The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Eduroam, the world-wide roaming system for research and educational institutions, has several shortcomings such as unstable and slow user authentication and weakness against network/proxy failures. We propose a disruption-tolerant authentication architecture based on the combination of certificate-based authentication and the centralized authentication system called Delegate Authentication System...
In recent years, much attention has been paid to wide area distributed storages to backup data remotely and ensure that business processes can continue in terms of disaster recovery. In the 'distcloud' project, authors have been involved in the research of wide area distributed storage by clustering many computer resources located in geographically distributed areas, where the number of sites is more...
Lots of distributed software systems use layer-based architecture; the lower layer provides functionalities and services to upper layer via various interfaces and protocols. When the system is evolving, layers may grow or split further, each layer expands horizontally with more modules, and the overall functionalities get more complex. Software modules providing similar functionalities or services...
The workshop aims to bridge the gap between software engineering, services, business and cloud computing communities by specifically addressing the challenges for software engineering FOR and IN the cloud. The workshop issue extends our scientific query for probing an answer for the above through successive workshops on the Future of Software engineering IN and FOR the Cloud in conjunction with IEEE...
To deal with problems of after-sale maintenance service of belt conveyor manufacturers, the service-oriented belt conveyor remote auxiliary repair system is presented. The system network architecture and functional architecture of service-oriented system based on J2EE is presented here. Under this architecture, Auxiliary Repair service of combination of remote expert services and knowledge services...
This poster paper presents a high-level description of the Metalogue project that is developing a multi-modal dialogue system that is able to implement interactive behaviors that seem natural to users and is flexible enough to exploit the full potential of multimodal interaction. We provide an outline of the initial work undertaken to define a an open architecture for the integrated Metalogue system...
Cloud computing technology provides a convenient way for the distribution and application of educational resource, which becomes the hotspot of ICT in education. Based on in-depth study of standards in cloud computing and E-Learning, the paper analyzes the requirement, key techniques and actual application of cloud computing education, constructs a standard architecture, elaborates the relationship...
Microgrids (MGs) in distribution networks have been dramatically increasing due to integration of distributed renewable sources. With connection of MGs, utility grid and customer supply becomes more reliable. An emergency modes for MGs must be envisaged after a general black out. Considering operating and control flexibility, capability of grid-tied, and autonomous operation, MGs with energy storages...
The Massive Open Online Course (MOOC) is a new online learning way in the field of open and distance education in recent years. MOOC reflects the learner-centered teaching philosophy, so the students get the knowledge from the formal single linear to complex pathways by MOOC. With the development of mobile terminals, mobile learning will inevitably become the mainstream. The current research on learning...
Polar codes are among the most promising error correction codes due to their ability to achieve the symmetric capacities of the binary-input discrete memoryless channels (B-DMCs). However, how to design successive cancellation (SC) decoders which can maximize the hardware utilization efficiency is still challenging due to the inherent serial nature of SC decoding algorithm. To this end, in this paper,...
The MapReduce frameworks using a modern graphic processor (GPU) have improved the performance of data-intensive applications. While the prior researches have enhanced the parallelism of the MapReduce application on a GPU, archiving optimal distribution of big data on heterogeneous devices is still a challengeable issue. We therefore propose a method to evenly separate the computing cost under limited...
This paper designed a typical task oriented adjustable autonomy architecture for autonomy control of unmanned surface vehicle (USV). First a two-dimensional classify method of an adjustable autonomy control level is presented, which is applied to the USV system. Then an index system is established for the autonomy control level assessment of USV, which includes the performance of USV, environmental...
The data are complexity and heterogeneous in the city-scale. When the tasks are nonlinear, existing systems cannot perform well. This paper proposes a data service oriented architecture that is based on the data vitalization theory. In this perspective, the vitalized cells are the basic units of a system, which are organized through nested and/or layer structure. A smart service platform bases on...
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then...
A system architecture design relying only on the experience of its designer varies in quality in line with the designer's personal experience and knowledge-ability. Likewise, a wrong estimation of hardware capacity ends up in waste of resources. In practice, a range of post-hoc monitoring tools are in operation, without providing any method for estimating and reflecting the performance at an early...
In response to reliability challenges of new systems being built, we are proposing a scalable Self-Test architecture for many-core processor systems. This BIST architecture periodically distributes test stimuli among identical processing cores in a many-core processor system, suspends normal operation of individual processing cores, applies test, detects faulty cores, and removes them from the system...
This paper addresses the problem of managing highly dynamic network and service environments, where virtual nodes and virtual links are created and destroyed depending on traffic volumes, service requests, or high-level goals such as reduction in energy consumption. This problem will be one of the main technical challenges to be faced in the evolution towards Future Networks (FN). Emerging paradigms...
Many primary care clinics have transitioned from paper-based record keeping to computer-based Electronic Medical Record (EMR) systems. This transition provides opportunities for computer-based data analytics in support of practice improvement and more evidence-based clinical research. Unfortunately, the data in primary care EMRs is often not readily accessible to researchers, who often have to overcome...
Cloud computing is perceived as the next wave of ICT, and many real experiences are on the commercial scene. However this kind of architecture has open legal issues which makes it an endeavor for Public Administrations, despite its potential impact on the efficiency, effectiveness and transparency of administrative initiatives. In the present paper we present the experience made in the deployment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.