The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-tiered Parallel I/O systems that combine traditional HDDs with emerging SSDs mitigate the cost burden of SSDs while benefiting from their superior I/O performance. While a multi-tiered parallel I/O system is promising for data-intensive applications in high-performance (HPC) domains, placing data on each tier of the system to achieve high I/O performance remains a challenge. In this paper, we...
Identifying fall risk can prevent injuries in the elderly as well as reduce the related financial burden. A balance assessment, Timed Up and Go (TUG), has been widely applied to estimate fall risk. However, the standardized TUG usually excludes complex factors (e.g. slopes and obstacles) falling short of representing challenges in environments that many older adults navigate. Having information on...
Syslogs on switches are a rich source of information for both post-mortem diagnosis and proactive prediction of switch failures in a datacenter network. However, such information can be effectively extracted only through proper processing of syslogs, e.g., using suitable machine learning techniques. A common approach to syslog processing is to extract (i.e., build) templates from historical syslog...
Middleboxes are widely deployed to perform various network functions to ensure security and improve performance. The recent trend of Network Function Virtualization (NFV) makes it easy for operators to deploy software implementations of these network functions on commodity servers. However, virtual network functions consume different amounts of resources when processing packets. Thus a multi-resource...
Due to the expensive hardware and complex management of the traditional middlebox, a concerted effort towards the virtualized middlebox has been launched in both academia and industry. In this paper, we propose a unified middlebox model, MBBrick, which is composed of three operation modules (classifier, rewriter, forwarder) and a control module (the mcontroller). We then design a language, MG, to...
Dynamic software updating (DSU) can upgrade arunning program on-the-fly by directly replacing the in-memorycode and reusing existing runtime state (e.g., heap objects) forthe updated execution. Additionally, it is usually necessary totransform the runtime state into a proper new state to avoidinconsistencies that arise during runtime states reuse amongdifferent versions of a program. However, such...
Android is currently the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc...
The need to perform data analytics on exploding data volumes coupled with the rapidly changing workloads in cloud computing places great pressure on data-center servers. To improve hardware resource utilization across servers within a rack, we propose Direct Extension of On-chip Interconnects (DEOI), a high-performance and efficient architecture for remote resource access among server nodes. DEOI...
MTC services are undergoing rapid increase; billions of MTC connections can be anticipated in a few years. When supporting MTC services in telecommunications networks, MTC traffic characteristics and its unique service requirements should be exploited in order to optimize resource utilization and offer satisfactory service quality for all devices. In this paper, we present an Information-Centric Virtual...
Middleboxes are prevalent in today's enterprise and data center networks. Network function virtualization (NFV) is a promising technology to replace dedicated hardware middleboxes with virtualized network functions (VNFs) running on commodity servers. However, no prior study has examined the energy efficiency of different NFV implementations. In this paper, we conduct a measurement study on the power...
Focused on the issue that the mobile terminal can not remote control each other, a remote control system between Android platforms was proposed. The system is a typical C/S mode, follow the specification of Android application, to achieve the remote control between two Android system developed by Java language. Firstly, it analyzes the key technologies of the system, like the architecture of Android...
Content-Centric Networking (CCN) is a promising architecture in the current Internet, and has the potential to be a revolutionary innovation in the future Network. CCN has not broken away from the binding of physical location and content name, however, the content source mobility will remain a great challenge for CCN. In addition, the problem of the large overhead incurred during the handoff requires...
This paper proposes an asymmetric key based authentication framework, QRToken, for easy - to - use login to websites, SSH servers, etc., QRToken authentication use client - side locally stored RSA private key to encrypt identification information as well as other parameters, and prese nt a QR code in the form of a small two - dimensional picture that encodes the encrypted information. User takes a...
Traditional workflow design tools which only provide the choreography of simple flow chart and do not provide a graphical configuration for access to a service, are unable to meet user demand for services. The article expands the Activiti Designer open source framework. It maintains communication through the bottom of the enterprise service bus, provides the registration services (OSGI, WebService,...
Dynamic Software Update (DSU) is a technique to upgrade running programs without shutting them down. DSU can improve system availability and maintenance flexibility. However, its adoption in practice is still limited due to the risk of system misbehavior that careless DSU may bring. To reduce this risk we propose a formal framework for the specification and verification of DSU. Different from previous...
We present a novel converged inter/intra data center architecture using optical-circuit-switching over metro-scale distances. A Software Defined Network (SDN) control-plane provides connectivity between the application and data-plane layers. Virtual-machine migration over 50km is experimentally demonstrated.
This paper describes the use of the latest NFC technology to achieve intelligent wireless inspection system, based on the latest The Android 4.0 platform developed special industry handheld mobile terminal equipment, with a background server to achieve industry-specific inspection program with explosion-proof function. The explosion-proof handheld mobile terminal equipment with NFC function currently...
Software systems continuously running over a long time may suffer gradual performance degradation or failure rate increasing. This phenomenon, known as ¡®Software Aging', has become a great challenge to dependability-critical software systems. Researchers have made remarkable achievements in predicting resource exhaustion time and designing optimal rejuvenation plan. However, limited works focus on...
Long period of petroleum exploration has accumulated mass materials of multi-source and multi-scale correlated with geographical position, including seismic, logging and geological data, etc. However, the present management system of the petroleum company cannot integrate and manage these materials effectively, making it difficult to organize and share the information. With the application of GIS,...
Aiming at the lack of adequate and flexible access control in 3D virtual environment when used in education, according to RBAC model, we present an authority control method which can manage manipulations to all objects, e.g. a variety of assets, avatars, scripts and network communication pipes in 3D virtual environment. The proposed technique overcomes the insufficiency on access control aspect in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.