The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IaaS cloud converts physical resources into resource pools. The pool oriented resource management model requires transparency of the underlying physical resources, as well as the on-demand consumption of IT services and the trust verification of the resources from cloud users. A viable way is by creating trusted clusters that consist of trusted physical machines, with strict membership management...
IaaS encourages pooled resource management model, which provides transparency on the management and provision of IT resources. The transparency, hiding physical details of the underlying resources, makes it difficult for cloud users/services to identify trusted resources for service deployment, resulting in potential risks of deploying critical services on untrusted resources. This paper proposes...
Distributed Denial-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily applied in cloud security due to their relatively low efficiency, large storage, to name a few. In view of this challenge, a Confidence-Based Filtering method, named CBF, is investigated for cloud computing environment, in this paper. Concretely speaking, the method...
With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave...
A new data fusion algorithm based on improved leach protocol and gauss membership function of fuzzy theory in wireless sensor networks is presented. The improved leach protocol is utilized second-level cluster head to transmit fused data which can reduce energy consumption and prolong the network life cycle. The proposed fusion algorithm with the gauss distribution characteristic chart and the gauss...
This paper provides an overview of IEEE 1609.4, a work in progress standard for multi-channel operations over the 5.9 GHz Dedicated Short Range Communications (DSRC) spectrum. In the U.S., the DSRC spectrum is organized into several channels. IEEE 1609.4 defines a time-division scheme for DSRC radios to alternately switch within these channels to support different applications concurrently. We describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.