The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Locator/Identifier Separation Protocol (LISP) separates classical IP addresses into two categories: one for identifying terminals, the other for routing. To associate identifiers and locators LISP needs a specific mechanism, called mapping system. This technology is still at an early stage but two experimental platforms have already been deployed in the Internet: LISP Beta Network and LISP-Lab...
This work focuses on how to provide the best virtual desktop technology, virtualization performance and hardware in the computer classroom. There are using the three popular virtualization technologies in the same environment to establish the same conditions, pure performance comparison: VMware Horizon, Citrix XenDesktop, and Microsoft VDI. Test software used to the current popular software, system...
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator. In this paper, based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviors, we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers...
Dynamic Adaptive Streaming over HTTP (DASH) is currently a widely adopted technology for video delivery over the Internet. DASH offers significant advantages, enabling users to switch dynamically between different available video qualities responding to variations in the current network conditions during video playback. This is particularly interesting in wireless and mobile access networks, which...
Apache Cassandra is an open-source cloud storage system that offers multiple types of operation-level consistency including eventual consistency with multiple levels of guarantees and strong consistency. It is being used by many data-center applications (e.g., Facebook and App Scale). Most existing research efforts have been dedicated to exploring trade-offs such as: consistency vs. Performance, consistency...
More attention has been paid to congestion control in the emerging area of wireless sensor networks (WSNs). However, most of the existing congestion control schemes are based on the best-effort data transmission service model. When networks congestion occurs, different categories of traffic are discarded indiscriminately, therefore, users' Quality of Service (QoS) is not able to be guaranteed. In...
Aiming that now most of Web 1.0 websites are not updated to 2.0 because of cost and time, the paper designs a architecture of Web 2.0 Launch Tool + Management Server to update Web 1.0 website to 2.0 more easily and quickly, which was developed with asynchronous interaction, no refresh of AJAX and Connection pool technology, XHR and DWR. The reality proves this system is very convenient. The technology...
Next generation network on the high speed train is aimed to achieve high mobility, broadband and large data rates as required. However, the wireless signal has been proved instable due to high doppler shift, poor weather conditions and various geography environment. In this context, the e-business on the high speed train has to face a few e-business quality problems for wavy data rates and transmission...
This paper applies the multi-agent system Strategy to collaborative negotiation in manufacturing supply chain coordination. Multi-agent computational environments are suitable for studying a broad class of coordination and negotiation issues involving multiple autonomous or semiautonomous problem solving agents.
Due to the rapid growth of mobile networks, many advanced applications have been deployed. However, security of data will be an important factor for their full adoption. Most of these applications will be utilized on resource constrained devices, which makes security protocols currently used in wired networks not fully applicable to mobile networks. Recently, a number of key agreement protocols have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.