The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive...
Inter-application I/O contention and performance interference have been recognized as severe problems. In this work, we demonstrate, through measurement from Titan (world's No. 3 supercomputer), that high I/O variance co-exists with the fact that individual storage units remain under-utilized for the majority of the time. This motivates us to propose AID, a system that performs automatic application...
In our case, an original television (TV) broadcasting monitoring system is proposed and then implemented in order to meet the urgent requirements for rapid development of radio and television industry. The monitoring system involves four primary sub-modules, the functions of which are respectively described as image extraction, network transmission and storage, dispatching and configuration, data...
Today's data center jobs typically follow a coflow model. Each coflow consists of multiple concurrent data flows, while each job is comprised of multiple coflows. Only completing all flows in all coflows is meaningful to a job. To guarantee the job completion time, job deadlines and coflow dependencies must be jointly considered. However, existing solutions mainly consider the coflow scheduling, which...
Public vehicle (PV) systems will be efficient traffic-management platforms in future smart cities, where PVs provide ridesharing trips with balanced QoS (quality of service). PV systems differ from traditional ridesharing due to that the paths and scheduling tasks are calculated by a server according to passengers' requests, and all PVs corporate with each other to achieve higher transportation efficiency...
Central to many applications involving moving objects is the task of processing $k$<alternatives><inline-graphic xlink:type="simple" xlink:href="yu-ieq1-2364046.gif"/></alternatives> -nearest neighbor ($k$<alternatives> <inline-graphic xlink:type="simple" xlink:href="yu-ieq2-2364046.gif"/></alternatives>-NN) queries. Most...
The past few years have witnessed an exponential growth in the volume of data on digital forensics leading to big data issues. Digital forensics data is complex and heterogeneous in that it can be structured, unstructured and semi-structured. Traditional relational database management systems (RDBMS) typically expose a query interface based on SQL (Structured Query Language). However, the RDBMS are...
Substantial technology advances have been made in areas of autonomous and connected vehicles, which opens a wide landscape for future transportation systems. We propose a new type of transportation system, Public Vehicle (PV) system, to provide effective, comfortable, and convenient service. The PV system is to improve the efficiency of current transportation systems, \eg, taxi system. Meanwhile,...
This paper presents the design, implementation and evaluation of SprintNet, a novel network architecture for data centers. SprintNet achieves high performance in network capacity, fault tolerance, and network latency. SprintNet is also a scalable, yet low-diameter network architecture where the maximum shortest distance between any pair of servers can be limited by no more than four and is independent...
The main purpose of content distribution network is to redirect Internet users to the servers nearest to them, known as edge cache server. Thus, their desired contents can be obtained more rapidly and steadily. With the optimized QoS (Quality of Service) of the Internet, user experience can be improved to a certain extent. Generally speaking, when it comes to content distribution network, the CDN...
Data center networks (DCNs) are inherently failure-prone owing to the existence of many links, switches and servers. Many times the failures of the components may be correlated resulting a set of connected components failing together. This correlated failure behaviour could be captured through the use of fault regions [1]. This paper explores the effect of such failures in DCNs, using four topologies,...
Name service is one of the most important parts for ID/Resource management in Internet of Things (IoT). Many countries and organizations have designed different naming schemes to identify their own resources, such as Object Name Service (ONS) in EPCGlobe. However, there are some issues in the current solutions, such as incompatibility of identity codes and single-root name service. In this paper,...
The inevitability of IPv6 has come to fore. How to resolve the problem of IP address registration has been a great challenge for network management. The existing solution uses manual registration mechanism, not suitable for dealing with massive IPv6 addresses. Based on the Extensible Provisioning Protocol, we propose an “EPP-IP” mechanism to achieve a flexible and automatic registration management...
We present an evaluation of the fault-tolerance characteristics of several important data center network topologies, including Fat-tree, DCell, HyperBCube and BCube using several metrics, including average path length, aggregated bottleneck throughput and connection failure ratio. These enable us to present an objective comparison of the network topologies under faulty conditions.
Cloud computing technology enables developers spend much more time on application quality without considering computing resource constraint, load balancing and performance tuning, etc. It raises challenges along with the benefits it offers to software testing. This paper is motivated with the concerns on how to test the online web applications in a scalable and diverse way. The resources occupied...
Internet of Things (IoT) is an upcoming network technology well studied by many researchers. Mass applications and terminal nodes with heterogenous network connection make the tremendous scale of data process extremely difficult. A combined architecture with Cloud Computing and Sea Computing is proposed. Deluge Computing, a new concept, using Adaptive Coding and Modulation and Granular Computing aims...
Mobile agent communication mechanism is an indispensable infrastructure for ensuring the reliable and efficient communication between mobile agents. Firstly, this paper analyzed the disadvantage of the existing mobile agent communication mechanisms. Secondly, on the basis of giving mobile agent communication model and integrating the advantages of many mobile agent communication mechanisms, this paper...
This system absorbs the experience of the old irrigation management system based on GIS, makes use of the MapX module of GIS on Visual C++.NET platform, and adopts C/S structure on mobile, which can carry out irrigation decision system and data sharing on the technique of MapX Mobile and GPS, so not only can this system collect environment data of the field on the server rapidly and accurately, and...
This paper focuses on the design and development of Municipal Facilities Management System (MFMS). Street images and videos were collected by Wuhan LD2000-R Mobile Mapping System, and real-time videos on site under emergency conditions were captured by Wireless Transmission System. In MFMS, any street can be queried and located, visual information of facilities on the streets can be viewed, as well...
Deterministic encryption for low entropy personally identifiable information(PII) is vulnerable to dictionary attack. It is particularly so because of an expedient method to enumerate possible PII'splain text instead of all possible keys. Deterministic encryption, however, is indispensable in the generation of hash or index of PII. This paper presents a novel mechanism to frustrate dictionary attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.