The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid evolution of technologies makes it possible to create remote laboratory for research and educational purposes. This paper presents a testbed that can conduct experiments following commands from a remote client. It is a small-scaled intelligent transportation system (ITS) testbed which can collect data, perform configuration and control the radio-controlled (RC) car. The remote client can...
With the rapid development of information technology and the Internet, resulting in a large number of moving object location data, the application of moving object location service is also expanding, such as GPS positioning, the car navigation, position sensor, search and rescue system. More and more location data is being collected, published and used, which may contain the moving object privacy...
Users always wait to be served by Web service in the community. The cost of Web service community is increased due to the users queue up in the community will consumes resources. In this paper we research on setting optional number of Web services in the community in order to make the cost of community be minimum. A solution was proposed based on both theory of queue and marginal analysis method....
As cloud computing goes, How to provide a security cloud becomes an important problem. Virtual networking plays an important role in cloud computing infrastructure. To identify which node is a critical node become an important research question. In this study, our team analyzed the fat tree network and small-world network, and proposed a network modeling method for the virtual networking. On this...
For Security-Critical Wireless Sensor Network (SCWSN), security should be given priority in design. In this paper, we analyze the essential security demands for security-critical WSN. Then, we propose our integrated approaches, which are built based on security service and management, to achieve security for security-critical WSN. Finally, we describe how our security solution works against typical...
Understanding the structure and dynamics of the user behavior networks that connect users with servers across the Internet is a key to modeling the network and designing future application. In this paper, we obtained the result that the out-degree distribution of clients (the host initiating the connection), the in-degree distribution of servers (the host receiving the connection) are approximately...
The multi-domain virtual environment is an important research area of the distributed virtual reality. However, frequent interaction, great quantity of messages and the discrepant need of each individual simulation domain resulted in numerous redundant messages. In this paper, we propose a Publish/Subscribe based correlative matching method for multi-domain virtual environment. This method focus on...
Workflow job is composed of several ordered subtasks which invoke different computing services. These computing services are deployed on geographically distributed servers. Towards Workflow Job Management, how to schedule workflow jobs to achieve high server resource utilization and how to ensure Quality of Service (QoS) pose several challenges. In the paper, an autonomic Performance-Aware Workflow...
In the Long-distance Medical System, experts scheduling of collective consultation is a key part. On the basis of systematic analysis, we established a mathematical model of scheduling algorithm and described the algorithm. The algorithm is realized with less waiting time to achieve greater collective diagnosis, but also maximize the number of experts participating in each collective consultation,...
Internet has provided many confinement services to all of us, sometime we need compare all the similar services or products to decide which one is the best for us. However, most of current web browsers don't render any comparing function for user. People have to manually extract the information on the pages then compare them. In this paper, first introduce the critical item comparing scheme then we...
In e-science environment researchers can submit complex tasks as scientific workflows. However, because the network may be blocked or even interrupted sometimes, it can hinder the researchers to submit tasks, as well as the overload on the server. Additionally, many tasks submitted by researchers may use the same resources, which may result in the overload of the specific resources. Meanwhile, some...
Driver car-following control is a quite common activity in driving. Modeling driver car-following in a cognitive architecture can contribute to driving-related human factors research. Queuing network-model human processor (QN-MHP) is a computational cognitive architecture developed to represent human information processing as a queuing network on the basis of neuroscience and psychological findings...
Compared with the RSA used in PKI, identity based encryption (IBE) can provide the same security with lower computation consumption and remove the need for certificates. However, there are still many problems of IBE when it is in the rush to market and just few successful business solutions were presented now. In this paper, we first propose a practical IBE application architecture. Then, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.