The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-Defined Networks (SDNs) introduce interesting new opportunitiesin how network routes can be defined, verified, and changed over time. Yet despite the logically-centralized perspective offered,an SDN still needs to be considered a distributed system:rule updates communicated from the controller to the individualswitches traverse an asynchronous networkand may arrive out-of-order, and hence...
In order to save human lives and reduce injury and property loss, Situation Awareness (SA) information is essential and important for rescue workers to perform the effective and timely disaster relief. The information is generally derived from the shared images via widely used smartphones. However, conventional smartphone-based image sharing schemes fail to efficiently meet the needs of SA applications...
Big data has become a hot topic in many areas where the volume and growth rate of data require cloud-based platforms for processing and analysis. Due to open cloud environments with very limited user-side control, existing research suggests encrypting data before outsourcing and adopting Searchable Symmetric Encryption (SSE) to facilitate keyword-based searches on the ciphertexts. However, no prior...
In the smart cities of the future, people expect to gather data from moving vehicles. Due to the existence of malicious users who claim to be in a traffic flow but actually are in others, a location proof for vehicular trajectory-based data needs to be developed. RoadSide Units (RSUs) are commonly used in smart cities, and a vehicular trajectory's location proof can be generated based on messages...
Many group activities can be represented as a complex network where entities (vertices) are connected in pairs by lines (edges). Uncovering a useful global structure of complex networks is important for understanding system behaviors and in providing global guidance for application designs. We briefly review existing network models, discuss several tools used in the traditional graph theory, distributed...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
In the Online to Offline (O2O) taxi business (e.g., Uber), the interests of passengers, taxi drivers, and the company may not align with one another, since taxis do not belong to the company. To balance these interests, this paper studies the taxi dispatch problem for the O2O taxi business. The interests of passengers and taxi drivers are modeled. For non-sharing taxi dispatches (multiple passenger...
Multicast can jointly utilize the network resources when delivering the same content to a set of destinations; hence, it can effectively reduce the consumption of network resources more than individual unicast. The source of a multicast, however, does not need to be in a specific location as long as certain constraints are satisfied. This means the multicast can have uncertain sources, which could...
Changes of network state are a common source of instability in networks. An update event typically involves multiple flows that compete for network resources at the cost of rescheduling and migrating some existing flows. Previous network updating schemes tackle such flows independently, ratherthanas the entity of an update event. They only optimize the flow-level metrics for the flows involved in...
In today's datacenters, resource requests from tenants are increasingly transforming into hybrid requests that may simultaneously demand IaaS, Paas, and SaaS resources. This paper tackles the challenge of modeling and deploying hybrid tenant requests in datacenters, for which we coin "networklet" to represent a set of VMs that collaboratively provide a PaaS or SaaS service. Through extracting...
Hybrid cloud-based deployment is a trend in cloud computing which enables enterprise to benefit from cloud infrastructures while honoring privacy restrictions on some services. Enterprise application migration is an effective way to improve the efficiency of using the cloud infrastructures. However, it is a challenging problem to decide which parts of the applications to migrate and where to migrate...
Recommendation systems usually try to “guess” a user's preferences from the system's view. We study another side of recommendation: active opinion-formation from the perspective of the user. In real life, a user's opinion evolves with time and refines when new evidence occurs. Then, how does an online user form his/her own opinion actively in large social networks? The problem has three challenges:...
Mobile crowdsensing is a new paradigm in which a requester can recruit a group of mobile users via a platform and coordinate them to perform some sensing tasks by using their smartphones. In mobile crowdsensing, each user might perform multiple tasks with different sensing qualities. An important problem is recruiting the minimum number of users while achieving a satisfactory sensing quality for each...
Wireless devices such as sensors have increasingly more processing, storage, and networking capabilities, making wireless sensor networks (WSNs) get lots of attentions in recent years. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of important applications in environmental, military, commercial, health care,...
The vehicle-to-vehicle (V2V) data transmissions in Vehicular Ad-hoc Networks (VANETs) have been applied in many areas including the Internet of Vehicles, mobile data offloading, and mobile crowdsensing. The V2V-based data delivery that is opposite to the direction of a vehicle is called a backward delivery against the traffic flow, and it is blocked by an existing problem: a traffic hole. Under the...
Due to its fast deployment and scalability, cloud computing has become a significant technology trend. Organizations with limited budgets can achieve great flexibility at a low price by outsourcing their data and query services to the cloud. Since the cloud is outside the organization's trusted domain, existing research suggests encrypting data before outsourcing to preserve user privacy. Two main...
With the volume and variety of network attacks increasing, efficient approaches to detect and stop network attacks before they damage the system or steal data is paramount to users and network administrators. Although many different detection mechanisms have been proposed, exiting detection methods generally tend to successfully detect attacks only after the attacks have finished and caused damage...
The air-gap flux in hybrid excitation machine (HEM) can be adjusted flexibly by introducing the auxiliary electric field windings. At present, almost all HEMs employ DC field current to control the flux linked with armature windings, where the bidirectional flux control capability of this structure is not symmetric. In this paper, the reasons of asymmetric problem in HEMs are analyzed, a novel flux...
Datacenter network always needs to be updated so that it can adapt to frequent traffic changes and constantly achieve high network utilization. However, the quality of service can be easily reduced by unexpected transient link congestion, which may be caused by variable link transmission latency during flow migration. Furthermore, when network administrators reallocate bandwidth resource without taking...
In the future Energy Internet, one of the challenging problems faced by microgrids will be the multiple energy management including outer energy exchange and inner energy schedule. This paper proposes a game theory based dual energy scheduling method for microgrids in Energy Internet. The dual energy scheduling problem is formulated as a non-cooperative game, where household users within a microgrid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.