Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Recent studies show that the 60GHz wireless technology could help resolving the hotspot issue in data center networks (DCNs). However, transmissions over 60GHz suffer from limitations of short transmission range and blockage, which makes it a new challenge how to appropriately establish wireless links in the DCN. In this paper, we propose to integrate wireless links into the DCN with the wireless...
Never Stop is an intelligent transportation system with sensor to control the traffic lights at intersection automatically. It utilizes fuzzy control method and genetic algorithm to adjust the waiting time for the traffic lights, consequently the average waiting time can be significantly reduced. A prototype system has been implemented at an EBox-II terminal device, running the fuzzy control and genetic...
This paper presents SmartMal-A novel service-oriented behavioral malware detection framework for vehicular and mobile devices. The highlight of SmartMal is to introduce Service Oriented Architecture (SOA) concepts and behavior analysis into the malware detection paradigms. The proposed framework relies on client-server architecture, the client continuously extracts various features and transfers them...
The OAuth 2.0 authorization protocol standardises delegated authorization on the Web. Popular social networks such as Facebook, Google and Twitter implement their APIs based on the OAuth protocol to enhance user experience of social sign-on and social sharing. The intermediary authorization code can be potentially leaked during the transmission, which then may lead to its abuse. This paper uses an...
In this paper, we propose an intrusion detection framework for smartphone systems. We formulate the intrusion detection problem into a two-player, non-cooperative, complete-information, constant-sum game. The attacker and the security server are the players of the game. The security server wants to maximize the value of the system but the attacker wants to minimize it. We present the Nash equilibrium...
A P2P volunteer computing system named PPVC is proposed. Its advantages are the flexible topology and the scalability. Volunteers are organized as a P2P network and a decentralized job scheduling method is utilized. It can accomplish an application efficiently under the dynamic changes of the P2P network condition. PPVC is built using an AOSE method and developed on the MAGE environment. The whole...
In this paper, a P2P volunteer computing system, PPVC, is presented. Volunteers are organized as a P2P network, i.e. there is no central server and every volunteer has the same function. It uses a decentralized job scheduling method so that each volunteer only need to communicate with its direct neighbors but an application is able to be distributed to all the volunteers. Using this job scheduling...
The development of computer processor has stepped into the era of multi-core, providing a good chance to spread the parallel discrete event simulation. The parallel programming model and synchronization problem during the parallelization of discrete event simulation on multi-core platform were discussed. A parallel discrete event simulator based on multi-core platform was designed and implemented...
In data grid, co-allocation architecture can be used to enable parallel transferring of data file from multiple replicas which stored in the different grid sites. Some schemes base on co-allocation model were proposed and used to exploit the different transfer rates among various client-server network links and to adapt dynamic rate fluctuations by dividing data into fragment. These schemes showed...
In data grid, co-allocation architecture was developed to enable parallel transferring of files from multiple replicas stored in the different servers. Several dynamic file transfer strategies based on co-allocation model have been proposed and used to exploit the different transfer rates among various client-server links and to address dynamic rate fluctuations by dividing files into multiple blocks...
In data grids, co-allocation architectures were developed to enable parallel downloads of datasets from selected replica servers. As Internet is usually the underlying network of a grid, network bandwidth plays as the key factor affecting file transfers between clients and servers. In this paradigm, there are still some challenges which need to be solved, such as to reduce differences in finish times...
Distributed collaborative design technology which supports teamwork is an advanced research of CAD/CAM development. Efficient distributed collaborative design environment is the urgent demand of engineering. Based on analyzing the characteristics of automotive steering gear collaborative design, the merits and demerits of the framework of collaborative design environment, a framework based on multi-agent...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.