The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual Environments have become a compelling tool for various applications beyond gaming and Virtual Worlds, for example for education, collaborative engineering, or simulation and visualization. In the emerging field of smart environments, like Smart Cities and Smart Factories for industry or agriculture, a digital counterpart of a real world site, driven by hundreds of Internet of Things (IoT)...
In cloud environment, client user credential protection is a critical security capability that is target of adversarial attacks, especially, in cloud file synchronization applications. Among the various adversarial attacks, MITC (Man in the Cloud) attack on commercial cloud storage applications has emerged as a critical threat because it is easy to launch and hard to detect. In this paper, we propose...
Deduplication finds and removes long-range data duplicates. It is commonly used in cloud and enterprise server settings and has been successfully applied to primary, backup, and archival storage. Despite its practical importance as a source-coding technique, its analysis from the point of view of information theory is missing. This paper provides such an information-theoretic analysis of data deduplication...
With the increasing popularity of serving and storing data in multiple data centers, we investigate the efficiency of majority quorum-based data consistency algorithms under this scenario. Because of the failure-prone nature of distributed storage systems, majority quorum-based data consistency algorithms become one of the most widely adopted approaches. In this paper, we propose the MeteorShower...
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
Machinima is which use real-time graphics rendering platform game engine to create animated videos or films. Traditional methods of machinima filming are stand-alone methods that using artificial intelligence scripting to implement the plot. However, massive script writing work of artificial intelligence will cost a IoT of manpower and resources. This paper proposes a method based on network game...
In Machine learning (ML) the model we use is increasingly important, and the model's parameters, the key point of the ML, are adjusted through iteratively processing a training dataset until convergence. Although data-parallel ML systems often engage a perfect error tolerance when synchronizing the model parameters for maximizing parallelism, the synchronization of model parameters may delay in completion,...
A geographically isolated disaster-tolerant system for Distributed File System (DFS) is essential for its enhancement in data security. However, the plain disaster tolerant model performs poor quality while a switch happens in hot-backup. In this study, we proposed a Direct Data Fetch (DDF) technology for the hybrid model. The DDF can fetch data directly from the data chunk server while the main server...
Simulation is an important and widely used method for the analysis of the behavior of large systems, many applications exist. Special branches of research are the simulation of very large models using distributed simulation, and embedded simulation, i.e. The coupling of virtual models with physical hardware. In our work, we approach the combination of both challenges, thus we use distributed simulation...
Personal mobile devices (PMDs) have become the most used computing devices for many people. With the introduction of mobile cloud computing, we can augment the storage and computing capabilities of PMDs via cloud support. However, there are many challenges in developing mobile cloud applications (MCAs) that incorporate cloud computing efficiently, especially for developers targeting multiple mobile...
Massive cloud-based data-intensive applications (e.g., iterative MapReduce-based) could involve graph data processing. How to effectively analyze and process large-scale graph data is an unsolved challenging problem. We present a parallel computation framework, named MyBSP, which is inspired by Google's Pregel system. MyBSP supports and implements the Bulk Synchronous Parallel (BSP) programming model,...
Electricity, water or air are some Industrial energy carriers which are struggling under the prices of primary energy carriers. The European Union for example used more 20.000.000 GWh electricity in 2011 based on the IEA Report [1]. Cyber Physical Production Systems (CPPS) are able to reduce this amount, but they also help to increase the efficiency of machines above expectations which results in...
This paper presents two different aspects considering a co-simulation of smart grid scenarios. First considers representing the control strategy in a separate discrete event simulation developed in a multi-agent platform. This study investigates the design and implementation of such a simulator. Special attention is given to timing issues presenting time variant and time invariant models. The second...
With the increasing number of mobile devices it is necessary to create adapted solutions for this type of devices that respect their limited processing capacities, memory and bandwidth. We propose a synchronization model based on message digests to synchronize relational databases between mobile devices and a server, in order to minimize the data transferred between the device and the server and to...
Cloud storage systems are currently very popular, generating a large amount of traffic. Indeed, many companies offer this kind of service, including worldwide providers such as Dropbox, Microsoft and Google. These companies, as well as new providers entering the market, could greatly benefit from knowing typical workload patterns that their services have to face in order to develop more cost-effective...
Fault tolerance in distributed systems relies heavily on some form of replication. Replication can also be used to reduce the access latency and the bandwidth consumption in large scale distributed systems. However, in case of large volumes of data, the replica placing strategy and the consistency algorithms become key factors for the performance of the data replication strategy. We present a simulation...
Design applications, e.g., CAD or media production, often require multiple users to work cooperatively on shared data, e.g., XML documents. Using explicit transactions in such environments is difficult, because designers usually do not want to consider transactions or ACID. However, applying transactions in order to control visibility of changes or specify recovery units, is reasonable, but determining...
Distributed collaborative design among heterogeneous CAD systems enables manufacturing organizations to maintain competitiveness in the fiercely competitive global industry. It is no doubt that the requirement of collaboratively heterogeneous CAD system is become more and more exigent. In this paper, a distributed collaborative design framework is presented and a prototype system of collaboratively...
In this paper, we present automated formal verification of the DHCP Failover protocol. We conduct bounded model-checking for the protocol using Timeout Order Abstraction (TO-Abstraction), a technique to abstract a given timed model in a certain sub-class of loosely synchronized real-time distributed systems into an untimed model. A resulting untimed model from TO-abstraction is a finite state machine,...
At present, as a new trend of the telecommunication industry, mobile application requires refine the technique of data management continuously, therefore, mobile database has been come into being. The thesis mainly focused on the introduction of mobile database and the characteristics of data management, especially analyzed the architecture and functions of the SQL Server CE. On this basis, according...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.