The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider medium access control (MAC) policies for emerging systems that are equipped with fully digital antenna arrays which are capable of adaptive multi-beam directional communications. With this technology, a user can form multiple simultaneous transmit or receive beams, allowing for greater spatial reuse and higher network throughput. The enabling technology that we consider...
One of the most severe and challenging threats to Internet security is phishing, which uses spoofed websites to steal users' passwords and online identities. Phishers mainly use spoofed emails or instant messages to lure users to the phishing websites. A spoofed email or instant message provides the first-layer context to entice users to click on a phishing URL, and the phishing website further provides...
Recently Spark has become a popular cluster computing platform because of its fast in-memory computing which allows users to cache data in servers' memory and query it repeatedly. However, since network I/O is much slower than local I/O, the network can be a bottleneck for data intensive jobs. When data locality is not well balanced or network capacity is limited, data contention can occur, which...
In a large network, it is often important to be able to detect high-volume traffic in near real-time. Existing work on the detection and identification of such high volume traffic (so-called heavy hitters) is typically delegated to individual nodes and often relies on deep packet inspection and/or packet sampling. However, these techniques have well known limitations in terms of its ability to scale...
In recent years, many cross-VM covert channels have been discovered in cloud computing, causing serious security concerns. For such covert channels, some mitigation schemes have been proposed, but usually one mitigation scheme aims at a specific covert channel, which may be inefficient in defending against potential new attacks. In this paper, we propose a generic solution to mitigate the risk of...
The modern computing landscape consists of numerous heterogeneous devices, all of which can contribute to a distributed environment as generic computation resources. In unstructured environments, resources can easily be shared and consumed at the cost of certainty. While some applications can handle such a best-effort service, many others require execution qualities, e.g., reliability or speed. We...
Radio duty cycling (RDC) is a method for making resource constrained Internet-of-Things devices more energy efficient. RDC protocols achieve energy efficiency by keeping their radio off most of the time. Asynchronous RDC (ARDC) forms a subclass in which devices are not synchronized. ARDC behavior may lead to reliability and predictability problems for broadcast and unicast message transmissions in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.