The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fog computing is a promising architectural pattern to reduce the amount of data that is transferred to the cloud for processing and analysis. In this paper, we study fog-assisted data streaming scenario in which fog nodes at the network edge share their spare resources to help pre-process raw data of applications hosted in the cloud. A distributed resource sharing scheme is presented where the software...
A variable tap-length LMS algorithm based on adaptive parameters for tapped-delay-line (TDL) structure adaption is proposed in this paper. The objective of this work is to overcome some drawbacks of previous variable tap-length adaptive filter algorithms, including slow convergence speed and high sensitivity to noise. Novel tap-length iteration equation based on adaptive parameters and arctangent-limited...
Consolidation virtual machine (VM) on fewer physical servers is an efficient way to reduce energy consumption in data center. However, VMs often have inherent dependencies which bring complex load interactions among the underlying physical servers. Unreasonable migration will lead to a decline in network performance. In this paper, aiming at energy saving, we propose an application-aware policy in...
Cloud computing has been more and more popular and widely used as a new model of information technology. In order to achieve a reliable and efficient operation of the cloud environment, it is important for cloud providers to detect and deal with system anomalies in time. In this paper, we present a method for anomaly detection in MapReduce environment. This method is based on peer-similarity and uses...
With the development of the cloud computing technology, more and more cloud platforms support elastic buying patterns of computing resources. Today, customers can adjust the amount of resources bought from cloud providers according to the changes of application needs. It is important to efficiently determine a capacity plan according to a number of computing instances provided in the market with different...
By borrowing ideas from a cryptographic algorithm of low key authentic degree, a novel steganographic method based on keyword shift is presented. The master key of the method is to shift the sensitive keywords in the text. The conditions to guarantee the reversibility of the method are analyzed and found out, the serviceability of the method in some situations is pointed out. The strong points and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.