The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed file systems enable the reliable storage of exabytes of information on thousands of servers distributed throughout a network. These systems achieve reliability and performance by storing multiple copies of data blocks in different locations across the network. The management of these copies of data is commonly handled by intermediate servers that track and coordinate the placement of data...
Proximity detection is one of the critical components in Location-based Social Networks (LBSNS), which has attracted much attention recently. With the advent of LBSNS, more and more users' location information will be collected by the service providers. However, with a potentially untrusted server, such a proximity detection service may threaten the privacy of users. In this paper, aiming at achieving...
In Cloud-based VDI, users can access the virtual desktop service anytime and anywhere with the wide variety of terminals. The lightweight virtual desktop display protocol is required to support more users on the limited resources and to provide service to mobile users. In this paper, we design and implement the virtual desktop system using lightweight virtual desktop display protocol which would reduce...
Cloud computing is getting more popular in the field of computer science because of its reliability in storing and assessing data remotely. In the presence scenario it is very biter to have mobile devices as an interface between user and server, to access and store data for one's need. Mobile technology in cloud computing is helps users to operate on the data for any of the application for their organization...
Encoding multimedia streams of video calls is a very compute-intense task that significantly decreases battery lifetime of mobile phones. This paper introduces an approach to reduce power consumption of mobile phones by offloading video encoding efforts from mobile devices to external services. These services are hosted on servers co-located with cellular base stations. The paper describes how these...
Network connectivity offers the potential for a group of musicians to play together over the network. This paper describes a trans-Atlantic networked musical livecoding performance between Andrew Sorensen in Germany (at the Schloss Daghstuhl conference on Collaboration and Learning through Live Coding) and Ben Swift in San Jose (at YL/HCC) in September 2013. In this paper we describe the infrastructure...
Generally, interoperability in all the levels of a communication architecture (field, unit, plant and management level) is a feature that cannot be easily satisfied because equipments are based on different technologies and communication protocols. OPC Unified Architecture (OPC UA) can provide a cohesive, secure and reliable cross platform framework for interoperability, as shown by current literature...
In this paper we propose a new hybrid architecture between client/server and P2P network architectures in order to provide better service quality to the end-user. To distribute and protect the content, we use a discrete geometry tool as the Finite Radon Transform (FRT) in a Maximum Distance Separable (MDS) fashion. The presented results clarify the interest of the proposed architecture in terms of...
Video processing applications are notably data intense, time, and resource consuming. Upfront infrastructure investment is usually high, specially when dealing with applications where time-to- market is a crucial requirement, e.g., breaking news and journalism. Such infrastructures are often inefficient, because due to demand variations, resources may end up idle a good portion of the time. In this...
Graphics processing unit (GPU) has evolved into a general-purpose computing platform. Inspired by the GPU technology advantage, this paper concerns the design and performance evaluation of practical GPU-accelerated server architecture for Video-on-Demand (VoD) services with network coding. Following the proposal of an optimized network coding algorithm based on parallel threads on GPU, a GPU-Accelerated...
Spatial alarms are considered as one of the basic capabilities in future mobile computing systems for enabling personalization of location-based services. In this paper, we propose a distributed architecture and a suite of safe region techniques for scalable processing of spatial alarms. We show that safe region-based processing enables resource optimal distribution of partial alarm processing tasks...
Escalation in the use of lightweight devices leads us to create a concrete base for future nomadic applications, positioned in a changing environment. In this paper, a framework is presented that manages agent communication in a wireless environment. Application development on handheld devices using software agent technology is becoming more and more popular around the world. The agent based framework...
RFID technology has become a hot spot in automatic identification filed in recent years, which opens up a wide variety of applications. However, most RFID applications are still closed-loop-based. In order to build large-scale RFID applications which are transregional and cross-industry, it is necessary to build public RFID service platform. On the basis of recent research, according to characteristics...
This is a survey of the processes, practices, and technologies that can help software maintenance engineers improve the security of software systems. A particular emphasis is placed on validating security architectures, verifying that the implementation of an architecturepsilas constituent applications adhere to secure coding practices, and protecting software systems against malicious software. In...
Recent research has shown that network coding can be used in content distribution systems to improve the speed of downloads and the robustness of the systems. However, such systems are very vulnerable to attacks by malicious nodes, and we need to have a signature scheme that allows nodes to check the validity of a packet without decoding. In this paper, we propose such a signature scheme for network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.