The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper briefly introduces the Command Query Responsibility Segregation (CQRS) and discusses the performance of the architecture. The pattern is separated from the business by modifying the behavior of modifying (adding, deleting, modifying the system state) and querying (without modifying the system state), making the logic clearer and easier to target different parts Optimization, and finally...
We present the MASSE architecture, a YARA-based open source client-server malware detection platform. MASSE includes highly effective automated syntactic malware detection rule generation for the clients based on a server-side modular malware detection system. Multiple techniques are used to make MASSE effective at detecting malware while keeping it from disrupting users and hindering reverse-engineering...
The rapid growth of data and high-dependency of industries on using data put lots of focus on the computing facilities. Increasing the efficiency and re-architecting the underlying infrastructure of datacenters, has become a major priority. The total cost of owning and running a datacenter (DC) is affected by many parameters, which until recently were ignored as their impact on the business economy...
Mobile device features such as camera and other sensors are evolving rapidly nowadays. Supported by a reliable communications network, it raises new methods in information retrieval. Mobile devices can capture an image with its camera and pass it to the retrieval systems to get the information needed. This system, called Mobile Content-Based Image Retrieval (MCBIR), generally consists of two parts:...
Cloud database management systems (DBMSs) often decouple database instances from physical storage to provide reliability and high availability to users. This design can robustly handle a single point of failure, but needs substantial effort to attain good performance. In this paper, we analyze the decoupled architecture and present important optimization issues that we faced in implementing the design...
Cloud-based services and applications have been widely deployable these days. Such services benefit from the almost infinite cloud compute, storage, and networking resources. Many of such services are partially hosted on the cloud. That is, some of their tasks get executed off the cloud, and the other tasks are executed on the cloud. In this paper, we show how to automate the execution of these tasks...
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying...
This paper presents the design and implementation of an Internet of Thing (IoT)-based system for indoor localization using Bluetooth Low Energy (BLE) technology. Our solution consists of two main systems: an acquisition system and a central server, under the Client-Server paradigm and the IoT philosophy. We report the development of different modules: measurement (Bluetooth beacons), data aggregation...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
As software engineering researchers, we are also zealous tool smiths. Building a research prototype is often a daunting task, let alone building an industry-grade family of tools supporting multiple platforms to ensure the generalizability of results. In this paper, we give advice to academic and industrial tool smiths on how to design and build an easy-to-maintain architecture capable of supporting...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
Modern e-learning systems offer students many interactive learning elements such as videos or quiz questions. For the optimization of the teaching, the learning elements themselves and the prediction of student performance, it is important for educators to figure out how student interactions can be tracked and how the tracked data can be used. Modern learning courses can consist of different Software-as-a-Service...
Remote experimentation has long conflicted with security policies imposed by networks administrators. To provide external access to experiment servers in a university, security measures are demanded. Such leads to an excessive dependency on the IT departments for services configuration and maintenance. In the present work, modifications in ISA/ELSA architecture are proposed to circumvent those problems...
Despite their proliferation as a dominant computing paradigm, cloud computing systems lack effective mechanisms to manage their vast amounts of resources efficiently. Resources are stranded and fragmented, ultimately limiting cloud systems' applicability to large classes of critical applications that pose non-moderate resource demands. Eliminating current technological barriers of actual fluidity...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
The Domain Name Service (DNS) is a vital service in the Internet. Much more than a simple translation mechanism, it also allows higher profile functionalities such as load balancing and enhanced content distribution. In the scope of cloud computing, DNS is foreseen as an elastic and robust service, supporting failover mechanisms, decentralised configuration and multi-tenant isolation.
MOBA (Multiplayer Online Battle Arena) games are currently one of the most popular online video game genres. This paper discusses implementation of a typical MOBA game prototype for Windows platform in a popular game engine Unity 5. The focus is put on using the built-in Unity components in a MOBA setting, developing additional behaviours using Unity's Scripting API for C# and integrating third party...
The paper deals with the problem of designing and implementing an inexpensive wide area sensors network for environmental radiological monitoring. To this aim, the measurement node takes advantage from a low-cost, Linux based, development platform, and some new open-source software tool, which are pushed towards a network-oriented vision of Internet of Things (IoT).
This paper presents a case study of an application prototype for shipbuilding industry using RESTful web service. Majority of database applications for traditional enterprises are based on the two-tier with simple client-server or the three-tier with additional RPC middleware. Because the outdated old configuration is not extensible, an alternative is required to link the database to the Web or mobile...
The BEACON framework enables the provision of federated cloud infrastructures, with special emphasis on intercloud networking and security issues, to support the automated deployment of applications and services across different clouds and datacenters. BEACON is distributed as an open source software, and some of its innovative features have contributed to the OpenNebula and OpenStack cloud management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.