The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Novel cloud computing technology makes multiplayer cloud gaming a reality, where players play games that do not run on local devices, but on servers in the cloud. Nevertheless, the necessary communication between player's local device and cloud server increases the response delay of the gaming session. Besides the degrade of responsiveness, the inter-player delay, which is the difference of response...
Job scheduling is a necessary prerequisite for performance optimization and resource management in the cloud computing system. Focusing on accurate scaled cloud computing environment and efficient job scheduling under Virtual Machine (VM) resource and Server Level Agreement (SLA) constraints, we introduce the architecture of cloud computing platform and optimization job scheduling scheme in this study...
With the development of Mobile and Wireless Network technology, Mobile learning (M-learning) becomes a focus after E-Learning. How can the farmers get requisite information of agricultural production by mobile phone? In order to solve this problem, the personalized mobile information system for the farmers has been designed and developed based on Ontology. It consists of four functional modules: information...
The insufficiency of battery lifetime has become the biggest limited of mobile smart-terminal, offloading of mobile computing is a potential effective method to extend the battery lifetime of mobile smart-terminal by executing some computation of applications in remote servers. However, the delay of transmission and the wireless transmission conditions are the main constraints of mobile offloading...
The configuration for address mapping is an important process for IPv4-over-IPv6 (4over6) technology, which is the major scenario of IPv6 transition. However, it is not straightforward to use current configuration methods because they were only designed to solve part of the configuration scenario. In this paper, we first analyze the challenges of current configuration solutions. After that, we propose...
Database security is an important part of information security. With the background of login verification, this paper proposes a database security model based on hopping mechanism and gives theoretical analysis to it. In the theoretical analysis, we gives the specific expression of the probability of successful attack and theoretical deducation of the expression. Finally, we establish the prototype...
Although P2P has been the main solution for livestreaming distribution, the dynamic restricts the performance. Cloud computing is a new promising solution, which could be introduced as a supplement for P2P. It is a good direction on combining cloud computing and P2P to leverage the livestreaming system performance. However, for seeking the design of the hybrid system architecture and deployment for...
IOT (internet of things) owner may not want their sensitive data to be public in the cloud. However, the client operated by IOT owner may be too lightweight to provide the encryption/decryption service. To remove the issue, we propose a novel solution to minimize the access control cost for IOT owner. First, we present a security model for IOT with minimal cost of IOT owner client without encryption,...
Community question answering (CQA) is widely used in Web information seeking. Web service selection (WSS) is often required to provide concurrent CQA services. WSS involves energy consumption of servers. However, existing techniques rarely consider energy consumption when dealing with concurrent WSS. To bridge this gap, we propose the mixed-integer optimization based green service selection (MIOGSS)...
According to the statistics of MIIT, at the end of January 2014, China mobile users had reached 1.235 billion. Maps as mobile internet key entrance, whether ordinary users or enterprise customers have unprecedented requirements to user experience of the map, traditional mobile map using online tiles load slowly, and can not meet the needs of the current application. The ability to quickly load map...
Recently, attracted by the abundant computation and networking resources in the cloud, an increased number of mobile media services have been hosted by the cloud computing platforms. These mobile media clouds (MMCs) run hundreds of thousands of servers and consume megawatts of power with massive carbon emission. Virtualization is adopted to allocate resources elastically from a shared resource pool...
Users store rapidly increasing amount of data into the cloud. Cloud storage service is often characterized as having a large data set and few deletes. Hosting the service on a conventional system consisting of servers of powerful CPUs and managed by either a key-value (KV) system or a file system is not efficient. First, as demand on storage capacity grows much faster than that on CPU power, existing...
With the serious imbalance of data demand in wireless networks, it is a common phenomenon that some users exhaust the traffic of plans, whereas others waste the surplus scheduled traffic. Recently, U. S. Cellular has launched plans to share data among multiple devices without considering conflicts of interests. In this paper, we are the first to propose TSWiFi, a traffic sharing platform designed...
A large number of corporations are jointly developing various Cloud platforms. However, problems have occurred in resource management due to multiple number of platforms that were not integrated at the time of development of the Cloud federation service. If user uses heterogeneous platform, there arises difficulty in resources management. Therefore, there is a need to develop a federation monitoring...
There are many disadvantages in the logistics distribution scheme today. The package may be taken by mistake and the information of consumers on the package may be hooked up illegally. What is more, it needs lots of couriers and costs plenty of money. To solve these problems above, a more effective logistics distribution scheme based on Near Field Communication is proposed. Many key technologies,...
This paper mainly studies the equipment management system how to achieve real-time location in the mobile terminal. The realization of this project will be based on the widely used Android mobile platform, and in the Eclipse environment to complete all the development work of the subject. This software divided into five modules of the login system, regional positioning system, and device positioning...
Existing key distribution scheme based on key derivation has security default in cloud scenarios. The scheme distributes decryption keys to users through tags stored on cloud server. If the tag is destroyed by cloud server intentionally or unintentionally, the key distribution is destroyed too. Besides the above case, if all related tags are stored on client operated by user, the storage burden is...
Smart home contains centralized controlled lights, Heating, Ventilation and Air Conditioning (HVAC), appliances, security locks of gates and doors and other intelligent equipment, to provide convenient, comfortable, energy efficient and secure services to users. Although many countries and organizations have designed various smart home architectures, there are still some problems in these existing...
Virtual Machine Cluster (VMC) is now widely used to host network applications due to its well scalability and high availability compared to physical cluster. To provide fault tolerance, VMC snapshot is one well known technique, it saves the entire VMC state into stable storage and rollbacks the VM from the latest saved state upon failures. However, due to the large snapshot size as well as numerous...
To reduce CPU, memory and bandwidth usage as cloud platform security consumption, and to prevent vulnerabilities that brought in by VM based antivirus software, we propose an agentless processes monitoring architecture for cloud platform. To demonstrate this architecture, we modified KVM kernel, programed OpenStack plugins, added security module on both management and compute node in a cloud platform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.