The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
East japan great disaster tell us the many unfavorable points of the present communication system. Learning from these facts, the design principle of the robust communication system is proposed utilizing the logical structure of the network.
The sizes of databases have seen exponential growth in the past, and such growth is expected to accelerate in the future, with the steady drop in storage cost accompanied by a rapid increase in storage capacity. Many years ago, a terabyte database was considered to be large, but nowadays they are sometimes regarded as small, and the daily volumes of data being added to some databases are measured...
Data replication and synchronization techniques have recently attracted a lot of attention of researchers from P2P computing community. Such techniques are fundamental to increase data availability, reliability and robustness of P2P applications. However, several issues arise, such as data consistency and designing cost-efficient solutions, due to the highly dynamic nature of P2P systems. Although...
Malware is currently a major threat to information and computer security, with the volume and growing diversity of its variants causing major problems to traditional security defenses. Software patches and upgrades to anti-viral packages are typically released only after the malware's key characteristics have been identified through infection, by which time it may be too late to protect systems. Multiple...
Virtual machine (VM) based virtual infrastructure has been adopted widely in cloud computing environment for elastic resource provisioning. Performing resource management using VMs, however, is a heavyweight task. In practice, we have identified two scenarios where VM based resource management is less feasible and less resource-efficient. In this paper, we propose a lightweight resource management...
Although cloud storage offers a number of attractive features, it also raises various security concerns. In particular, cloud storage of sensitive information, such as medical or trade records, requires measures to be taken not only for privacy protection, but also for assured deletion and verifiable version control. Even though there are methods for realizing both assured deletion and version control...
With the rapid advance of the integration of internet and robot areas, various service platforms are proposed that assume cloud environments. For robot services, as the numbers of devices and their types increase, a mechanism that enables the entry of developers in various areas is required. However, existing platforms are insufficient to the problem. In this paper, we developed a distributed service...
Wireless mesh networks (WMNs) have become immensely popular these days. In order to satisfy user service requirements, multimedia applications need quality of service (QoS) support. Since the mesh routers are usually stationary in WMNs, a better performance is expected in WMNs as compared to ad hoc networks. But sustaining QoS in wireless mesh networks still remains a challenging task. A fundamental...
Wireless mesh networks (WMNs) are promising networks in the future Internet environments due to their self-configuration and ease of deployment. Although streaming and real time applications are possible using current mobile devices, these applications still suffer from low quality. Because link failures are not reported in congested situations, the existing routing protocols do not capture these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.