The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth in market demands for high-quality, state-of-the-art, and reliable communication services increases the amount of session-control signaling, which is mainly based on the Session Initiation Protocol (SIP). Many research activities dealing with the Quality of Service (QoS) have been focused on media-related service components, whereas signaling-related service components have received...
Transparent computing is an implementation of ubiquitous computing that is aimed at providing active services for users. In transparent computing, the execution (computation) of computer instructions and data is temporally and spatially separated from their storage. Cloud computing solves the issue of data cloudlization, while transparent computing solves the one of software cloudlization. This paper...
Quality of Service is an important thing in maintaining the performance of the service to the customer. Not only for marketing purposes, the quality of services can also bridge the gap between the promise given by the service provider and what the customers get. This study aims to get the quality of service for internet data usage of several mobile operators in the city Samarinda. The study was conducted...
This paper presents the introduction to cloud computing which elevates its level by presenting an added level of risk because of essential services which are generally outsourced to a third party threats and risks which affect the data security and privacy on an advanced scale. Cloud-based services and service providers are being evolved which has resulted in a new business pattern based on cloud...
Traditional workflow design tools which only provide the choreography of simple flow chart and do not provide a graphical configuration for access to a service, are unable to meet user demand for services. The article expands the Activiti Designer open source framework. It maintains communication through the bottom of the enterprise service bus, provides the registration services (OSGI, WebService,...
Byzantine fault is the fault that can make the components behave arbitrary and may cause disastrous results. With the increasing malicious attacks and software errors, Byzantine fault tolerance has begun to draw more attention it deserves. Previous Byzantine fault tolerant algorithms have strong assumption that all the replicas is synchronous and do not support replicated calling services, which make...
The popularity and usage of mobile devices have increased and therefore performance demands changed. An important aspect is represented by the whole system stability which has a big impact on general user experience. This paper proposes a solution for improving the implementation process and stability of operating systems for mobile devices. It consists of a system service which collects error messages...
The study of map symbols is one of the basic problems of cartography. Map symbols and map symbol library is also one of the core issues of geographic information systems and mapping software. The varieties of GIS systems and mapping software have unusual map symbol definitions, different depicting ways, and different application purposes and approaches. It is a serious problem to share map symbol...
Cloud datacenters, providing Infrastructure as a Service (IaaS), need to lively orchestrate numerous resource elements with diverse requirements of service provision, which most existing approaches are difficult to meet elastically. This paper presents LiveCloud, a management framework for resources in cloud datacenters. It addresses multiple management issues by employing different views of datacenter...
In order to process service failure quickly, a new failure recovery for service supporting context persistence named G-FRF is given, which is based on the existing failure recovery frameworks for Web Services. Failure recovery requirements of manager job services in grid computing are taken into account in the framework. during normal execution, service state is monitored and context is saved. When...
In today's competitive job market, businesses will hire people with the relevant work experience, which creates quite a challenge for graduating students. Thus, graduating students also need experience to go with their degrees in order to be competitive in current job market. To better prepare our students, the Computer Information Technology program developed an experiential learning program called...
IMS (IP Multimedia Subsystem) network has high demands from perspective of multimedia, flexible and interactive communications. Fulfillment of those demands, with appropriate levels of quality, is not a simple task. As usage of services has great progress lately, there is high demand for their interaction management. Authors suggest way of Next Generation Networks application level organization and...
Distance education is a field of education that focuses on teaching methods and technology with the aim of delivering teaching. At present, distance education has been developing rapidly in China, however, there are some common problems in distance education informatization, including sharing difficulty, weak system expansion capacity, lack of real interaction, hard to real time communication, etc...
File replication in distributed environment has been discussed by many researchers, but the issues like transparency and their impact on the overall system performance, are rarely focused, when deployed in the cloud environment. Distributed computing started with the cluster followed by the grid and is now in the era of cloud computing, where most of the services are accessed, by few clicks. In cloud,...
With the increasing complexity of IT outsourcing environments thousands of servers and their configurations are increasingly managed by globally distributed teams. This requires a flexible identity access management process in place to efficiently provision necessary access rights for a given system, only if users need it, when they need it and for only as long as they need it. In this paper we present...
Virtualization can provide significant benefits in data centers, such as dynamic resource configuration, live virtual machine migration. Services are deployed in virtual machines (VMs) and resource utilization can be greatly improved. In this paper, we present VScheduler, a system that dynamically adjusts processor resource configuration of virtual machines, including the amount of virtual resource...
In this paper, taking GIS desktop software as a starting point, the overall framework of the GIS smart client based on SOA (Service-oriented architecture) is propounded. The GIS smart client is loosely coupled, extensible, easy to realize modularization and easy for maintenance. Existing as a component container, on the premise of with function to manage geo-spatial data to a certain extent, the GIS...
With the rapid development of science and technology, information has become an important part of daily life. For enterprises, it plays an important role that make use of information effectively. From the perspective of information storage, combined with a popular topic of cloud computing, this paper focuses onthe importance of cloud storage. The theory and framework of cloud storage which is distinguished...
The current implementations of cloud environment do not have suitable mechanism through which services can be managed to make use of cloud resources. The services in these environments can passively serve users' request only. If a service receives more requests than it can handle in a certain time period, it is subject to malfunctioning. This paper proposes a new approach to service replications that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.