The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtualization techniques have shown to report benefits to data centers and other computing facilities. In this regard, virtual machines not only allow reducing the size of the computing infrastructure while increasing overall resource utilization but virtualizing individual components of computers may also provide significant benefits. This is the case, for example, for the remote GPU virtualization...
Computing technology consists of four elements: user devices, computer networks, servers and software. Change in any of the elements can cause the computing technology to move from one phase to another. So far computing technology has undergone five phases starting from centralized computing to ubiquitous computing. We are moving into the sixth phase of computing technology, namely the advanced ubiquitous...
This paper presents a novel approach to adapting distributed applications, which are running on one or more computers, to change their requirements and system structures. The key idea behind the approach is to introduce the policy-based migration of software components between computers, which components are consisted by threads, for dynamically adapting general-purpose distributed applications. e...
Internet of Things is the third wave of global information industry following computer, the Internet and mobile communication network. The International Telecommunication Union proposes four key application technologies of IoT: RFID technology, sensor technology, smart technology and Nano technology. RFID technology, which is short for radio frequency identification, is introduced in this paper. The...
This paper presents a solution of measurement and control network based on ICE distributed middleware in connection with features and requirements of distributed measurement and control system. Taking example of space tracing ship system, this solution not only achieves efficient network communication in heterogeneous environment, but also realizes functions in the measurement and control network...
Distributed virtual reality systems (DVR systems) have evolved significantly over the past twenty years and found wide spread in many applications for training, educational and entertainment purposes. Modern DVR systems require sophisticated data exchange mechanisms to provide consistent interaction of a large number of users over the Internet. While many of these mechanisms have been well studied,...
The level 2 system of POSCO consists of general server-level computers which adopt middleware to minimize migration cost and development time of application software. In order to reduce cost and time further, POSCO, one of the leading steel companies, has been developing its own middleware in recent years. This paper describes the structure and the behavior of POSCO middleware named POSMOS. Moreover,...
This paper describes a testing and benchmarking framework built to support the community of computer scientists. The framework provides features for defining benchmarks, uploading program code and executing test runs on the test infrastructure. For every test run, the framework measures the performance of the execution in terms of execution time, resource consumption and the quality of the data output...
RFID applications for high-capacity storage require a large number of readers. They must be connected to the enterprise intranet using an internal network of switches organized in one or more levels, or using VPN. Traffic in such a network may involve, at certain times of a day, an intensive stream of the data. Design and testing of such a network before actual implementation are often impossible...
Clusters of computers can provide, in aggregate, reliable services despite the failure of individual computers. System-level virtualization is widely used to consolidate the workload of multiple physical systems as multiple virtual machines (VMs) on a single physical computer. A single physical computer thus forms a \fIvirtual cluster\fP of VMs. A key difficulty with virtualization is that the failure...
The hardware and software advances of Graphics Processing Units (GPUs) have favored the development of GPGPU (General-Purpose Computation on GPUs) and its adoption in many scientific, engineering, and industrial areas. Thus, GPUs are increasingly being introduced in high-performance computing systems as well as in datacenters. On the other hand, virtualization technologies are also receiving rising...
PCs in computing labs at institution of higher learning are often if not always underutilized. These PCs are usually not used at night and early morning (i.e. between 10pm–8am), during semester breaks, weekends and during final examinations. At other times most of the lab PCs are not utilized up to the available capacity. This underutilization scenario provides an excellent opportunity for researchers...
In recent years, E-learning has been in a continuous development, due to the fact that it eases the process of teaching, evaluation and selfevaluation, offering schedulling flexibility and a tool support. E-learning makes learning content available even in remote locations, eliminating the need to travel to the place where the content is delivered. Nevertheless, the current E-learning platforms have...
Originating in 1980s, distributed simulation has turned out to be a powerful tool in scientific research, military simulation and training, complex product design and more other fields. However, new problems like limited computational capacity and heavy communication overhead exist as simulation modeling and computation develop. This paper concentrates on these problems, reviews related work, and...
Data stream is becoming an important data-intensive application. Off-line analysis process optionally querys massive logged data that data stream produce, single querying may process hundreds of GB data, timeliness and scalability present great challenge to traditional database. In this paper, characteristics of data stream off-line analysis is analyzed based on network monitoring management, and...
We describe the educational cloud layer of our Cadabia middleware. This layer will permit users to specify the machines which will be used for copies of the materials for various groups that they have joined. This kind of “personal cloud” will help to protect data for both individuals and institutions, while making other data searchable by those who have used similar ontologies.
In this paper we present a parallelized particle-based volume rendering (PBVR) system to obtain super linear speedup, i.e. the speedup with N processors is greater than N, on a distributed computing system. PBVR is a technique of volume rendering which does not need any sorting therefore it is suitable for parallel execution. We implemented the parallel version by using Open CABIN middleware and measured...
This paper analyzes the status of the computer lab and traditional management of several problems, made use of its software and manage the development of secondary development of access control systems and remote video monitoring systems to automate the management of design. Realization of the system mainly uses the middleware technology, pattern recognition, data mining technology to solve the organic...
This paper deals with the design and implementation of a virtual opportunistic grid infrastructure that allows taking advantage of the idle processing capabilities currently available in the computer labs of a university campus, ensuring local users to have priority in accessing the computational resources, while simultaneously, a virtual cluster takes the resources unused by them. A virtualization...
We present GamePod, a portable system that enables mobile users to use the same persistent, gaming environment on any available computer. No matter what computer is being used, GamePod provides a consistent gaming environment, maintaining all of a user's games, including active game state. This is achieved by leveraging rapid improvements in capacity, cost, and size of portable storage devices. GamePod...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.