The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large-scale parallel file systems are of prime importance today. However, despite of the importance, their failure-recovery capability is much less studied compared with local storage systems. Recent studies on local storage systems have exposed various vulnerabilities that could lead to data loss under failure events, which raise the concern for parallel file systems built on top of them.This paper...
This paper presents a prototype system, designed and developed exploiting the Internet of Things paradigm and its related technologies with altruistic purposes. In fact, the system here described involves the iBeacon technology and BLE-capable smart phones, put to good use to provide an altruistic Internet of Things (IoT) platform. In particular, we implemented a mobile application, for iOS and Android...
The need to perform data analytics on exploding data volumes coupled with the rapidly changing workloads in cloud computing places great pressure on data-center servers. To improve hardware resource utilization across servers within a rack, we propose Direct Extension of On-chip Interconnects (DEOI), a high-performance and efficient architecture for remote resource access among server nodes. DEOI...
Enterprises that host services in the cloud need to protect their cloud resources using network services such as firewalls and deep packet inspection systems. While middleboxeshave typically been used to implement such network functions in traditional enterprisenetworks, their use in cloud environments by cloud tenants is problematic due to the boundary between cloud providers and cloud tenants. Insteadwe...
After Great East Japan Earthquake, we increase importance to conserve electric power consumption by using Home Energy Management System, HEMS for short. However, HEMS is insufficient approaches other than change in figure. This study develops user experience as a service for consumers and estimates the system.
The Content Delivery Network (CDN) has become an important element in the Internet, which uses applicationlayer caches to improve user experience and reduce network/server load. However, CDNs face efficiency issues due to the following two reasons: 1) they are not aware of the network status, and 2) the underlying location-centric network (IP) does not understand content. At the same time, the Information-Centric...
This paper proposes an architecture that can optimize inter-VM communication in an NFV environment through the creation of direct channels between virtual machines. Particularly, our prototype can transparently optimize the data transfer between virtual machines running DPDK applications by dynamically recognizing the existence of point-to-point connections in the traffic steering rules, reverting...
Integrated monitoring system, enabled with semi-structured datastore, is a promising solution for monitoring SaaS systems. However, according to increasing scale of SaaS systems and their long-term of service operations, the monitoring system has faced the problem in response times of log analysis and storage consumption. Our empirical observation is that the problem is primarily derived from the...
BLE (Bluetooth Low Energy) beacons are being deployed in smart cities, especially to augment the shopping experience of customers in real outlets. Thus, humans as they walk in cities pass by different beacons and the sequence of beacons form a path. In this paper, we present how those augmented paths can authenticate a user in a secure way whereby the users can prove they have passed by a path, even...
Interaction and visualization are two significant methods for both business people and scientists to find “gold nuggets” buried in raw data. These two methods can simplify complex theories and make it easier for people from different research areas to cooperate. Many prevalent web-based data interaction and visualization tools and libraries are not as effective as before because of big data. Most...
Detecting plagiarism between two papers located on different institutions cannot be done as long as there are institutions refusing to open their collection for public fearing them being plagiarized. This research developed a prototype of a cross-institutional federated document search using API-based hybrid peer-to-peer network. This approach enables searching for documents without institutions opening...
Maintaining situational awareness in dynamic and complex systems, such as information and communications networks, is essential to protecting assets and increasing mission assurance. Network monitoring tools generate tremendous amounts of data, overwhelming network defenders with alerts.
I propose new authentication protocols using/unmodifying the structures of packet and data exchange on CHAP (Challenge Handshake Authentication Protocol). CHAP is one of the most popular authentication protocols because of very simple scheme and no vulnerability of its structures of packet and data exchange. Therefore, this protocol is used a lot of services over the Internet as de facto standard...
NanoStreams explores the design, implementation, and system software stack of micro-servers aimed at processing data in-situ and in real time. These micro-servers can serve the emerging Edge computing ecosystem, namely the provisioning of advanced computational, storage, and networking capability near data sources to achieve both low latency event processing and high throughput analytical processing,...
A health monitoring system is proposed with the aim to provide health monitoring with minimal location and time constraint for the elderly. The challenges in continuously monitoring health faced by conventional medical practice is expected to be solved using this vest-based system, as it is capable to obtain health parameter from its wearer and channel it to a remote web and database server anytime...
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow,...
This paper discusses a new online tool for online gamers to share networking performance results and to produce aggregate networking performance reports generated from the data reported by all users. It is necessary to improve the quality of service and make online games faster. This will help improve latency sensitive game data collection. It will help to improve gaming performance through the global...
Modern medical data information systems must collect and present data to authorized users. Distributed longterm medical data storage requires an effective security model for delegating data access. An effective delegation model must keep data encrypted at all times and avoid the need to share decryption keys. We present a secure information architecture for implementing such a model with end-to-end...
At the present, paper-based libraries are a big challenge in Afghan educational organizations. This study proposes a high-tech library management system namely “e-Ketabtoon”. It aims to improve the overall working of a library, digitalize and preserve Afghan valuable knowledge and cultural heritage for the next generation, and promote digital literacy among Afghan masses. The system architecture splits...
Uploading of huge files to cloud servers through mobile communication has been becoming more popular in recent years. However, current uploading throughput is frequently limited due to bottlenecks in server processing ability and/or narrow bandwidth sections of networks. For this study, we aimed to improve the user experience of uploading in future wireless access environments. We propose a novel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.