The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops
The Delay Tolerant Network (DTN) multi-copy protocols transmits multiple copies of each message on all or several neighbors. Hence, message can reach to its destination via multiple nodes at higher consumption of buffer space, energy and bandwidth. This paper has proposed a Forwarding Impact Aware Probabilistic Routing Protocol (FIAR) to control the redundant message transmission. The FIAR has used...
In this paper, we present an architecture for a trusted execution environment on mobile devices that allows applications with a wide range of security requirements to run safely in an isolated environment, by using a mobile virtualization technology. These applications can take advantage of the semantics of running on secure area which is isolated from non-secure area that suffers from hacking, malignant...
Pervasive environments are highly heterogeneous and dynamic environments involving different services provided by various devices. In pervasive environments, applications are cooperatively executed by integrating transparently the distributed services. In order to support the self-evolving of these applications, it becomes necessary to deal with autonomic computing. Autonomic computing implies the...
Node mobility models for MANETs are important to affect performance of their routing protocols. We have already proposed a new mobility model representing spatially and temporally biased change of node mobility and node density for MANETs. In order to evaluate routing protocols of MANETs for our new mobility model, this paper presents an efficient algorithm for enabling derivation of various mobility...
In the rapidly developing world of technology in which reliance on Service-Oriented Web applications is increasing tremendously, there is an urgent need for highly manageable and controllable Software Configuration Management (SCM) systems that can support concurrent development of those applications to ensure that they can adapt to concurrent changes. The reality is that these services are susceptible...
Cloud computing offers flexible and scalable IT (Information Technology) services for which many organizations are now interested in harnessing its benefit. In spite of the enthusiasm and great interest, Cloud computing has not yet earned full trust of the individual customers, banks, armed forces, governments, and companies who do sensitive computing tasks. While it is not the goal to persuade everyone...
Virtualization is widely used as a basis for cloud computing. For this technique, if self-management of virtual machines (VMs) can be developed, operational costs will be greatly reduced. To develop self-managed virtualization, it is necessary to develop an algorithm that optimally places VMs on physical machines (PMs) and executes VM migrations among PMs in response to changes in demand. The algorithm...
Partial least squares algorithm as a new type of multivariate data analysis methods, the number of cross-validation to determine the effect of poor primary component. In this paper, cross-validation, based on the interpretation of the degree of integration of the main components of the independent variables and the dependent variable, the importance of the variables as a test indicators, the data...
In the automotive field, intelligent control systems and information services using vehicle data are rapidly expanding. However, there is no software architecture to efficiently handle sensor data in vehicles and their surroundings. In order to address these problems and develop automotive software with higher productivity and trustworthiness, we have researched and developed data-centric software...
Since TCG v1.2, an anonymous attestation protocol was proposed, called direct anonymous attestation (DAA), which is designed to preserve the user privacy. However, this scheme is vulnerable to the masquerading attack, meanwhile not be practically deployed with existing network protocols. In this paper, we proposed a novel anonymous remote attestation protocol based on the direct anonymous attestation...
Software-as-a-Service (SaaS) is emerging as a new software delivery model, where the application and its associated data are hosted in the cloud. Due to the nature of SaaS and the cloud in general, where the data and the computation are beyond the control of the user, data privacy and security becomes a vital factor in this new paradigm. In multi-tenant SaaS applications, the tenants (i.e., Companies)...
A Virtual Machine Monitor (VMM) is the primary solution in data centers to support cloud computing services. Its ability to virtualize machines promises cost efficiency, ease of management, robustness, security, and scalability. However, as the complexity of computer systems is perpetually expanding, providing trustworthy and dependable systems is becoming a more crucial issue than ever. This paper...
Previously, we had proposed the source initiated routing ID-based routing (SRIDR) method that utilized "top-down" tree-structured routing ID to counter the disruption due to the instability of wireless communication for static ad hoc networks. Since this method has no ID reassignment process, this method cannot be applied to MANETs. To counter link disruption due to node mobility, we have...
The assurance network design principle makes systems work stably in both normal and disaster situations. We have been studying and developing assurance-based dual-purpose systems, which are available in both normal and disaster situations. Also we have developed a prototype of network applications for such systems. The prototype has two types of graphical user interface (GUI) for both situations....
The conventional SMS authentication using a mobile phone is no longer a secure means of authentication. This is because the security of mobile phones and smartphones is under threats by malicious code and applications, to be precise, SMS authentication is not multi-channel authentication. Since this unsafe SMS authentication method using a mobile phone is used as a means to verify the identity such...
A transaction-time XML database archives XML data versions to create a complete history of the data and processes transaction-time queries to fetch requested versions of data. The database will grow over time as new versions are created, and its unrestrained growth will eventually exceed storage capacity. To become an autonomous, self-managing database this growth must be controlled by vacuuming versions...
Option pricing is one of the most challenging problems in computational finance and derivative modeling. As a result, one has to resort to computational approaches since it is difficult to obtain closed form solution for options other than simple options such as European style options. Also, due to the complex nature of the governing mathematics, several numerical approaches have been proposed in...
Effective applications of M2M (Machine-to-Machine) systems for disaster prevention, such as an early warning system for flood and landslide, are highly expected. In particular, in applications for flood disaster prevention, an early warning of the flash flood caused by local torrential rain is required as well as a flood impact analysis based on water level and rainfall monitoring in the whole basin...
The cloud-computing paradigm has become a standard for on-demand and scalable storage and computation capabilities. Merging the elasticity of the clouds with mobile computing produces mobile cloud computing, which enhances many aspects, such as battery lifetime, performance and bandwidth. Cloudlets are resourceful computational units that provide cloud-computing services to mobile devices. Before...
We present CAVE, a novel hybrid algorithm for caching in content-oriented networks (CON). It relies on popularity-based caching and content chunk indexing. CAVE is a combination of two existing caching algorithms: WAVE which is a popularity-based scheme, and CONIC which is an index-based scheme. In CAVE, routers run WAVE and CONIC, with WAVE having priority over CONIC, while clients use a modified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.