The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Commercial large-scale VoD systems such as Netflix and Hulu rely on CDNs to deliver videos to users around the world. Various anomalies occur often and degrade users' Quality of Experience (QoE). Detecting and locating such anomalies are highly complex due to a large number of different entities involved in the end-to-end video delivery. These entities include VoD provider, CDN/Cloud providers, transit...
Cloud computing provides a new opportunity for Video Service Providers (VSP) to running compute-intensive video applications in a cost effective manner. Under this paradigm, a VSP may rent virtual machines (VMs) from multiple geo-distributed datacenters that are close to video requestors to run their services. As user demands are difficult to predict and the prices of the VMs vary in different time...
Depending on the user's attribute, Cipher text-Policy Attribute-based Encryption (CP-ABE) can achieve user's access control which can be widely used in cloud environment. The extended CP-ABE mechanism with multi-authorities (MA-ABE) is de-signed for the practical application. In all existing schemes, the user needs to execute the whole decryption operation. For mobile devices, it is time-consuming...
We have investigated the design of a secure collaboration platform to support real-time information sharing across professional and organizational boundaries in the context of emergency animal disease response. The platform integrates cross-organisational eAuthentication and eAuthorisation technologies to enable access control of shared data resources between geographically distributed experts in...
In this paper, we propose a cloud-assisted network coded packet retransmission approach to reduce the number of packet retransmission in wireless multicasting. It is shown that the efficiency of packet retransmission can be significantly improved if we include network topology information (e.g., Network connectivity) during the encoding process of network coding. We leverages the capability of software-defined...
As VoD systems migrate to the Cloud, new challenges emerge in managing user Quality-of- Experience (QoE). The complexity of the cloud system due to virtualization and resource sharing complicates the QoE management. Operational failures in the Cloud could be challenging for QoE as well. We believe that end users have the best perception of system performance in terms of their QoE. We propose a QoE...
Cloud computing offers lots of attractive benefits to individuals and organizations. However, the adoption rate is a far cry from what it really deserves. Lack of well defined Service Level Agreement (SLA) is one of the key factors. This research aims to provide better understanding of the status quo of the current public cloud service level agreements and to recommend best practices. We conducted...
This paper proposes a scheme that automatically adds access control code to web service programs. The scheme simplifies the tasks of the programmers. It uses a fine-grained access control policy to control the access to data. The proposed scheme is more flexible than existing schemes in setting access control policies on data. The scheme automatically tracks the flow of data in the server programs...
At present, the network security technology is single function, mutually independent, and difficult for system management. They cannot be trusted completely as the solutions of network intrusion behavior. This article proposed a kind of structure framework which consists of both the honeynet and intrusion detection technologies. By applying this method, we can achieve the purpose of improving network...
A queuing system with dual services, i.e., the primary service and the auxiliary service, is considered in the present article. The server has to allocate part of its capacity to process the additional service when the auxiliary service is requested. We show that the possible optimal auxiliary capacity is actually on the convex envelope of the auxiliary cost function. Also, the optimal control policy...
We consider an M/M/1 queueing system with auxiliary service in addition to primary service. When the auxiliary service is requested, the server allocates part of its capacity to process the additional service. We show that the possible optimal auxiliary capacity is actually on the convex envelope of the auxiliary cost function. Also, the optimal control policy is that the allocated capacity for auxiliary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.