The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider a cloud service based on spot instances and explore bidding and pricing strategies aimed at optimizing users' utility and provider's revenue, respectively. Our focus is on jobs that are heterogeneous in both valuation and sensitivity to execution delay. Of particular interest is the impact of correlation in these two dimensions. We characterize optimal bidding and pricing strategies under...
In a complicated cloud storage environment in which users upload a large number of files everyday, in order to better solve the challenge of inefficient malicious detection and weak adaptability of multi-platform detection in the traditional way, we propose a malicious file detection method which is based on image texture analysis and BP neural network algorithm. By combining the technology of image...
5G operators will utilize mobile edge computing (MEC) to shorten transmitting latency and fulfill the requirements of increasing mobile applications for high bandwidth and ultra-low latency. A mobile online system (MOS) supports mobile online applications to trigger events in the mobile devices, refresh data, and maintain data consistency in the clouds. As users run mobile online applications, a MOS...
Traditional internet architecture is challenged and it cannot satisfy the growing demand of todays networks. Information-centric Networks (ICN) is regarding as a promising replacement to meet this trend. The main characteristic in ICN is Content Store (CS), which is used to enable users to retrieve data from nearby nodes instead of remote server. However, with the limited storage capacity of routers,...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably implemented on resource-constrained smart devices to protect the privacy of communications in mobile networks. The most attractive features of this new KE protocol are provable security and lightweight. The security of this new KE protocol is based on the known impossibility of finding the unique values for variables...
Large cloud service providers often replicate data to multiple geographically distributed datacenters for availability and service quality purposes. The enormous amount of data needed to be shuffled among datacenters call for efficient schemes to maximally exploit the capacity of the inter-datacenter networks. In this paper, we propose Calantha, a new rate allocation scheme that improves the reliability...
Wireless network virtualization is an emerging paradigm to improve spectrum utilization by sharing wireless resources through slicing. In this paper, we investigate interactions between mobile virtual network operators (MVNOs) and users as a Stackelberg game. We leverage wireless virtualization while creating MVNOs that provide wireless coverage by subleasing the frequencies from owners of wireless...
Software testing usually accounts for a large proportion of software development time and cost. Thus, it is crucial to improve test efficiency and reduce test cost as much as possible. This paper describes a cloud-based approach to increase test efficiency by partitioning a large test job into multiple tasks and executing the tasks concurrently on different virtual machines (VMs). Several task partitioning...
In this study, based on clustering algorithms, we perform data mining on land price data in Taichung City during past ten years. For big data analysis, we combine Hadoop HDFS and MapReduce with R language and visualize results on Google Maps. We also study performances of K-means and Fuzzy C-means clustering algorithms, executed in the Hadoop cloud and a stand-alone PC. The experimental results show...
The situation awareness and service composition are emerging as hottest attractions of software technologies. The issues of situation awareness, which consist of the composition of information content, user custom and practices, environment features, and media characteristics, establish user behavior models to provide required services and information with evolution and dynamic adaptation. We design...
As the technologies of cloud computing grow and mature, software developers, software companies, and academia are more likely to develop, deploy, and operate their applications or services on cloud computing environments. By leveraging cloud computing environments, the complexity and the cost of physical hardware, operation, and related management tasks can be reduced. The capacities brought by cloud...
This paper introduced the new approaches to big data platform, RHadoop and SparkR, and integrated them to form a high-performance big data analysis with multiple platforms as part of business intelligence (BI) to carry out rapid data retrieval and analysis with R programming. This paper aims to develop the optimization for job scheduling using MSHEFT algorithm and implement the optimized platform...
Cloud storage services are pervasive nowadays. Many cloud storage services use distributed file systems as their backend storage systems. Some research results on file-size distribution of file systems show that file systems contain lots of small files. Therefore, this paper proposed a hybrid distributed file system based on Ceph and HDFS that can deliver satisfactory write throughputs for a cloud...
The Fund for Peace conducted an annual ranking of 178 nations based on their levels of stability and the pressure they face to maintain and improve it. Out of this number, Mozambique was ranked at 45 meaning high warning. In order to make the situation better in terms of stability and involve the citizens in peace making process we propose a prototype for e-Paz, a system utilizing Cloud Computing...
Server virtualization is one of the critical cloud computing technologies since it enables the use of software-based virtual machines (VMs). Many enterprises have already adopted this technology to build their cloud platforms because of its scalability and flexibility. However, high availability (HA) remains a challenging issue on such a virtualized cloud platform. That is, the time for VM failover...
In this paper, we study methods to estimate drivers' posture in vehicles using acceleration data of wearable sensor and conduct a field test. Recently, sensor technologies have been progressed. Solutions of safety management to analyze vital data acquired from wearable sensor and judge work status are proposed. To prevent huge accidents, demands for safety management of bus and taxi are high. However,...
The development of new smart city has promoted the innovation of information technology, made the industrialization and informatization highly integrated. The construction of smart city relies on the intelligent transformation of the various fields of urban operation, among them, the urban circulation situation is the focus of developing new smart city. The article first puts forward the concept of...
This work develops a cloud-fog computing architecture for information-centric Internet-of-Things (IoT) applications with job classification and resource scheduling functions. The two designed functions support quality of service (QoS) by classifying IoT applications and scheduling computing resources. An innovative scheduling mechanism is developed to optimize the dispatch of cloud and fog resources...
AMNESiA is an affinity measurement platform for NFV-enabled networks, designed to consolidate and interpret existing monitoring data into an affinity metric, aiding operators to identify affinity and anti-affinity relations in the network. AMNESiA uses the latest snapshot of usage data, collected through a generic monitoring solution, from the database to measure affinity between VNFs.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.