved the work efficiency. However, this new method may reveal individual privacy such as workplace, work hours and personal habits, which may become background knowledge for...
NAT (Network Address Translation) traversal is one of the main obstacles to restrict the development of SIP (Session Initiation Protocol). This paper analyzes problems about SIP/NAT traversal and proposes a scheme for SIP operating through NAT with the cooperation of SIP server and RTP relay server and designs the architecture of the relay server according to the characteristics of the mobile Internet...
This paper presents a new method of power payment based on USBKEY, it combine USBKEY hardware security methods and visualization software to provide a quick and easy secure measure of online payment method, meanwhile the integration of CARD Writer will operate electric card at the time when online payment complete, so users who use electric cards will be able to pay electricity bills indoors.
Personal cloud storage is rapidly gaining popularity. A number of Internet service providers, such as Google and Baidu, entered this emerging market and developed a variety of cloud storage services. These ubiquitous services allow people to access personal files all over the world at anytime. With the prevalence of mobile Internet and rich media on web, more and more people use cloud storage for...
Content centric networks (CCN) is a new content-oriented network paradigm. It changes the communication mode from where to what. CCN can realize efficient content transmission and support consumer mobility inherently because of its receiver-driven characteristic. But it cannot handle provider mobility effectively since the movement will lead to the entire routing information updating. In this paper,...
With the development of wireless access technology, many hosts have the ability to attach to multiple networks via Multi-InterFace(MIF). In order to communicate via multiple interfaces simultaneously and select a suitable one for each session, per-application preferences or sophisticated policy managers is implemented in some hosts, both of which are configured by users or controlled externally. Therefore,...
This paper proposes an inter-cloud system architecture that enables a tenant to make use of multiple cloud systems. Since the cloud systems exchange resources flexibly, any failed devices can be replaced immediately even in a catastrophic disaster. The resource exchange interface is a key to implementing this architecture.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.