The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
Cloud storage services allow users to outsource their data to cloud servers to save local data storage costs. However, unlike using local storage devices, users do not physically manage the data stored on cloud servers; therefore, the data integrity of the outsourced data has become an issue. Many public verification schemes have been proposed to enable a third-party auditor to verify the data integrity...
4G/3G Networks have been widely deployed around the world to provide high wireless bandwidth for mobile users. However, the achievable 3G/4G bandwidth is still much lower than their theoretic maximum. Signal strengths and available backhaul capacities may vary significantly at different locations and times, often leading to unsatisfactory performance. Band-width aggregation, which uses multiple interfaces...
As Applications are moved from physical servers to virtual machines sharing storage resources, they experience large variation in I/O latencies. While maintaining average performance in such virtualized environments is important to conform to service level agreements (SLA), cloud users also expect their applications to have minimum variation in tail end latencies like 90th percentile latency for predictable...
Security has been one of the top concerns in clouds. It is challenging to construct a secure networking environment in clouds because the cloud is usually a hybrid networking system containing both physical and virtually overlaid networks. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been widely deployed to manipulate cloud security, with the latter providing additional...
Currently the QoS requirements for disk-based storage systems are usually presented in the form of service-level agreement (SLA) to bound I/O measures such as latency and throughput of I/O requests. However, SLA is not an effective performance interface for users to specify their required I/O service quality for two major reasons. First, for users, it is difficult to determine appropriate latency...
With the total energy consumption of computing systems increasing in a steep rate, much attention has been paid to the design of energy-efficient computing systems and applications. So far, database system design has focused on improving performance of query processing. The objective of this study is to experimentally explore the potential of power conservation in relational database management systems...
A scalable authentication protocol is proposed for security and efficient RFID communication. The performance evaluation and security analysis has proved its advantages. Compared with other protocols, it can preserve content and location privacy, resist replay attacks and Dos attacks, and has forward security and scalable.
In this paper, we proposed a DRM authentication scheme with smart-card. We first defined a three-role based DRM implementation scenario (server, playback device and smart-card), and then fully considered its security and performance challenges. Our scheme is based on identity based encryption and it's implementation-oriented. The scheme is efficient at server-side and compact in smart-card design...
This paper proposes an agent-based data access mechanism of mobile device. In the mechanism, mobile device use agents to manage local database and connect to remote agent. Remote agent receives data and query remote database. The local database is designed using partial detailed concept. The partial detailed database can store different details of content for query to avoid unnecessary connection...
As multi-core processors become increasingly mainstream, architects have likewise become more interested in how best to make use of the computing capacity of the CPU, for instance, through multiple simultaneous threads or processes of execution with OpenMP or MPI. At the same time, the increasingly mature and prevailing virtualization technique in server consolidation and HPC promotes the emergence...
Server utilization is typically low (10%-30%) in today's datacenters (or clouds), especially when executing computational jobs with deadlines. Previous studies have shown that it is difficult to improve utilization above 20% without significantly increasing the failure rate of job execution. It is still unknown how to increase utilization while maintaining a low (e.g., 1-5%) failure rate. To solve...
As multi-core processors become increasingly the mainstream, people have likewise become more interested in how best to make use of the computing capacity of the CPU. Although many methods, running multi-thread application for example, have been adopted to increase the CPU utilization, most multi-core PC's and workstation's CPU cycles are idle, even during peak hours. So it is an efficient solution...
As computers become pervasive and data size increases dramatically, data management systems' security, scalability and availability features turn into major design issues, especially in distributed computing environments. This paper proposes a highly available, scalable and secure distributed data storage system (HASS) for high performance and secure data management. Distributed and parallel data...
The mainly traditional File Systems are constructed on single device where the metadata and data access interfere with each other which will lead to performance degradations. In this paper we propose a volume based mechanism in BWFS to separate metadata from data into different devices by isolations both in store location and IO path. Test result has verified the effectiveness of metadata isolation...
Wireless networks have increased in popularity in recent years, and is now seen as a critical technology in any network infrastructure. Wireless communication is convenient and plays a prominent role in networking, however security and performance is a major concern. In this research, performance of wireless IEEE802.11n is evaluated on two operating systems, namely Windows Vista and Windows Server...
Password authentication has been adopted as one of the most commonly used solutions in a network environment to protect resources from unauthorized access. Recently, Shieh et al. and Yoon et al. respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed...
Recently, there has been increasingly interest in hosting desktop applications in virtual machine environment and accessing them with thin-client devices. However, the interactive performance in such scenario has not been fully investigated yet. We thus measure the performance of the interactive desktop system hosted by Xen VMM. Our experimental results show that with heave workload VMs coexisting...
In this paper, we present the design and implementation of cluster structure and disaster recovered system that can be used in the bank, industry and enterprise. It is capable of storing great capacity data. This toolkit is targeted at data security business which want to achieve high availability and disaster recovered structure and to compare their structure with others. The comparison functions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.