Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The deployment of modular virtual network functions (VNFs) in software defined infrastructures (SDI) enables cloud and network providers to deploy integrated network services across different resource domains. It leads to a large interleaving between network configuration through software defined network controllers and VNF deployment within this network. Most of the configuration management tools...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
Storage demands in the data centers are growing dramatically for most internet and cloud service providers today. More and more service providers are adopting Software-Defined Storage (SDS) instead of traditional fiber channel based storage appliances due to the lead time, expense, and flexibility. However, data centers are held back by storage I/O that cannot keep up with ever-increasing demand,...
With the rapid development of web, mobile apps and IoT devices, a huge volume of data are created every day. In fact, these data are not only large, but also generated quickly and with a variety of different formats. Many companies are forced to face the problem of processing these large data in near real-time. Within different application domains, some data are required to be processed in real-time,...
Content Delivery Networks (CDN) interconnect several surrogate a.k.a replica servers that use geographical proximity as a criteria for delivering multimedia content. The delivered content may be enriched by value-added video services (e.g. in-stream video advertisements). The purpose of this demo is to show the prototype we developed in order to enable a cost-efficient and agile provisioning of value-added...
In this paper, we present L-SCN, a new routing architecture for Service-Centric Networking (SCN), which makes use of a two-layer forwarding scheme composed of inter-domain and intra-domain communication. Unlike existing SCN routing architectures relying on a flat organization, our design splits the network into domains. Nodes within a domain possess significant knowledge about existing services and...
Due to the recent surge in end-users demands, value-added video services (e.g. in-stream video advertisements) need to be provisioned in a cost-efficient and agile manner in Content Delivery Networks (CDNs). Network Function Virtualization (NFV) is an emerging technology that aims to reduce costs and bring agility by decoupling network functions from the underlying hardware. It is often used in combination...
It has been observed that there has been a great interest in computing experiments which has been useful on shared nothing computers and commodity machines. We need multiple systems running in parallel working closely together towards the same goal. Frequently it has been experienced and observed that the distributed execution engine named MapReduce handles the primary input-output workload for such...
As the dependency on Internet is increasing, the service providers are launching numerous web applications to facilitate the users. Due to threat of unauthorized access they want to identify their users accurately. In the same way, leakage of sensitive information makes clients aware enough to make sure whom they are dealing with. This leads to the requirement of a Centralized Authentication System(CAS)...
The growth in information technology has led to a higher level of education process. Web-based system provides indisputable advantages to educational resource relevantly and convincingly. Supervision for final year project students seems to have major infirmity in two-ways communication between supervisor and supervisee, which affected the outcomes of their findings. Thus, e-Supervision system is...
Network Functions Virtualization (NFV) is a recent industrial trend which gains a lot of attention from telecom operators and vendors. The NFV concept delivers network services using commercial off-the-shelf hardware and IT virtualization technologies, thus virtualizing entire classes of network node functions. Traditional and recent data-center architectures are mostly built and optimized for data...
Boosting interactions and engagement of students in a classroom and remote learning is the major focus of our research. The software that has been developed named as Clicker is an android and web based system, designed to aid the teacher and the students to perform assessment, instant feedback and raise anonymous doubts. The software has been specifically designed for two distinct environments, viz...
Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed...
The rise of eLabs (remote labs and virtual labs) in which access to hardware is abstracted; the students and the teachers are left with a simulator or software like experimentation. You give this system a set of inputs and then the user gets to see a live feed of the experimentation happening and when it is done the results are delivered to the user. This project aims to design and eventually build...
Security of sensitive data in the cloud is a critical issue as they can easily be transferred between different locations and then violate some constraints such as country-based regulations. There is notably a specific need to control the path followed by the data when they are transferred within the cloud. This paper is then presenting a new approach using OpenFlow and allowing to enforce in the...
Web applications are replacing traditional native applications in recent years. For web applications, JavaScript is the most extensively used client side programming languages. The large JavaScript codebase often makes applications hard to understand, maintain and extend. Call graph is a human understandable program representation that can be used as a basis for maintenance and further extension of...
Project Information& Management System of ICAR (PIMS-ICAR) has been designed and developed at IASRI, New Delhi to help in taking decisions to check duplication in research projects both at divisional as well as inter divisional level for on-line monitoring and concurrent evaluation of the ongoing research projects and for other management requirements. The Ongoing Projects options module is meant...
Massive Multi-user Virtual Environment (MMVE) research is typically evaluated using traces obtained in emulated environments. Evaluation results obtained using commercially successful MMVEs, such as Minecraft, could aid industry when considering the adoption of newly published MMVE techniques or alternate architectures. In this paper we present our ongoing work in extending Minecraft to become a research...
SaaS (Software as a Service) is widely used as a model for selling software. SaaS applications are on the software provider and can be accessed via the Internet. The SaaS applications have the same basic functions in the template file and the template file can be configured by tenant administrators to meet the individual demands. Workflow is used in SaaS applications and business processes need to...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.