The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid increase in data and its complexity of configuration and deployment bring a new challenge to the research community. In this scenario, automatic Hadoop cluster deployment and management tool provide a new horizon which plays a vital role in resource and packet management in distributed environment. This paper describes a low-cost Automatic Hadoop Cluster Deployment and Management tool...
Set queries are fundamental operations in computer networks. This paper addresses the fundamental problem of designing a probabilistic data structure that can quickly process set queries using a small amount of memory. We propose a shifting bloom filter (ShBF) framework for representing and querying sets. We demonstrate the effectiveness of ShBF using three types of popular set queries: membership,...
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
Master-Master replication enables us to replicate data through distributed writes and distributed reads. This is an advantage over Master-Slave replication. There are two problems we need to address in this paper with regards to master-master replication. The first is its nature of being loosely consistent and the second one is updates needs to be first agreed up on to be committed. In this paper,...
In the paper we examine ν-similarity of birth-death processes in two-dimensional case. A necessary condition for two processes being similar by obtaining relations between their birth and death rates is derived. We analyze situation for ν-similar birth-death processes, what is a generalization of the previous results for similar birth-and-death processes. In our case birth and death rates of two ν-similar...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which...
Cloud computing has been an emerging technology paradigm that provides on-demand resource for systems over the Internet. Resource reconfiguration is an important issue in the life cycle of the system in cloud. This paper proposes a cross-cloud system reconfiguration module, which focused on being an assistance of reconfiguration task toward helping the system managers to reconfigure their cloud system...
Economic denial of sustainability (EDoS) appeared to be a new menace of cloud computing. This pristine attack is a breed of DoS or DDoS attack that targets the vulnerabilities of cloud consumers utility pricing model. EDoS attackers steadily send illegitimate traffic to gradually consume cloud resources such as virtual machines, virtual network devices, virtual security devices and databases so that...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
Dedicated wide-area network connections are increasingly employed in high-performance computing and big data scenarios. One might expect the performance and dynamics of data transfers over such connections to be easy to analyze due to the lack of competing traffic. However, non-linear transport dynamics and end-system complexities (e.g., multi-core hosts and distributed filesystems) can in fact make...
Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. The current solutions can only support part of these goals. In this paper, we propose a novel encrypted data searching scheme that can support multiples keywords fuzzy search with high efficiency. To support fuzzy search, a new keyword-hash mapping function is designed to transform...
Cloud user intends to encrypt data before outsourcing sensitive data to the cloud which prevents data searching utility. Hence the necessity for searching through encrypted data appears. But in practice, it is very common for the user to misspell keywords while typing the words. Thus, fuzzy keyword search on encrypted data becomes an essential feature in searchable encryption. However, existing schemes...
Inter-domain link congestion can be caused by either under-provision or peer disputes. TSLP and M-Lab are two representative network-tomographic methods to detect congestion on inter-domain links. In this work, we propose a performancecost framework to evaluate and compare the two methods via a simulator built atop NS-3. Via detailed simulations, we obtained some insights on the two approaches and...
This document presents a detailed description of the development and results obtained during the Proof of Concept about the Think! EHR platform, which is marketed by the Marand d.o.o (Marand) company.
Syslogs on switches are a rich source of information for both post-mortem diagnosis and proactive prediction of switch failures in a datacenter network. However, such information can be effectively extracted only through proper processing of syslogs, e.g., using suitable machine learning techniques. A common approach to syslog processing is to extract (i.e., build) templates from historical syslog...
Elasticity actions in NoSQL data stores move large amounts of data over the network to take advantage of new resources. Here we propose incremental elasticity, a new mechanism for scheduling data transfers to a joining server, leading to smoother elasticity actions with a reduced performance impact.
This paper considers the efficacy of using active network technology to offload computation from small mobile devices into network node computing centers. The performance of six algorithms for use in this process is compared and conclusions are drawn.
The following is a very common question in numerous theoretical and application-related domains: given a graph G, does it satisfy some given property? For example, is G connected? Is its diameter smaller than a given threshold? Is its average degree larger than a certain threshold? Traditionally, algorithms to quickly answer such questions were developed for static and centralized graphs (i.e. G is...
RNNLM (Recurrent Neural Network Language Model) can save the historical information of the training dataset by the last hidden layer and can also as input for training. It has become an interesting topic in the field of Natural Language Processing research. However, the immense training time overhead is a big problem. The large output layer, hidden layer, last hidden layer and the connections among...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.