The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually...
The Radio Resource Control (RRC) state machine has been widely studied to improve application performance and reduce the energy consumption of smart phones. We observe that even a smart phone remains in the RRC state, there may still exist some significant performance change if it simultaneously carry on voice and data services. For example, the Round Trip Time (RTT) will get larger when a voice call...
For better understanding user information needs, Google proposed the Knowledge Graph as supplements to the results returned by its search engine. Many search engines have also developed their own knowledge graph services. However, although there are many freely accessible structured datasets, such as Freebase, developers have to build the knowledge graph from scratch without any support from open...
Preventing networks from being attacked has become a critical issue for network administrators and researchers. With the popularity and variety of large-scale zero-day threats over the Internet, security companies have to keep on inserting new virus signatures into their databases. However, the increasing size of virus signature file is dragging computers to a crawl during the virus scan. To effectively...
Multi-resource sharings among virtual machines (VM)are very important in data center, but also bring contentions for cache, disk and network in host server. Recent studies focus primarily on locally optimizing resource sharings in a single server, or global optimization of mitigating cache and memory contentions. But it remains an open question how to efficiently find optimal co-schedules for cache,...
Warehouse data center is very large scale and complex, which constains tens of thousands servers and accomodates various applications. What's more important, energy consumption has risen to a critical point. Scheduling needs to maintain performance and reduce energy consumption as much as possible. Previous researches have proposed RL (reinforcement learning) as a solution. These approaches have reduced...
Large-scale storage systems may service millions of clients. Effectively identifying and authenticating these clients can not only prevent illegal accesses but also eliminate unnecessary redundancies of access control. However, existing security solutions have largely ignored the identification and authentication issues or separately consider them from access control mechanisms. As a result, these...
eDonkey has become the most reliable and popular P2P file sharing software with largest users. But currently it is still a problem that how to find resources you need exactly and quickly. The traditional searching method which is based on keywords cannot fulfill the needs of people. The effective and promising method is semantic searching. Semantic-based study has become one of hot spots in the nature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.