The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
As Internet technologies evolve, their applications have changed various aspects of human life. Here, we attempt to examine their potential impact on services for families with developmentally delayed children. Our research is thus designed to utilize wireless mobile communication technologies, location services, and search technology in an effort to match families of specific needs with potential...
Energy efficiency is a very important issue to keep the "Green" Earth, especially in recent years. We have to save the energy consumption anywhere and anytime, including a large set of servers, such as servers in the Google company. In our research, we mainly consider one important energy-electric power. In our previous work, we discussed the difference energy model in cluster servers, and...
Energy efficiency has become a very important issue to reduce the consumption of resources on the Earth. We have to consider how to save the energy consumption anywhere and anytime, including a large set of servers, for example, servers in the Google company. Hence, power and energy consumption has recently become key concerns, especially huge number of servers are deployed in large cluster configurations...
In the grid security infrastructure (GSI), cross-domain authentication is based on traditional PKI cross certificate, which brings about problems of certificates management. Encouragingly, identity-based cryptography (IBC) can overcome these problems for its certificate-free feature. Therefore, an identity-based signcryption scheme is proposed in order to meet the requirement of cross-domain authentication...
As the evolving of Internet technologies, its application has gradually affected human life. The research matches people with requirements through wireless mobile communication technologies, location services and the search technology. By the humanities idea and depth interview, the paper designed a platform for the professional communities and families with developmental delay children (DDC) to share...
Active queue management (AQM) is an effective method used in Internet routers to enhance congestion control, and to achieve a trade off between link utilization and delay. The de facto standard, the random early detection (RED) AQM scheme, and most of its variants use queue length as a congestion indicator to trigger packet dropping. Random early detection (RED) is a widely studied active queue management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.