The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data centers with high yet elastic energy demand are ideal candidates for participation in demand response programs. This paper studies emergency demand response (EDR) at multi-tenant colocation data centers (colocations). While the colocation has no direct control over tenants’ servers, we design online mechanisms to incentivize and coordinate tenants’ energy reduction. Our mechanism is online in...
Network Function Virtualization (NFV) is a promising technology that promises to significantly reduce the operational costs of network services by deploying virtualized network functions (VNFs) to commodity servers in place of dedicated hardware middleboxes. The VNFs are typically running on virtual machine instances in a cloud infrastructure, where the virtualization technology enables dynamic provisioning...
In this paper, we propose a method to recognize human behavior by combining motion history images (MHI) and non-negative matrix factorization (NMF). The MHI preserves the temporal information of a behavior by holding the temporal motion appearance. Then, NMF is applied to extract the middle-level features of the moving object. The experimental results show that the proposed scheme can achieve robust...
Image authentication is an important technology to protect image content integrity. This paper proposes an image authentication method, which regards the stable singular values as significant authentication data and represents them in the form of QR codes. With the help of QR codes, the authentication data will be complete and correct even though the codes were slightly dirty or damaged. Experimental...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.