Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
One Dimensional (1D) Double Weight (DW) code families are one of the coding schemes reported for Spectral Amplitude Coding — Optical Code Division Multiple Access systems. Modified Double Weight code and Enhanced Double Weight code are two algorithms which increase the scope of DW code for even and odd weights respectively. By using above mentioned codes, two Dimensional (2D) codes are generated....
Support vector data description (SVDD) is a popular technique for detecting anomalies. The SVDD classifier partitions the whole space into an inlier region, which consists of the region near the training data, and an outlier region, which consists of points away from the training data. The computation of the SVDD classifier requires a kernel function, and the Gaussian kernel is a common choice for...
This paper compares congestion controls of Multi-Path TCP (MPTCP) from a view point of Quality of Experience for Web services (Web-QoE) under heterogeneous environment; it assesses Web-QoE by experiments with subjects. The authors treat the four controls (LIA, OLIA, BALIA, WVEGAS) and evaluate Web-QoE by using Web usability. In addition to QoE, they also measure QoS and fairness. Their experiments...
As well as DSRC, LTE-based solutions have been discussed for Crash Warning Application (CWA), which is one of safety applications with Vehicle-to-Everything (V2X). This paper investigates two methods of LTE-based V2X, — Uu-based LTE-V2X which uses infrastructure and PC5-based LTE-V2X which uses D2D communication. We summarize pros and cons of these two methods for CWA, then, show quantitative performance...
Penetration of multimedia communications with mobile Wi-Fi and tethering requires wireless LANs (WLANs) to guarantee a specific bandwidth in densely deployed WLANs. IEEE802.11e (HCCA) with 802.11aa could use inefficiently radio frequency as well as fail to provide each WLAN with enough CFP period in which sending opportunity of a terminal is guaranteed. To guarantee a specific bandwidth even in densely...
Sound Field Synthesis techniques, such as Wave Field Synthesis aim at a physically accurate reproduction of a desired sound field inside an extended listening area. This area is surrounded by loudspeakers individually driven by their respective driving signals. Due to practical limitations, artefacts impair the synthesis accuracy resulting in a perceivable change in timbre compared to the desired...
In this study, an efficient device-to-device communication-assisted transmission mechanism that improves proximity-based emergency services by prioritizing elderly adults is proposed. The proposed method allows substantially enhanced service quality to be provided to users experiencing life-threatening situations, while ensuring that service quality is maintained for users facing less dire situations...
Docker has been widely adopted in enterprise-level container environment. As an important part of Docker-based container ecosystem, Docker Registry provides the service of storing, distributing and managing Docker images, which is crucial to run Docker containers. In large-scale container platforms, deploying applications is prone to overburdening Docker Registry with flooding network traffic, and...
Recently, interest in contents utilizing 360 and Virtual Reality images is increasing. These images are generally transformed into Equirectangular projection and transmitted in a 2:1 ratio rectangular shape. However, this method causes distortion of the upper and lower parts of the 360 images which is widely spread. Furthermore, since the spread 360 images requires higher data rate, it is difficult...
Mobile edge cloud has been increasingly concerned by researchers due to its closer distance to mobile users than the traditional cloud on Internet. Offloading computations from mobile devices to the nearby edge cloud is an effective technique to accelerate the applications and/or save energy on the mobile devices. However, the mobile edge cloud usually has limited computation resources and constrained...
Although the Z-domain precoding method for blind separation of spatially correlated sources is proved reliable in theory, it has disadvantages in its implementation since it requires knowledge of precoder zeros at the receiver beforehand. A new method is proposed in this article to find these precoder zeros and estimate the separation vectors of the coded signals at the same time by exploiting the...
ORAM scheme is becoming a study hotspot to access data securely, whether ORAM is based on layer or tree structure, client cache always exists in different ORAM. Some smart devices for example, ceil phone may be as a user with small capacity associated with cloud storage. The optimal client cache should be limited to small constant size or a strict small upper bound. The paper designs a novel client...
Deploying composite applications to Fog nodes in a QoS- and context-aware manner is challenging due to the heterogeneity, scale and dynamicity of Fog infrastructures.
To reduce the average file delivery time under limited backhaul bandwidth, a fractional dynamic caching scheme, that coordinates the utilization of the backhaul and the cache storage, is proposed in this paper. In our scheme, only parts of the files are pre-fetched and stored in the static storage segment of small base stations (SBSs), while the remaining parts of the files will be fetched into the...
Recognizing the central role of Lagrange multipliers in network resource allocation, a novel learn-and-adapt stochastic dual gradient (LA-SDG) method is developed in this paper to learn the empirical optimal Lagrange multiplier from historical data, and adapt to the upcoming resource allocation strategy. Remarkably, it only requires one more sample (gradient) evaluation than the celebrated stochastic...
Data-parallel jobs transfer massive amounts of data between a series of successive stages. The coflow abstraction is proposed to represent a group of parallel flows between two stages and efficiently improves stage-level performance. However, state-of-the-art coflow scheduling techniques are agnostic to the jobs' inter-coflow semantics and thus are suboptimal in reducing the average job completion...
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage and control network traffic. However, SDN will experience long packet delay and high packet loss rate when the communication link between two planes is jammed by SDN-aimed DoS attacks with massive table-miss packets. In this paper, we propose FloodDefender, an...
Datacenter networks are often structured as multi-rooted trees to provide high bisection bandwidth at low cost. To utilize the available bisection bandwidth, an efficient load balancing algorithm is required. Packet Spraying is known to perform well in symmetric topologies as it provides per-packet load balancing over equal cost paths. However, packet spraying performs poorly in asymmetric topologies...
Attacker VMs try to co-reside with victim VMs on the same physical infrastructure as a precursor to launching attacks that target information leakage. VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, we first undertake an experimental study on Amazon EC2 to obtain an in-depth understanding of the side-channels an attacker can use to ascertain co-residency...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.