The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networks (SDN) have been utilized in applications of the Internet of Things (IoT), termed as software-defined IoT network, because of the popularity and capability of mobile devices being used for networking in relatively large areas. In a software-defined IoT system, the sensing data are asynchronously harvested by the mobile sensing nodes, and are also asynchronously uploaded to...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
The number of small-and mid-cap companies increases in recent decades due to the change on technologies. A considerable number of information systems are thus built for efficient production and management. As a result, a large number of operations and data are generated. The internal IT unit must have the ability to process the large amount of data, provide different services for each kinds of users,...
Supercomputing has been widely implemented in theoretical physics, theoretical chemistry, climate modeling, biology simulation and medicine research for high-performance and energy-efficient computing. Many of scientific applications are I/O sensitive and users have to tolerate high latency when supercomputing center storage processes thousands of I/O requests. In this paper, IMFSSC, an in-memory...
NAND flash is seeing increasing adoption in the data center because of its orders of magnitude lower latency and higher bandwidth compared to hard disks. However, flash performance is often degraded by (i) inefficient storage I/O stack that hides flash characteristics under Flash Translation Layer (FTL), and (ii) long latency network protocols for distributed storage. In this paper, we propose a minimalistic...
Nowadays, the information systems for enterprises become popular and these systems produce an extreme huge amount of data. The produced data are all important and should be kept for further analysis. However, as this trend continues, the lack of human resources and budgets makes the ways to efficiently store and analyze data challenging. To solve this predicament, Cloud Storage Service (CSS) provides...
With the development of Location Based Services (LBSs), both academic researchers and industries have paid more attention to GPS-less mobile localization on mobile phones. The majority of the existing localization approaches have utilized signal-fingerprint as a metric for location determinations. However, one of the most challenging issues is the problem of uncertain fingerprints for building the...
Performance and energy efficiency are major concerns in cloud computing data centers. More often, they carry conflicting requirements making optimization a challenge. Further complications arise when heterogeneous hardware and data center management technologies are combined. For example, heterogeneous hardware such as General Purpose Graphics Processing Units (GPGPUs) improve performance at the cost...
With an increase in the number of mobile applications, the development of mobile crowdsensing systems has recently attracted a significant attention in both academic researchers and industries. In mobile crowdsensing system, the remote cloud (or back-end server) harvests all the crowdsensing data from the mobile devices, and the crowdsensing data can be uploaded immediately via 3G/4G. To reduce the...
Complex data queries, because of their need for random accesses, have proven to be slow unless all the data can be accommodated in DRAM. There are many domains, such as genomics, geological data and daily twitter feeds where the datasets of interest are 5TB to 20 TB. For such a dataset, one would need a cluster with 100 servers, each with 128GB to 256GBs of DRAM, to accommodate all the data in DRAM...
With an increasing number of College Admissions activities, education and scientific researches organized by universities, it is of prominent importance for newcomers to get help from campus navigation. And smart phones being more popular, it is possible to solve the above problem. During the process of setting up one kind of campus navigation system, the thesis improved the basic A algorithm: using...
Virtualized platform has emerged as a prominent environment for cloud computing, especially in today's power-constrained data centers. However, due to a lack of coordination between runtime power management and a virtual CPU (vCPU) scheduler, existing virtualized cloud platform is far from efficient. First, current frequency control mechanism is unable to satisfy the fast-changing vCPU frequency requirement...
Server virtualization and workload consolidation enable multiple workloads to share a single physical server, resulting in significant energy savings and utilization improvements. The shift of physical server architectures to NUMA and the increasing popularity of scale-out cloud applications undermine workload consolidation efficiency and result in overall system degradation. In this work, we characterize...
Ad-hoc networks, being infrastructure-less, have much scarcer amounts of bandwidth. Most multi-robotic applications adopt decentralised approaches in order to avoid single points-of-failure. A decentralised approach would require robots to continuously update each other to coordinate their actions. For successful coordination, hard real-time requirements must be met. Thus, a resource allocation strategy...
Web-based applications are gaining popularity as they require less client-side resources, and are easier to deliver and maintain. On the other hand, web applications also pose new security and privacy challenges. In particular, recent research revealed that many high profile web applications might cause sensitive user inputs to be leaked from encrypted traffic due to side-channel attacks exploiting...
While enjoying the convenience of Software as a Service (SaaS), users are also at an increased risk of privacy breaches. Recent studies show that a Web-based application may be inherently vulnerable to side-channel attacks which exploit unique packet sizes to identify sensitive user inputs from encrypted traffic. Existing solutions based on packet padding or packet-size rounding generally rely on...
For great change of service time for request, big difference of hardware and software server and different network performance, this paper proposes a dynamic-feedback algorithm based on AHP in the course of studying the algorithm of load balancing in the cluster-based system. Combined with Weighted scheduling algorithm of the kernel, based on the parameters influencing the performance of cluster system...
In this paper, Discusses Implementation of Broken-point Continuingly-transferring Based on C#.NET. At the first, introduce C# Network Programming, while introduce the basic elements, basic principles of Broken-point Continuingly-transferring, and in-depth analysis of Implementation of the function of Broken-point Continuingly-transferring in C#.NET.
Recently identified low-rate TCP-targeted DoS attacks can cause failures of Border Gateway Protocol sessions and route flappings without being detected by current defense mechanisms. Deliberately constructed Distributed low-rate DoS attacks can even generate surge of updates throughout the Internet. As this new breed of attacks needs a low-rate time gap between adjacent pulses, this time gap waste...
Data broadcasting is an effective way to disseminate information to a large amount of mobile clients in wireless mobile environments. The k nearest neighbor (kNN) search is one of the important location-based services. In this paper, we propose kNN search protocols using data broadcasting. We consider how the server generates the broadcast schedule with a Voronoi diagram and how the client can efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.