The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Incentive-driven advanced attacks have become a major concern to cyber-security. Traditional defense techniques that adopt a passive and static approach by assuming a fixed attack type are insufficient in the face of highly adaptive and stealthy attacks. In particular, a passive defense approach often creates information asymmetry where the attacker knows more about the defender. To this end, moving...
In Machine learning (ML) the model we use is increasingly important, and the model's parameters, the key point of the ML, are adjusted through iteratively processing a training dataset until convergence. Although data-parallel ML systems often engage a perfect error tolerance when synchronizing the model parameters for maximizing parallelism, the synchronization of model parameters may delay in completion,...
In cloud computing model, where resources such as computing power, storage, network and software are abstracted and provided as services on the internet in a remotely accessible fashion. Resource allocation is most emerging research area in cloud environment. Various companies rent the resources from cloud provider for storage and other computational purpose in this way their infrastructure setup...
Mobile devices become popular with the help of hardware improvements and new functions supported by many sensors. In this paper, we propose a mobile and multi-sensing fusion platform to integrate the unstructured streaming sensing data collecting as well as processing technology and build a QoS performance model to estimate the computing resource of the platform. We also demonstrate three mobile and...
Mobile applications are widely used in many research areas as well as in current daily life. Applications on smart phones are closely related to the physical device. An application may run differently on different mobiles. It is hard and expensive for college students to adapt and test their applications on several types of smart phones. This paper presents a work in progress on the development of...
The growing number of locally and globally connected devices and infrastructure services is symptomatic for increasing user requirements on convenient, comfortable, fast and cheap remote computing and access to data. Distributed computing techniques in combination with on-demand Clouds help matching the requirements and the offered resources. This paper evaluates existing distributed computing models...
The idea of computing utility incarnated by the cloud paradigm is gaining a lot of success, both for entertainment and business applications. The consequent increasing demand of computing, storage and communication resources within data centers is fostering new forms of infrastructure sharing such as cloud federations, which can take advantage of virtualization technologies and, in particular, of...
Captures of IP traffic contain much information on very different kinds of activities like file transfers, users interacting with remote systems, automatic backups, or distributed computations. Identifying such activities is crucial for an appropriate analysis, modeling and monitoring of the traffic. We propose here a notion of density that captures both temporal and structural features of interactions,...
The increase in complexity of computer networks and their services have boosted the development of standardizations, models, and solutions for network management over the years. Lately, the Distributed Management Task Force (DMTF) defined the Common Information Model (CIM) for describing computational entities and businesses on the Internet. This paper proposes an extension of the CIM for Software-Defined...
Technological advancements in mobile technology and cloud computing open the door for another paradigm known as Mobile Cloud Computing (MCC). This integration of cloud computing and mobile technology gives numerous facilities to a mobile user, such as the ubiquitous availability of Location Based Services (LBS). The utilization of these LBS services require the knowledge of a user's location, hence...
In cloud computing environment, cloud clients may view media contents, such as document, music, and/or video, stored in the cloud server storage. To support access to the contents even in offline mode, a content cache scheme in client device is proposed in this paper. In the scheme, content in the cache has its own content properties, and the content is classified into some categories divided by the...
Cloud endows application with the ability of controlling runtime environment dynamically. Comparing with traditional one, Cloud APPlication (CAPP) could be more dynamic and autonomic. However, enabling CAPP to handle problems such as performance optimization or resources utility efficiency improvement in complex cloud environment with existing technologies is difficult and problematic. To address...
Consolidation through live VM migrations is a promising approach to improve server utilization. However, prior consolidation works have focused mostly on the performance impact of migration and neglected the associated energy overhead. Our research finds that energy impact of migration can offset over 12 % of the energy saved through energy-conscious workload packing. To address this limitation of...
Trusted transaction is becoming more and more important as malicious user or agent inside the network may compromise the upcoming transaction. Trusted Computing mutual remote attestation mechanism is a relative new approach to overcome this problem. But limited computation capability of TPM device on the sever side is an obvious bottleneck of scalable performance. by introducing a novel high efficient...
Academic organizations that provide students with the facilities for experimenting and learning basic and advanced concepts in networking rely on computer networking laboratories. These facilities can be implemented in many ways with varying degrees of cost, management complexity and capabilities. The benefits of these facilities can be extended by enabling remote access to them for distance education...
Cloud computing is a massively central advancement in the technique that businesses and users devour and work on computing. It's a elementary modify to an prepared model in which applications don't subsist out their lives on a specific section of hardware and in which possessions are more supplely deployed than was the historical standard. It's a primary shift to expansion and utilization model that...
The stated objective of the first workshop on Collaboration and Cloud Computing" in WETICE 2009 was "to analyze current trends in Cloud Computing and identify long-term research themes and facilitate collaboration in future research in the field that will ultimately enable global advancements in the field that are not dictated or driven by the prototypical short term profit driven motives...
GIS Crime Analysis System is used for Police, it can provide crime analysis, crime investigation and Crime Tracking, and so it's very important to ensure the safety of information and Authentication the user's identification. This paper presents architecture of GIS Crime Analysis System based on Trusted Network Connect (TNC), the system adopts the TNC Architecture, carry out identification and Integrity...
Even though BitTorrent-like file sharing is successful for P2P (peer-to-peer) content-sharing over Internet, it suffers from the content unavailability problem when the contents are not popular (i.e., the absence of seed). This content unavailability can be mitigated by using multi-swarm cooperation and/or by bundling popular/unpopular contents. In this paper, by employing user-driven virtualized...
As the IEEE 1516 standard for distribution simulation, High Level Architecture (HLA) framework does not solve the issues of scalability, dynamic load-balance and fault tolerance. HLA does not support federation migration, which would balance the system workload on heterogeneous distributed resources and consequently improve simulation's performance either. In this paper, a Grid based Advanced Distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.