Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Current network switches cannot be programmed and flexibly controlled. Then, developers of a data center application system, which is composed of software and computers connected with a network, are not able to optimize behavior of network switches on which the application is running. On the other hand, Deeply Programmable Network (DPN) switches can completely analyze packet payloads and be profoundly...
To simulate a realistic game server environment, we utilized open source software libraries to create automated players (bots) for the globally renowned online game: Minecraft. The fairly simple design of the Minecraft server as well as its massive development and support community facilitates considerable research and analysis prospects. As such, the goal of our investigation was to emulate and then...
This poster looks at adapting Intrusion Detection Systems solutions to multiple SDN based domains. We present a preliminary evaluation of the performance in terms of latency cost while offering IDS solutions as a service (IDSaaS) in SDN. The goal is to eventually be able to determine what resources are needed in order for the IDSaaS in SDN to perform in a manner that is almost comparable to running...
This paper aims to design a Hadoop system and evaluates the performance of a task allocation scheme. The task allocation scheme splits each job into tasks using an appropriate splitting ratio, and assigns tasks to slave servers based on server processing performance and network resource availability. We experimentally evaluate the performance of the scale out of the task allocation scheme with five...
The SSD is adopted to improve the IO performanceof the storage system in the data center, the throughput allocation for clients is a challenging problem. We need to find a throughput allocation method, which can determine the throughput allocations of clients on each server, while both providing the fair allocations for clients and maximizing the utilization of system throughput resource in the entire...
Recent years, data transfer via www is one of the most popular application and web traffic on the Internet consumes much network resources. We have proposed a peer-to-peer cache distribution system to reduce consumption of network resources so far. Systems based on our proposal enable peers to receive a part of the data while the peers are downloading data from a server. In this paper, we report further...
The growing demand for the monitoring of patients, and the potential promise of cloud computing has allowed considering a number of cloud-based systems and services for health care. The cloud computing, in combination with the popularity of smart handheld devices has inspired healthcare professionals to remotely monitor patients' health while the patient is at home. To this end, this paper proposes...
Cloud computing allows users to migrate their calculations to distributed environment which will utilize more number of resources to complete execution quickly. Virtualization means multiple virtual machines (VM) on single physical machine.During process of migration, VM move one physical machine to another. In offline migration, process is stopped till the virtual machine can continue on target machine,...
Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore how to provide cloud users with more controls so that they could ensure confidentiality of their data without using extensive public key encryption in cloud networking or sharing...
A storage system constructed by a wide-area distributed file system of open source software has been requested to ensure the certain existence of the non-falsification data by a trusted third party. We developed an integrity verification application using timestamp mechanism for Gfarm which is a wide-area distributed file system of open source software made in Japan. However, the application remained...
In this paper we propose how to design a modular, event-driven continuous integration server. Unlike many servers in use today, the proposed solution is designed to integrate seamlessly with other development tools and services. It is based on a special purpose communication platform that can be used to govern the development process itself.
Accurate maps are increasingly important with the growth of smart phones and the development of location-based services. Several crowdsourcing based map generation protocols have been proposed that rely on volunteers to provide their traces. Being creative, however, those methods pose a significant threat to user privacy as the traces can easily imply user behavior patterns. On the flip side, crowdsourcing-based...
Given a set of files that show a certain degree of similarity, we consider a novel problem of deduplicating them (eliminating redundant chunks) across a set of distributed servers in a manner that is: (i) space-efficient: the total space needed to deduplicate and store the files is minimized and, (ii) access-efficient: each file can be accessed by communicating with a bounded number of servers, thereby...
Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the download...
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the convenience provided by LBS, users may lose privacy since the untrusted LBS server has all the information about users in LBS and it may track them in various ways or release their personal data to third parties. To address the privacy issue, we propose a Dummy-Location Selection (DLS) algorithm to achieve k-anonymity...
Recent years have seen rapid growth in data storage, magnifying the importance of ensuring data safety by performing regular backups. However, traffic created by such backups can be a significant burden on the underlying communication network. In the present paper we address the tradeoff between frequent backups (increased safety) and reducing the network peak load. We address the problem of shifting...
Fair bandwidth allocation in datacenter networks has been a focus of research recently, yet this has not received adequate attention in the context of private cloud, where link bandwidth is often shared among applications running data parallel frameworks, such as MapReduce. In this paper, we introduce a rigorous definition of performance-centric fairness, with the guiding principle that the performance...
Large scale Content Delivery Networks (CDNs) are one of the key components of today's information infrastructure. This paper proposes and analyzes a simple stochastic model for a file-server system wherein servers can work together, as a pooled resource, to meet individual user requests. In such systems basic questions include: How and where to replicate files? What is the impact of dynamic service...
Radio Frequency Identification (RFID) technology plays an important role in supply chain logistics and inventory control. In these applications, a series of scanning operations at different locations are often needed to cover the entire inventory (tags). In such continuous scanning scenario, adjacent scans inevitably read overlapping tags multiple times. Most existing methods suffer from low scanning...
Online Maintenance Assistance (OMA) is a tool for supporting Remote Maintenance. It was developed by Airbus and the University of Applied Sciences Osnabrueck, Germany. Operators performing maintenance tasks in front of an aircraft can use OMA to establish a conference to a remote expert. They can provide different camera views on of a maintenance part or location. In addition, the screen output of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.