Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In multiview video applications, view synthesis is a computationally intensive task that needs to be done correctly and efficiently in order to deliver a seamless user experience. In order to provide fast and efficient view synthesis, in this paper, we present a cloud-based implementation that will be especially beneficial to mobile users whose devices may not be powerful enough for high quality view...
In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information...
In recent years, 3D printing technology is rising at home and abroad. More and more people are using this technology in all walks of life. However, the application development and service provision of 3D printing is still far from enough. With the development of the Internet of things, cloud computing and other emerging technologies, as well as computer and network communications technology continue...
Today home automation is quite common in developed nations. Remote access of appliances and devices in a home is provided via the internet. The challenge lies in making the system smart and deployable in a scalable manner across an entire city in a developing nation. This paper proposes a framework for making home automation achievable across a smart city in a scalable and data efficient manner. We...
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
Residential networks are home to increasingly diverse devices, including embedded devices that are part of the Internet of Things phenomenon, leading to new management and security challenges. However, current residential solutions that rely on customer premises equipment (CPE), which often remains deployed in homes for years without updates or maintenance, are not evolving to keep up with these emerging...
With increasing evidence on the breadth and potency of side-channel attacks based on resource sharing, virtual machine (VM) placement in infrastructure cloud services, such as Amazon EC2, has become an important security problem. In this paper, we present a new approach to this problem by letting users specify their own trust profiles, and then incorporating such information into VM placement decisions...
Mobile cloud computing paradigm enables cloud servers to extend the limited hardware resources of mobile devices improving availability and reliability of the services provided. Consequently, private, financial, business and critical data pass through wireless access media exposed to malicious attacks. Mobile cloud infrastructure requires new security mechanisms, at the same time as offloading operations...
The elastic provisioning of Virtual Infrastructures (VIs) enables a dynamic management of cloud resources (computing and communication) in order to meet the hosted application's requirements. Thus, to perform elasticity requests, providers usually rely on reallocation mechanisms and policies. The concerns regarding the environment and the operational costs indicate energy consumption of the data centers...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
The emergence of 5G wireless and IoT (Internet of Things) technologies, as well as the continuous evolution of cloud computing is driving the need for easy and on-demand creation of end-to-end network services. We have developed an integrated system called the end-to-end network service orchestrator, which realizes seamless service orchestration across multiple on-premises and cloud infrastructures...
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
Virtual data centers (VDCs) are among competitive advantages offered to businesses by cloud computing. Through VDCs, organizations can use a pool of on-demand virtual infrastructures in the form of a data center without paying the up-front costs of an actual data center. With the advent of software-defined networks (SDNs), it is now possible to provide the VDC's tenants with overlay SDNs to cover...
Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers...
Mobile devices have been helping to empower underserved communities around the world. From bringing information on health and farming to substituting expensive devices, cellular phones and apps have proved to be powerful tools in poverty alleviation and disaster relief. The Mobile Lab at Santa Clara University focuses on developing mobile solutions for social benefit and, in this paper, we describe...
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
Economic Denial of Sustainability (EDoS) attacks have been threatening cloud consumers' financial viability due to the “pay-as-you-go” cloud resource charging scheme. EDoS attackers can take advantage of this pricing scheme to fraudulently consume the billable cloud resources from the cloud consumers and thus, drive up the cloud consumers' financial cost and eventually disrupt their economic sustainability...
Mobile medical applications are increasingly being used by patients and consumers. However, due to their complexity, these applications are normally only accessible to smartphone users. People using low-end cellphones cannot benefit from this new technology. The goal of this paper is to expand health service platform to lower-end cellphones, so that people in underdeveloped regions can benefit from...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.