The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud resource management research and techniques have received relevant attention in the last years. In particular, recently numerous studies have focused on determining the relationship between server-side system information and performance experience for reducing resource wastage. However, the genuine experiences of clients cannot be readily understood only by using the collected server-side information...
To guarantee quality of the service, services need to be tested to ensure the service quality. But most of existing testing service can't provide multi-type testing and deploy testing clients concurrently in different regions. To overcome these problems, in this paper, a cloud testing service combine cloud computing and multi-testing tools is proposed. Using the proposed service user can deploy the...
The purposes of this study were two folds. First was to design three strategies to help elementary school children reading science expositories online with the supports of an annotation system. The "iRuns" strategies were proposed based on the SOI model of Reading expository text [1] to include (1)"underline" for selecting main ideas, (2)"annotation for connection" to...
Bees Algorithm is a population-based method that is a computational bound algorithm whose inspired by the natural behavior of honey bees to finds a near-optimal solution for the search problem. Recently, many parallel swarm based algorithms have been developed for running on GPU (Graphic Processing Unit). Since nowadays developing a parallel Bee Algorithm running on the GPU becomes very important...
The Hadoop Distributed File System (HDFS) is used to solve the storage problem of huge data, but does not provide a handling mechanism of duplicate files. In this study, the middle layer file system in the HBASE virtual architecture is used to do File Deduplicate in HDFS, with two architectures proposed according to different requires of the applied requirement reliability, therein one is RFD-HDFS...
Human has entered the ¡§cloud age¡¨ today, many resources can be put into cloud for further using and exploit. However, putting confidential data or private data to the public cloud has the security issue. Moreover, the construction cost of typical cloud storage is too high and need a lot of management effort of hardware, which is not affordable by person, SOHO and small companies. They need low cost...
With the popularization of the Data-Over-Cable Service Interface Specifications (DOCSIS) product, many devices have been installed in client sides. the issue of how to maintain the quality while providing quick repair becomes more and more important. in some practical circumstances, the cable modem may lose the factory data which include the calibration table and the digital certificates. These data...
¡§Cloud computing¡¨ has been popular in recent years, more and more service provider proposed cloud services especially cloud storage service. However, one of the worrying problems is data security. in this thesis, we proposed a whole service named SSTreasury+ which includes encryption application and cloud storage service. the user's data before uploading to the cloud could be encrypted first to...
In Taiwan, the famous bloggers can be regard as professional writers now. More and more people subscribe their RSS (Really Simple Syndication) to receive updated information. But readers might only interest in few categories of articles, readers need to filter other articles by themselves. In order to help people select the information they want, this research proposed a two-layer SVM classification...
Nowadays, the authentication methods of physical access control such as key, smart card, and OTP (One Time Password) card require extra hardware, and it is not easy to be aware of if they are lost because of the low using rate. Nowadays, mobile phone is one of the most common used and carry-on device. It would be detected in a shorter time when a mobile phone is lost because it was frequently used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.