The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFID is an emerging technology that provides timely and high-value information to inventory management and object tracking, in which areas that identifying unknown tags completely is crucial. From prior researches in this area, one of the pending problem involves processing redundant time frames due to unknown tag collisions. In this paper, we propose a time-efficient unknown tag identification protocol...
Insider attack is one of the key attacks in wireless sensor networks(WSNs). Despite its destructive force to network functions is huge, insider attackers are difficult to be detected only by the traditional techniques. Meanwhile, existing secure routing schemes are also vulnerable to insider attack and low energy-efficient due to their deterministic nature. Once a normal node is compromised or captured,...
MapReduce, as a popular tool for distributed and scalable processing of voluminous data, has been used in many areas. However, it is not efficient when handing skewed data, since it only considers the key and adopts a uniform hash method to distribute the workload to each reducer, while ignores the key's distribution. This can lead to load imbalance, increase the processing time, generate the "straggler"...
Wireless Sensor Networks (WSNs) are widely applied to monitor environments such as military surveillance and reconnaissance. However, individual sensor nodes are vulnerable to some types of attacks because they are usually deployed in open and unprotected environments. Once sensor nodes are compromised, malicious nodes can send erroneous data to the base station, and possibly mislead monitoring results...
With the increasing number of technology areas using Virtual Machine (VM) platforms, challenges exist in Virtual Machine migrating from one physical host to another. This paper presents the design and implementation of a novel Hierarchical Copy Algorithm (HCA) for Xen live VM migration. Based on the memory characteristics which will be transferred, the measuring time of working sets is shifted to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.