The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the ever increasing demand on computational and storage resources to deal with tremendous growth of big data, clients tend to outsource their data mining tasks to cloud service providers. Nevertheless, concerns of data integrity, security and privacy are also on the rise: how can the clients with weak computational power verify the integrity of mining results returned by the server while preserving...
We constructed a new secure searchable encryption scheme aided by a computationally powerful but untrusted cloud server. Our scheme allows a client to provide a single search token to the server, but still allows the server to search for that token's word over all the documents he can access that encrypted with different keys. We achieved the scheme using multikey fully homomorphic encryption (MFHE)...
To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage together with data integrity checking and failure reparation becomes critical. Recently, regenerating codes have gained popularity due to their lower repair bandwidth while providing fault tolerance. Existing remote checking methods for regenerating-coded data only provide private auditing, requiring...
Hadoop Distributed File System (HDFS) has been widely adopted to support Internet applications because of its reliable, scalable and low-cost storage capability. Blue Sky, one of the most popular e-Learning resource sharing systems in China, is utilizing HDFS to store massive courseware. However, due to the inefficient access mechanism of HDFS, access latency of reading files from HDFS significantly...
Design patterns have been widely accepted as a solution for solving recurring design problems in object-oriented development. Reifications of design patterns can vary from one development environment to another, and use of inappropriate reifications may impose a serious threat to quality of a software system. In this paper, we propose an approach to applying the profile mechanism in reifying a design...
Digital ocean prototype system is a key part of the China digital ocean information basic framework and the basic integration platform for China ocean information management and application. The purpose of marine environment data warehouse is to provide comprehensive and multiple marine information services. This paper proposed distributed marine environment data warehouse construction, and gives...
Instead of the original wired IP networks, the mobile networks are used as the return channel in IP-QAM VOD system to take the advantage of their wireless data communication function and full coverage in cities. The mobiles are used as a virtual remoter of STB for demanding video programs and controlling their playing. The function of complex query for programs can be realized based on the mobile's...
The next generation digital video broadcasting network of China will aim at connections of regional metropolises, which introduces problems of content protection among operators. So it is crucial to solve the problem of stream media services for encrypted programs. This paper proposes a time-shifted TV scheme for encrypted DVB programs, in which linear adaptive prediction model is adopted. Suitable...
Caching can improve the browser's efficiency, this paper proposes one distributed sharing model of the browser cache: each end-host's address and the Web site URL address are mapped to the identical key space, the storing information of the shared cache mapped to key k is saved on the same key k mapped end-host; it also presents a distributed lookup protocol with a constant O(1) hop per lookup request,...
In this paper, we present a formal model of Web services transport layer based on CSP which addresses multiple transport, multiple Message Exchange Patterns (MEPs) and dynamic switching among multiple transport protocols. This approach abstracts message transferred over networks as transport object and splits message transportation process of a transport protocol into two CSP processes: a transport...
What we are proposing in this paper is the concept, architecture and application of a Web-based simulation meta-synthesis (WebSMS). The motivation of the WebSMS system is to provide services for distributed and secure sharing and reuse of resource, distributed collaboration, and distributed execution and observation of simulation. In this paper, our initial work designing and developing a web-based...
In this paper, we present an adaptive transport framework which addresses multiple message exchange patterns (MEPs) and transparent switching between multiple transports for Web services. In the framework, we separate the transportation process into transport input stage and transport output stage by using pipelined pattern. Moreover, we introduce a set of abstractions, such as transport protocol,...
The Web services technology has been initiated by industry, and lots of large companies are working on Web services technology and apply it in real world applications. However, the existing Web service registration and discovery are processed in a centralized approach, which cannot easily scale to a growing number of users. With the advantages of scalability and fault-tolerance, P2P technology is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.