The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A remote telescope is a remote controllable astronomical telescope system via the Internet. There were already several remote telescope systems. However, all such systems are big and special ones. We have developed a simple and compact remote telescope system. We used a commercial Vixen equatorial telescope, a compact CCD video camera and a small Linux box for the new remote telescope. It is easy...
Most mobile devices are now Bluetooth-enabled. This wireless technology makes it possible to transfer files or stream contents between pieces of equipment. The possibly many devices that are in reach of each other and thus connected constitute a Personal Area Network (PAN). The problem remains that because of radio range setting up such connections is only possible for devices in a limited area. This...
Nowadays, Short Message Service (SMS) still represents the most used mobile messaging service. SMS messages are used in many different application fields, even in cases where security features, such as authentication and confidentiality between the communicators, must be ensured. Unfortunately, the SMS technology does not provide a built-in support for any security feature. This work presents SEESMS...
The Digital Business Ecosystem (DBE) is the result of the co-evolution of the Business Ecosystem and the Digital Ecosystem. There are numerous approaches and enabling technologies which are used in modeling open business marketplaces and, due to the similarities between the Digital Business environments, they can also help to enable the Digital Business Ecosystem but with some limitations. The complete...
GridStat is a QoS-managed middleware framework designed to replace the power grid's aging, inflexible, and slow data communications system. GridStat is a specialization of the publish-subscribe paradigm that takes advantage of the semantics of periodic updates of cached sensor data to provide data delivery with a per-subscriber rate, latency, and redundant paths. While GridStat is well-suited for...
A Bloom filter offers a simple space-efficient randomized data structure for representing a set in order to support membership queries. The Bloom filter has become attractive as one of the methods of looking up data in the distributed system. Since two or more keywords can be used in the method based on the Bloom filter, it is more flexible than the distributed hash table (DHT). Especially, the key...
The main intention of this paper is to introduce a new role-based approach to self-healing monitoring. Together with that we are going to provide an overview of the existing approaches to the monitoring of distributed systems using self healing features. Starting with a discussion of autonomous monitoring systems - the ones that do not need any user interaction to make a decision, we will come to...
In 2004, Bresson et al. proposed an authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are insecure against the so-called impersonation attacks. This paper proposes a mutual authenticated group key agreement protocol based on RSA, discrete logarithms (DL) and...
Failure detection is a fundamental building block for ensuring fault tolerance in large scale distributed systems. In this paper we present an innovative solution to this problem. The approach is based on adaptive, decentralized failure detectors, capable of working asynchronous and independent on the application flow. The proposed failure detectors are based on clustering, the use of a gossip-based...
In distributed peer-to-peer (P2P) applications, a group of multiple peer processes (peers) are required to cooperate with each other. Messages sent by peers have to be causally delivered. In this paper, we discuss a scalable group communication protocol for a group of multiple peers in P2P overlay networks. Due to the message overhead O(n) for the number n of peers, the vector clock cannot be used...
Time and frequency alignment is critical for ensuring QoS for application such as voice, real-time video, wireless hand-off, and data over a converged access medium. To satisfy the accuracy of time synchronization, both adjusting Communication path asymmetry and ratio of frequency between the time-aware systems are important. Network Time Protocol (NTP) is not satisfies time-sensitive applications...
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. We present a video multicast algorithm that combines multi-layered video encoding with feedback-based source adaptation in order to address varying bandwidth constraints in a multicast tree. The proposed algorithm uses a novel multicast flow control...
Nowadays more and more information systems are being shifted to distributed architectures because of the benefits like scalability, autonomy, and faulty-tolerance implied from the essence of this distributed systems. Here, every process is peer and cooperates with other peers to achieve some objectives. Here, peers have to efficiently and flexibly make an agreement on one value which satisfies an...
The Chebyshev map is a typical chaotic map which has been widely investigated for cryptography. However, researchers argue that almost all the encryption algorithms based on some chaotic maps are not as secure as they are announced. In this paper, the limitations of some multicast key agreement schemes are discussed. To eliminate those false and remain novelty, we consider how the chaotic maps can...
New tools and techniques are emerging to handle the complexities that might arise with the development of software systems. Reactive agent models are one such area that is emerging as a powerful paradigm in software engineering. This paper describes issues, trends, and approaches that exhibit the innovative characteristic of the reactive agent model and the design aspects of such a system. Engineering...
Component's QoS constraints cannot be ignored when composing them to build reliable loosely-coupled, distributed systems. Therefore they should be explicitly taken into account in any formal model for component-based development. Such is the purpose of this paper: to extend a calculus of component composition to deal, in an effective way, with QoS constraints. Particular emphasis is put on how the...
This paper presents a novel intrusion detection system for Grid Systems. It is intended to identify potential attackers who try to modify or compromise the applications sent to execution by various users or target different resource groups within the Grid. The system makes use of a number of available local intrusion detection systems which send data to a grid-level intrusion detection system that...
Grid and P2P systems have achieved a notable success in the domain of scientific and engineering applications, which commonly demand considerable amounts of computational resources. However, Grid and P2P systems remain still difficult to be used by the domain scientists and engineers due to the inherent complexity of the corresponding middleware and the lack of adequate documentation. In this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.