The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the cornerstone of the future intelligent transportation system, vehicular ad hoc networks (VANETs) have attracted intensive attention from the academic and industrial research communities in recent years. For widespread deployment of VANETs, security and privacy issues must be addressed properly. In this paper, we introduce the notion of pseudonym-based cryptography, and present a provable secure...
Botnet, a network of computers that are compromised and controlled by the attacker, is one of the most significant and serious threats to the Internet. Researchers have done plenty of research and made significant progress. As the extensive use and unique advantages of peer-to-peer (P2P) technology, the new advanced form of botnets with the P2P architecture have emerged and become more resilient to...
The rapid development of instant messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant messaging technology does not provide built-in support for security features. The security problem of instant messaging system has aroused widespread concern in both academia and industry. In this paper, we proposed a new and secure instant...
Since Trojan has been used widely in various applications, modern Trojan requires a stronger anti-tracing performance than before. As an attempt seeking beneficial result, this paper proposes a new Trojan communication model based on Internet Relay Chat (IRC) and Webmail system. IRC chat channel is designed to transfer commands and Webmail system is applied to store data. Because of this design, it...
To resolve real-time the traditional water quality detection method, a novel system of remote water quality measuring and monitoring based on wireless sensor network (WSN) and Code Division Multiple Access (CDMA) technology is proposed. The WSNs can monitor the targets and water quality information of the waters through the cooperation of a large amount of sensors. The optimization of node distribution...
The Internet-based virtual computing environment (iVCE) provides on-demand aggregation and autonomic collaboration mechanisms to facilitate the utilization of autonomous and dynamic Internet resources. Load balancing and fault tolerance are important issues when scheduling those transient resources. In this paper, we propose a mobility mechanism for the migration of various roles of agents in the...
In this paper, we propose a demand-driven virtual disk (VD) prefetch mechanism-DPM to improve the performance of virtual machine (VM) at destination site for mobile personal computing environments. DPM uses an optimized COW (Copy-on-Write) virtual block device to split the traditional one-piece large-sized VD image into multiple small-sized SVDs (Software Virtual Disk) at a basic granularity of a...
A device which integrates existing intravenous continuous glucose monitors and infusion pumps into a central hub for automated intravenous intensive insulin therapy, targeting non-diabetic critically-ill patients is presented. Additionally, a fuzzy logic based controller that is capable of automatically making closed-loop decisions to achieve tight glycemic control between a euglycemic range of 90...
OneHop was the first DHT protocol providing the feature which enables DHT to be applied in HLR/HSS that a high fraction of the lookups are solved within only one hop. In this protocol the event in overlay (node joins and leaves) will be disseminated in a hierarchical fashion from slice leader to unit leader and unit leader to normal node. There is little concern about the situation that the leader...
The verification of Web services becomes a challenge in software verification. This paper presents a framework for verification of Web service interfaces at various abstraction levels. Its foundation is the interface theory for Web services, in which transaction features are incorporated. Within the framework, one may check non mutual invocation, compatibility and refinement of Web services at signature,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.