The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data outsourcing has become quite popular in recent years. While the rapid development of cloud storage service, it brings about many new security challenges. One of the biggest concerns with cloud data storage is that of data integrity at untrusted cloud servers. For example, when individual users store important data files in cloud servers, the data files may be damaged or corrupted because of cloud...
Lots of studies have shown that memory hardware error rates are orders of magnitude higher than previously reported. In order to fight with these memory hardware errors, many memory testing tools have been developed, especially software level online memory testers, which means these memory testers implemented in software can work with the OS (operating system) at the same time. However, validation...
Recent advances in computer technology and calculation theory have enabled us to simulate more complex and various phenomena on computer than before. Computer based calculation is used in wide fields from weather prediction to protein structure analysis. Precise simulations by adopting excellent models and appropriate algorithms have given us numerous novel information and understandings. Here, we...
We present FDTD (Finite Difference Time Domain) method use for cavity microwave spherical resonator with some features that allows one to speed up the calculation and use computer memory more effective. Results of such simulation are in good agreement with theoretical prediction for the spherical resonator eigen-frequency spectrum.
With the rapid development of computer technology, it has been widely used in many fields such as politics, economy, military affairs, culture, and education and so on. The society has entered into the information age with the development of computer and network technologies, however, the security problem of information has become the fundamental mater. As we all know, the basic principle of Von Neumann...
Today's world is an era of information technology in which cloud computing arises as promising and developing technology. In cloud computing environment the resources are provisioned on the basis of demand, as and when required. In cloud computing a large number of cloud users can request a number of cloud services at the same time. So there must be an efficient way in which all the resources are...
We demonstrate an approach to build a selector into ReRAM (memristors) using engineered materials. In this approach, a segment(s) of “nonlinear material” is self-assembled into the conduction channel (s) (filament) of a memristor. The nonlinear material exhibits a highly nonlinear current-voltage characteristic, which gives rise to a nonlinear i-v characteristic of the memristor in the ON state.
Processing of parallel data streams requires permutation units for many algorithms where the streams are not independent. Such algorithms include transforms, multi-rate signal processing, and Viterbi decoding. The absolute order of data elements from the permutation is not important, only that data elements are located correctly for the next processing step. This paper describes a method to find permutations...
The paper presents method for assessing immunity electronic equipment for high power electromagnetic pulses carried out by employees of the LAB-KEM MUT. Assessment immunity of electronic equipment will help you understand the susceptibility threshold of these devices on the high power electromagnetic pulses environment (called High Power Electromagnetic - HPEM). This assessment focuses on determining...
With the development of the network data and use the change of demand, extension from cloud computing cloud storage become the research focus and hot spot. This paper mainly introduces the characteristics of cloud storage technology, and analyze the hierarchical structure of the cloud storage service, and then analyzing the data storage structure of the cloud storage service, emphasis on reliability...
To support efficient business data analytics, having a good computer data structure to store and access business data is a top priority. KStore is a data structure proposed by Jane Campbell Mazzagatti based on the Phaneron of C. S. Peirce. KStore is designed and developed as a storage engine to support business intelligence data storage, queries and analysis. The generation and data access of KStore...
Processing technology has eclipsed memory technology for the past six decades, but processor-centric architectures are reaching their terminal efficiency. We can reboot computing on the basis of abundant memory enabled by emerging device physics, which will make computation, communication, and memory more efficient. This approach also provides a unique opportunity to address novel security threats...
With the rapid development of the cloud computing and big data, many data center network are growing more large scale, and the number of servers is increasing at an exponential rate. In this paper, VCG (Vickrey-Clarke-Groves) mechanism was introduced into replica placement. Mapping from replica placement model to VCG mechanism was established and suitable payment function was designed. Data storage...
There is an inherent message or story in handmade objects, which is defined by the maker's interaction. Its narrative is due in part to the physical and emotional relationship of the craftsperson, the degree of imperfection from the human touch, and it is fused with the significance placed on the object by the owner. This layering of stories and associated memories continues throughout the life of...
Magnetic tape storage has been used for recording audio, video, instrumentation, and computer data. The medium can record a large amount of data on winding tape and recorded data are reliable and stable. However, the performance of the other storage media, such as optical disc, magnetic disk, and integrated circuit memory, has progressed remarkably, so the advantage of tape storage has decreased....
Presents an historical paper on the research and work conducted by Jan A. Rajchman (1911–1989), a pioneer of electronic and electromagnetic computer memory.
Main memory reliability is an important concern in today's computer systems. Error Correction Codes (ECCs) improve memory reliability but have high area and energy overheads. Furthermore, ECCs cannot be easily applied to memories with wide chips such as stacked memories.
There is a need of noteworthy scaling down in the information approached may be saved in the most recent decade. Delicate and advanced version hard paper duplicate which helps in two ways that they increased the effectiveness from claiming data management but also improved the distribution of entrance of information. On engineered DNA, it may be a chance to view the late improvement on the possibility...
The processing efficiency of data-intensive application on Hadoop with the general-purpose distributed file system such as Lustre, as the backend file system, is not clear. This paper focuses on the similarities and differences between Lustre and HDFS (Hadoop Distributed File System). We propose a Hadoop-Lustre platform and evaluate the performance differences of Lustre and HDFS by using a set of...
The existing research of distributed provenance storage is at the preliminary stage. Most of the researchers are endeavor to improve the query efficiency of storage solution, whereas, very few people pay attention to the matching problem of provenance and data and the waste of storage space. Two aspects on the problem of provenance storage were proposed in this paper. First one is the relationship...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.