The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting polling behaviour in a computer network has two important applications. First, the polling can be indicative of malware beaconing, where an undetected software virus sends regular communications to a controller. Second, the cause of the polling may not be malicious, since it may correspond to regular automated update requests permitted by the client, to build models of normal host behaviour...
The universities educational management System is a typical information management system, including the establishment and maintenance of backstage database and the development of frontstage application program. For the former, it requires a database of data consistency and integrity to build strong, full and good, and for the latter procedure, it requires full-functioned and easy to use and so on...
Recent years have seen a rapid growth in the number of virtual machines and virtual machine images that are managed to support infrastructure as a service (IaaS). For example, Amazon Elastic Compute Cloud (EC2) has 6,521 public virtual machine images. This creates several challenges in management of image files in a cloud computing environment. In particular, a large amount of duplicate data that...
Communication with smart objects currently only works in isolated, sometimes even proprietary islands. This lack of interoperability limits the value of smart objects connected to the Internet of Things (IoT). We propose to use the Extensible Messaging and Presence Protocol (XMPP) to connect IoT islands. XMPP is inherently federated, secure, globally scalable and designed for collaboration. We use...
Multi-Key Searchable Encryption (MKSE) is a new application scenario of searchable encryption, in which any user can search over all encrypted documents stored in untrusted server by submitting only one trapdoor. Firstly, we describe a general model of multi-key searchable encryption and introduce its system model and attack model. Secondly, we define its formulized model and the corresponding security...
While Web browsers are fundamental components in the Internet nowadays, the widespread availability of several techniques that can be used to detect the individual browser connected to a server raises privacy issues that need to be adequately addressed. Browser fingerprinting uses a combination of attributes, whose values are silently obtained during normal navigation, to identify, with high likelihood,...
Skyline queries are useful in decision making applications. Skyline queries in highly mobile distributed environments have attracted many attentions recently due to the development of mobile internet device. The properties of distributed computing make skyline queries more complicated especially in any subspace. Conventional skyline algorithms do not support subspace skyline queries in distributed...
This paper proposes a hybrid infrastructure construction of multi-functions digital public address (PA) system, which consists of wired and wireless communications architecture. Wireless communications ability can be achieved by dedicated USB dongles such as WiFi, WiMax, 3G, and LTE. Wireless communication can be used for disaster areas or some regions where is difficult to install wired-based PA...
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data confidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these...
From global Internet information, IPv6 traffic grows slowly. A large portion of service providers are still using IPv4 even IPv6 co-exists with IPv4 for long time. However, IPv6 traffic are gradually growing especially most of network backbone sides. This paper proposes an enhancement mechanism of IPv4-in-IPv6 which supports IPv6 natively and provides IPv4 connectivity by using IPv4-in-IPv6 tunneling,...
The size of data used by enterprises, academia and sciences in recently years has been growing at an exponential rate day by day. Simultaneously, the requirement to process and analyze the large quality of data is also increased. In the previous method, a single computer or a small number of computers cannot process and monitor these large amounts of data, but cloud system can handle the requirement...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the PDP schemes...
Transaction is a common technique to ensure system consistency but incurs high overhead. Recent flash memory techniques enable efficient embedded transaction support inside solid state drives (SSDs). In this paper, we propose a new embedded transaction mechanism, TxCache, for SSDs with non-volatile disk cache. TxCache revises cache management of disk cache to support transactions using two techniques...
Network speeds, wireless communications and rapid graphic processors now allow the collection and rendering of information in ways previously not possible. Together with this, convergence of many sources of disparate events, including tracking over geospatial domains and interaction with sensors, allow for processing of real time data which can be communicated between both real and virtual worlds...
Nowadays, due to the rapid growing popularity of Internet, the global routing system suffers from great scalability problem. Many solutions are proposed to solve the problem, including FIB aggregation, core/edge separation solutions, et al. The limitation of these existing solutions is that they all make the assumption that all addresses in the Internet must be globally visible and these routing information...
In recent years, The Internet of Things(IOT) is one of the hottest research topics. It was originally defined as connected all the things through the sensing devices to the Internet. In addition, Service-Oriented methodology has gradually drawn people's attention. Therefore, integrated The IOT with Service-Oriented methodology is very important. But now IOT service composition is mostly synchronous...
Automation using robots is applied widely in industry and recently, it is used to more and more complicated works. In order to apply it to complicated works, multi-robot operation is necessary and to multi-robot operation, coordination of robot movements is inevitable. This paper proposes an algorithm to estimate arriving time for a robot to soccer ball in RoboCup Soccer Simulation 2D League. In the...
The SQL injection attack is one of the major threats to web applications. Through malicious inputs, attackers can cause data leakage and damage, and even remote code execution on the victim servers. A common solution is to use input sanitizers to filter out inputs that can result in SQL injection attacks. In this paper, we propose a novel solution, SQLR, to validate SQL sanitizers by systematically...
Based on event dispatch strategy, a simple simulation method for queue system was proposed, and made some simulation research by using MATLAB software. First, adoption of M/M/1 queuing service system as example, the simulation results are consistent with the theoretical calculation, which confirm the correctness of simulation project. And then, M/M/n queuing service system with same service rules...
Nowadays, with the spread of database systems and network systems in every field, a demand for sharing existent database systems grows. On the other hand, it is difficult to stop existent databases to reorganize into one large database system because database systems usually are mission-critical system. Thus, some kind of distributed database is necessary to solve this problem. The multi-database...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.