The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularity of virtualization, the problem that how to manage hundreds even thousands of virtual machines running on multiple physical computing nodes becomes important. Current virtual machine management systems only can obtain basic information of virtual machines and execute simple operations on them, such as start, reboot and shutdown. In this paper, we design a virtual machine management...
The load-balancing and server-consolidation policies extensively used by previous virtual infrastructure management tools for cloud-based resource pools, make VM deployment decisions based solely on the demands from the physical resource layer, neglecting the impact of the complementary effects among virtual peers within a distributed service system. On the contrary, this paper provides an efficient...
Nowadays, as the fast growth in population of p2p VoD system, user behaviors are playing an increasingly crucial role for the performance of system. In this paper, the user watching and sharing behaviors of p2p VoD system were studied by analyzing a large amount of real data. Then, a comparison between user behavior in p2p VoD system and other main kinds VoD systems was made. After that, a mathematic...
Increasingly, today's mobile devices provide users a high level of convenience and flexibility. But, mobile devices are vulnerable to theft and loss, greatly increasing the likelihood of exposing sensitive data. To address this problem, Corner and Noble gave the concept of transient authentication and built a wearable token system, called ZIA system. In this paper, we design a new wearable token system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.