The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secure and efficient data storage and computation for an outsourced database is a primary concern for users, especially with the push for cloud computing that affords both compute and resource scalability. Among the diverse secure building blocks for secure analytical computations on outsourced databases, the encrypted set intersection operation extracts common sensitive information from datasets...
Large scale data centers and Plug-in Electric Vehicles (PEVs) are valuable assets that can be used to balance power grid frequency by adjusting their power consumption. This paper considers the joint power management of a data center and the PEVs of its employees for frequency regulation. The problem involves designing a real-time power control strategy for the integrated assets to collectively track...
Frequency regulation is a major market service to reduce the undesired imbalance between power supply and demand in the power market. In order to participate in the regulation market, both the supply and demand sides need to be capable of flexibly adjusting their power generation and consumption, respectively. As the scale of Internet data centers is increasing rapidly, their significant power consumption...
Live migration of virtual machines(VMs) is widely used for system management in virtualized servers. When the loads increase and SLAs of some applications are violated, dynamic migration of virtual machines across physical machines (PMs) has the potential to ensure a high level of meeting the SLAs. Because of consuming extra CPU and bandwidth, application performance may be degraded during the migration...
In order to enable users to get instant messages with mobile phone equipments at any time and any place, a new platform of XMPP-based SMS gateway was put forward. The designation and implementation of XMPP-based SMS gateway were introduced in detail. A further deep analysis on the format of XMPP message was made to make sure the rationality of the extension of XML. Meanwhile, controlling of GSM modem...
This paper introduces the main technologies of software code protection for .NET, and analyzes their advantages and disadvantages. On the basis of analyzing new demands of .NET software protection, we point out the necessarily and possibility of the trend from code protection to software licensing protection. Then a cloud licensing protection model for .NET software combining code protection with...
This paper described a new geothermal intelligent management information system for the development of geothermal resources with the character of geothermal development and exploitation. The geothermal intelligent management information system includes nine powering module such as the GIS(Geographic Information System) second development module, visual management module, communication module, the...
Web-based services involving dynamic computation of the content are increasingly used on the Web. This computation may not only involve processing, but often involves access to other back-end services typically for database access. These multi-tiered Web-based services have different characteristics than traditional Web content and new models need to be considered not only how to manage them, but...
IP traceback can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP traceback system has ever been deployed because of deployment difficulties. In this paper, we present an easily-deployable light-weight IP traceback based on flow (EasyTrace). In EasyTrace, it is not necessary to deploy any dedicated traceback software and hardware at routers, and an...
The construction of massive multiplayer online role-playing games is an intuitive challenge. After years of typical research into Markov models, we argue the exploration of wide-area networks, which embodies the compelling principles of steganography. In this paper we use trainable information to demonstrate that robots can be made client-server, stable, and replicated.
SaaS (software as a service) is a new software development mode. It has drawn many IT workers' attentions. Its core concept is that transform from developing softwares into developing services in the process of software development. And the applied SaaS mode developed system can provide the users with a greater operating space, and it can be more meet the needs of users. In the SaaS application system,...
Wireless monitor system are widely used in recent years, but there are a few problems to solve, such as scalability and adaptability, and monitor system based on MANET has more difficulties because of multi-hop links and mutable channels. A new MANET monitor system based on Service-oriented architecture (MMS-SOA) is proposed to make the system easier to manage dynamically such as dynamic deployment,...
SOA (Service-Oriented Architecture) is a design principle that can help application easily deal with the ever-evolving market conditions of a business. WCF (Windows Communication Foundation), developed by Microsoft, is an ideal SOA implementation platform. This paper firstly researches WCF technology, then MVP (Model-View-Presenter) pattern is analyzed for further loose coupling; finally, a multi-layer...
Exhaustive key search is a simple and effective way to crack a cryptosystem, but it often causes large time and space consumption. From the original time-space trade-off method to the rainbow chain method, all of the algorithms are improvements of the exhaustive key search, whose objectives are to achieve the balance between the crack time and the storage memory. As the popularization of the strong...
The computer network engineering course, one of essential and popular courses to train the network engineer, requires students to master comprehensive theories on network engineering and experienced practice skills. In this paper, we propose the failure case study method for teaching the computer network engineering course. The applications of the failure case study method are presented with six examples...
In view of demand of easy to use and efficiency of antispam system, a spam filtering platform PEMF, POP3 Proxy Platform for E-mail Filtering is designed. PEMF is a universal platform compatible with different content-based methods; it achieves transparency connection between e-mail server and email client through asynchronous connection; it uses thread pool mechanism and Overlapped I/O model of Event...
Distributed Virtual Environment (DVE) systems have become more and more important both in academic communities and the industries. To guarantee the load constrain, the physical world integrity and the virtual world integrity, the virtual environment should be divided into several parts and mapped to multiple servers, which are located in geographically different places. Many centralized algorithms...
In distributed virtual environment (DVE) systems, a distributed server infrastructure is often used to reduce the latency between servers and clients. Under this infrastructure, mapping clients to proper servers is one of the key issues for improving the interactivity and overall performance. Most traditional methods of mapping the clients to servers only consider the load balancing problem. However,...
To improve the survivability of distributed storage systems, using the theory of similarity transformation of Jordan standard shape in theory of matrix, combining the method of Lagrange interpolation method, we design a safe and high-efficient data distributing algorithm with (r,n) threshold scheme. This algorithm has higher efficiency, stronger security and survivability than reference. It has important...
Providing rich data collaboration services in conferencing system is vital to the success of SIP-based communication system. It not only presents design and implementation challenges, but also gives an opportunity to develop rich and innovative collaboration services conveniently to provide users with novel communication experience. In this paper we present an extended data collaboration mechanism...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.