The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent years have witnessed a new video delivery paradigm: smartrouter-based video delivery network, which is enabled by smartrouters deployed at users' homes, together with the conventional video servers deployed in the datacenters. Recently, ChinaCache (a largest CDN provider) and Youku (a video service provider using smartrouters to assist video delivery) announced their cooperation to create a...
This research vision and challenges paper focuses on microprocessor design and activity-recognition data processing for medical devices in student-athlete health care. Sports are the second leading cause of mild traumatic brain injury (mTBI) for people aged between 15 and 24 years. Significant work has been done in the use of sensors to determine the linear and rotational acceleration of head impacts,...
With the increasing popularity of social applications, people spend plenty of time in online social networking, such as chatting, sharing daily activities, etc. All these online activities are recorded in social applications and leave fingerprinting in network traffics. Both of these two data sources have the risk of leaking privacy. However, previous studies focus on the privacy leakage in social...
The increasing capabilities of modern smartphones lead to the design of mobile social applications focusing on direct interaction between users. Ranging from mobile social networks to fully-fledged augmented reality games, these applications usually operate on contextual information to identify relevant content - most notably, the user's physical location. The resulting locality properties of the...
Short range vehicle to vehicle and device to device communications are of growing interest due to their utility for vehicular safety and infotainment applications as well as for improving the capacity of cellular networks. These mobile systems are characterized by ephemeral, stochastic links. We consider a fundamental problem in this domain -- how to maximize the amount of useful content downloaded...
MapReduce includes three phases of map, shuffle, and reduce. Since the map phase is CPU-intensive and the shuffle phase is I/O-intensive, these phases can be conducted in parallel. This paper studies a joint scheduling optimization of overlapping map and shuffle phases to minimize the average job makespan. Challenges come from the dependency relationship between map and shuffle phases, since the shuffle...
Erasure coding has been extensively deployed in distributed storage systems to ensure high reliability and low storage overhead. However, erasure coding requires much more disk I/O to recover a damaged data block than replication does, resulting in very long data recovery time. Data placement algorithm can be tailored to speed up data recovery process by exploiting I/O parallelism. However, existing...
Abstract-Software Defined Networking (SDN) is an emerging technology that attracts significant attention from both industry and academia recently. By decoupling the control logic from the closed and proprietary implementations of traditional network devices, it enables researchers and practitioners to design new innovative network functions/protocols in a much more flexible, powerful, and easier way...
As a novel Internet architecture, Named Data Networking (NDN) shifts the communication model from address-centric to content-centric. An NDN router caches the data in its content store, greatly reducing network traffic. NDN adopts the hierarchical naming schema, which allows the name aggregation and enables high scalability. However, in a richly connected topology, the nearest data replica are often...
Several reproducible experiments are required before actual deployment of wireless sensor networks takes place if stable and predictable outcomes of protocols and data processing algorithms are desired. Considering the typical size of wireless sensor networks and the number of parameters that can be configured or tuned, conducting repeated and reproducible experiments can be both time consuming and...
Location based services (LBSs), which are useful applications of mobile online social network (mOSN), exploit various geographic properties. Location sharing helps people to share their current locations with designated friends and is one important primitive to construct the LBSs. The recent reports showed that a poorly designed location sharing scheme could easily allow the privacy of users to be...
This paper presents a feasibility study of 60 GHz indoor WLANs. We evaluate 60 GHz performance in a typical academic office building under the primary assumption that 60 GHz WLAN APs and clients will be equipped with wider beam antennas to cope with client mobility. In contrast to previous works which measured performance at a single layer using custom, non-standard compliant hardware, we investigate...
Currently, various Medium Access Control (MAC) protocols have been proposed for underwater Wireless sensor networks. Unlike terrestrial networks, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range in underwater environments. However, the use of acoustic waves incurs long propagation delays that typically lead to low throughput especially in protocols that...
Facing a huge volume of data that quickly generated from big data applications, it is crucial for the information and communication technology (ICT) infrastructure being able to process, aggregate, store, manage and analyze with massive data. When an ICT conducts a centralized data learning task, the information privacy of each local dataset might be violated. In this paper, we consider a secure data...
Within the foreseeable future, the growing number of mobile devices, and their diversity, will challenge the current network architecture. Furthermore, users will expect greater data rates, lower latency, lower packet drop rates, etc. in future wireless networks. Ultra Dense Networks (UDN), considered to be one of the best ways to meet user expectations and support future wireless network deployment,...
No one likes waiting in traffic, whether on a road or on a computer network. Stuttering audio, slow interactive feedback, and untimely pauses in video annoy everyone and cost businesses sales and productivity. An ideal network should (1) minimize latency, (2) maximize bandwidth, (3) share resources according to a desired policy, (4) enable incremental deployment, and (5) minimize administrative overhead...
Coordination and consensus play an important role in datacenter and cloud computing, particularly in leader election, group membership, cluster management, service discovery, resource/access management, and consistent replication of the master nodes in services. Paxos protocols and systems provide a fault-tolerant solution to the distributed consensus problem and have attracted significant attention...
Verifying the authenticity of the source of network traffic and the path that this traffic has traversed is an important building block for secure network protocols and defense mechanisms. We investigate these problems of in-network source authentication and path validation. Existing approaches are either unable to satisfy security requirements or need significant computational resources due to cryptographic...
SDN promises to make networks more flexible, programmable, and easier to manage. Inherent security problems in SDN today, however, pose a threat to the promised benefits. First, the network operator lacks tools to proactively ensure that policies will be followed or to reactively inspect the behavior of the network. Second, the distributed nature of state updates at the data plane leads to inconsistent...
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers with simple attacks to cause denial of service. We proposed a defense mechanism based on a proof-of-work protocol. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.