The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a decentralized mobility support architecture, with micro-level name resolution, for information centric networking (ICN) to better manage host mobility, and respond quickly to handover events to avoid data loss. Proposed architecture utilizes localized anchors, carrying new data structures, during packet forwarding to aggregate mobile flows and provide a combination of stateful...
In the urban city life, a human usually uses his/her owned user equipment (UE) to request services provided in smart cities. In order for UEs to communicate with the public service providers, the network traffic is generated in the cellular network (e.g. Long Term Evolution (LTE) network) and the Internet very frequently. And the returned results cannot be shared among UEs although they may request...
Many approaches have been proposed to build a unified IoT platform where physical and digital objects are accessible by applications crossing different organization and domains, and are based on IP-overlay architecture. These solutions inherit the constraints of the current internet, especially in terms of naming, heterogeneity, mobility and security. In this paper, we propose a new Information-Centric...
Trust and security have been considered as built-in properties for future Internet architecture. Leveraging the concept of named content in recently proposed information centric network, we propose a name-based trust and security protection mechanism. Our scheme is built with identity-based cryptography (IBC), where the identity of a user or device can act as a public key string. Uniquely, in named...
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric view. JCHVT is able to automatically create a hierarchical view of the software system, which can reflect the relationships among classes, structure of the system and even the roles of...
With the rapid development of Internet and the expanding application fields of network applications, it is not enough to maintain the network security only depend on those professional network technical administrators. In this paper a novel visualization tool based on treemap, which is called NetVis, is introduced to bind the network security technique and general network management together in an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.