The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Variety of data has led to the fall of the "One size fits all" paradigm in databases. Applications now store data in multiple data representations, rather than just storing the data in a single relational database. However, applications only provide consistency semantics at the boundaries of a single datastore, corresponding to specific representation. This can lead to semantically inconsistent...
Component Analysis (CA) comprises of statistical techniques that decompose signals into appropriate latent components, relevant to a task-at-hand (e.g., clustering, segmentation, classification). Recently, an explosion of research in CA has been witnessed, with several novel probabilistic models proposed (e.g., Probabilistic Principal CA, Probabilistic Linear Discriminant Analysis (PLDA), Probabilistic...
This paper proposes an ensemble based automatic speaker recognition (ASV) using adapted score fusion in noisy reverberant environment. It is well known that background noise and reverberation affect the performance of the ASV systems. Various techniques have been reported to improve the robustness against noise and reverberation, and an ensemble based method is one of the effective techniques in the...
The importance and reach of sensors networks grows every year, however, there are still many challenges that must be addressed. One of them, is the standardized interchange of information that enable interoperability between different networks and applications. To answer this challenge, the Open Geospatial Consortium (OGC) has created the Sensor Web Enablement (SWE) specification. SWE has given place...
Electric power industries have expanded the automation of their networks in recent years to meet the growing demands for improvements in services. The introduction of the concept of Smart Grid, the increased availability of smart devices and improvements in telecommunications are key factors for that. Besides the benefits in control and management that this concept brings, there are some technical...
We present a transaction model which simultaneously supports different consistency levels, which include serial-izable transactions for strong consistency, and weaker consistency models such as causal snapshot isolation (CSI), CSI with commutative updates, and CSI with asynchronous updates. This model is useful in managing large-scale replicated data with different consistency guarantees to make suitable...
Standardization of Internet protocols is usually a somewhat slow process. The reasons for this are manifold. Besides working out the protocol details, things like opposing stakeholder interests can prolong the consensus building process, new requirements might be introduced that require technical changes to the protocol, coordination across standards developing organizations (SDOs) might add delays...
This paper describes a model-driven implementation of a standard-compliant Customer Energy Manager (CEM). The advantage of the proposed implementation methodology over conventional techniques is the automatic support of standard data models and the possibility to express CEMS logic in a protocol-independent way. In particular, the logic can be expressed as a state machine, with language constructs...
In encrypted search, a server holds an encrypted database of documents but not the keys under which the documents are encrypted. The server answer keyword queries from a client with the list of documents matching the query.
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
With high and growing supply of Database-as-a-Service solutions from cloud platform vendors, many enterprises still show moderate to low demand for them. Even though migration to a DaaS solution might result in a significantly reduced bill for IT maintenance, data security and privacy issues are among the reasons of low popularity of these services. Such a migration is also often only justified if...
The OpenFlow (OF) protocol is widely used in Software Defined Networking (SDN) to realize the communication between the controller and forwarding devices. OF allows great flexibility in managing traffic flows. However, OF alone is not enough to build more complex SDN services that require complete control and management of the data plane (e.g. configurations of ports, queues, etc.). The current work...
Aim at the digital works are facing with difficult problems in counting, providers can not accurately gain the real and integrated trade data, this paper presents a reliable supervision model, which includes three parts, a seller, a authorizer and a trusted third-part platform, introduces a robust upload data protocol and gives a system implementation. In this paper, the authorizer and seller will...
In this paper we describe the design and implementation of ACaZoo, a key-value store that combines strong consistency with high performance and high availability. ACaZoo supports the popular column-oriented data model of Apache Cassandra and HBase. It implements strongly-consistent data replication using primary-backup atomic broadcast of a write-ahead log, which records data mutations to a Log-structured...
We present here a transaction management protocol using causal snapshot isolation in partially replicated multi-version databases. We consider here replicated databases consisting of multiple disjoint data partitions. A partition is not required to be replicated at all database sites, and a site may contain replicas for any number of partitions. Transactions can execute at any site and read or write...
Hardware support for Global Address Spaces (GAS) has previously focused on providing efficient access across remote memories, typically using custom interconnects or high-level software layers. New technologies, such as Extoll, HyperShare, and NumaConnect now allow for cheaper ways to build GAS support into the data center, thus making high-performance coherent and non-coherent remote memory access...
Research in transactions planning has recognized the evolvement of Web Services as an industry standard to implement transactional business processes. We proposed a data modeling and contracting framework for Web services and in this paper we are exploring how our framework can help formally verify data integrity properties in an ad-hoc transaction.
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link,...
In distributed system, deadlock is a common phenomenon. If a transaction requires more than one resource for its task to be accomplished, such request is called an AND model request. In this paper we have proposed a method for elimination of AND model deadlocks in distributed system. A Multi Granular Locking (MGL) technique is proposed which locks the database at various granules. This technique is...
This paper presents our design and implementation of a Configuration Validation System (ConfVS) which uses a high-level language to help system operators verify network configurations based on formal requirements. In contrast to many existing solutions, ConfVS uses a comprehensive model to formalize the network specification and utilizes the NETCONF protocol to collect configuration data from network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.