The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In microfluidic field, how to capture, manipulate and separate micro-particles suspended in liquid media has very important applications. Up to now, only seldom works focused on how to trap two particles with different sizes. In order to achieve this goal, a dielectrophoretic microfluidic chip was designed. The shape of electrode and flow channel was optimized; the electric field and the flow field...
Virtual machine (VM) based virtual infrastructure has been adopted widely in cloud computing environment for elastic resource provisioning. Performing resource management using VMs, however, is a heavyweight task. In practice, we have identified two scenarios where VM based resource management is less feasible and less resource-efficient. In this paper, we propose a lightweight resource management...
Application-level protocol specifications are helpful for network security management, including intrusion detection and intrusion prevention which rely on monitoring technologies such as deep packet inspection. Moreover, detailed knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown and proprietary protocol message...
The computing resource level architecture allows end-users to directly control its underlying computer resources, such as VM (virtual machine) operations, scaling, networking, etc. However, setting up and maintaining a working environment is complex and time consuming for end-users and resource management is also a heavy-weight task for the providers. In contrast, the application resource level architecture...
Traffic classification is important to many network applications, such as network monitoring. The classic way to identify flows, e.g., examining the port numbers in the packet headers, becomes ineffective. In this context, deep packet inspection technology, which does not only inspect the packet headers but also the packet payloads, plays a more important role in traffic classification. Meanwhile...
Cloud computing has attracted great interest from both academic and industrial communities. Different paradigms, architectures and applications have emerged. However, to the best of our knowledge, only few efforts have been devoted to study the architecture as well as implementation details for building up a cloud computing system. In this paper, we present our design and implementation of\textit{Imperial...
Load balancing is critical to the performance of parallel processing systems. It is more difficult for network systems such as NIDS and Web Servers, because they must preserve flow order. But traditional flow-based load balancing schemes of network parallel processing systems, such as LLF, cost much resource and introduce lots of communication overhead. With the rapid popularization of multi-core...
This paper introduces the process algebra language with its powerful standard model-checking tools for trusted software architectures, which deals with incompatibility between two components due to a single interaction or the combination of several interactions and with the lack of interoperability among a set of components through architectural compatibility check and interoperability check relying...
SMS4 is a 128-bit block cipher used in the WAPI standard for protecting data packets in WLAN. In this paper, various S-box circuit architectures were evaluated firstly and the twisted BDD with m=4 was proved as the fastest one. A fast SMS4 cipher VLSI implementation was completed based on the twisted BDD S-box architecture, and achieved over 200 MHz and 100 MHz maximal frequency on SMIC 0.18 mum and...
This paper presents a high speed Radix-8 Log-MAP turbo decoder recursion architecture: algorithmic approximation and architectural optimization are incorporated in the proposed designs to reduce the critical path. The synthesis results show that the proposed design has a high throughput of 693 Mbps in 0.18 um CMOS technology, which is nearly 3 times higher than using conventional Radix-2 architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.