The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose distributed media computing method for high performance and massive computing of media processing. By dividing media streams temporally and spatially, and processing them, the method reduces the elapsed time of media processing and improves the system scalability. The experiment results show the method increases the elapsed time. The performance degradation could be mitigated using high-speed...
Highly available metadata services of distributed file systems are essential to cloud applications. However, existing highly available metadata designs lack client-oriented features that treat metadata discriminately, leading to a single metadata fault domain and low availability. After investigating the workload characteristics of Hadoop, we propose Client-Oriented METadata (COMET), a novel highly...
The proliferation of Social Networking Services (SNS) has highlighted the need of providing reliable but efficient mechanism to report information from mobile users to the data center. In this paper, a mechanism to reduce periodic update of position and sensor data for activities recognition from mobile device is proposed. To improve the reporting mechanism, variance analysis from sensor data captured...
For server and network administrators, it is a challenge to keep an overview of their systems to detect potential intrusions and security risks in real-time as well as in retrospect. Most security tools leverage our inherent ability for pattern detection by visualizing different types of security data. Several studies suggest that complementing visualization with sonification (the presentation of...
The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret...
This poster presents new perspectives for open and trusted mobile applications. The Near Field Communication (NFC) radio interface is widely available for smartphones. It is usually involved in payments, access control, and transport services. We describe an open experimental platform, developed by the MOBISIM project. The prototype provides contactless payments in legacy frameworks. It comprises...
A lot of Not Only SQL (NoSQL) databases have been proposed in the era of big data. Distributed Ordered Table (DOT) is one kind of No SQL database that has attracted lots of attention. It horizontally partitions table into regions and distributes regions to region servers according to the keys. Multi-Dimensional Range Query (MDRQ) is a common operation over DOTs. Many indexing techniques have been...
Hybrid TV services offered with a technology platform called "Hybridcast" have launched in Japan. To make the services more attractive, it is expected that various service providers such as third parties will provide Hybridcast services. In this paper, we propose a broadcast metadata providing system that enables third parties to create advanced hybrid TV services on Hybridcast. Using a...
This paper reports on a small-scale experiment conducted in the Stedelijk Museum Amsterdam (SMA), showcasing the effective use of CHESS research prototype for the creation and provision of personalized interactive museum experiences and highlighting the main results reached.
Agile cost management provides simple steps or process compared to the traditional cost management. Since, most of the companies are using Agile method in their development project, agile cost management becomes more significant to look into because the way people manage a cost can be more effective and efficient. Therefore, this paper proposed the prototype development of Agile Cost Management Tool...
Home Network System (HNS) is a system which provides value-added services by orchestrating household appliances and sensors. In previous work, we have proposed Cloud HNS, which is a new type of HNS based on the concept of Cloud. In this research, we propose IRaaS (Infrared as a Service) that realizes networking control of household appliances controlled by infrared signal, as a Cloud HNS’s appliance...
Searchable encryption is a cryptographic primitive that allows a user to confidentially store items on an outside server and grants the user the capability to search for any particular item that is stored without the server or any third party observers learning anything with regards to the item that is being searched for. In 2006, Curtmola et al. strengthened the security notions for symmetric-key...
In large organizations, handling personnel authorization for access to various sites within the building has always proved to be a challenge for security departments. In this work, we develop a prototype that utilizes an identity-based identification scheme to provide access control for incoming and outgoing personnel from the building, as well as their activities within. Our prototype is built using...
The paper discusses about the multiple application prototype and a test called the ‘NfcShop Test’ carried in order to evaluate the usability of the same. The approach developed by us will allow the user to buy railway tickets, make hotel payments and pay for car parking, all by just tapping a Near Field Communication (NFC) device/Mobile on the Universal Receiver placed at point of sale (POS) terminal...
This paper presents a novel technique to integrate multiple Wifi services into a single hardware access point. This is achieved by combining service advertisement mechanism defined in the IEEE 802.11u standard and dynamic VLAN assignment used in enterprise-level networks, both of which are for authentication techniques to achieve secure and flexible access to IP-based networks. Compared to virtual...
In computer supported cooperative work (CSCW), users work together from remote locations where each of them performs specific roles. However, their roles are dynamic and they change their roles more often as compare to co-located environments. The process of changing roles is known as role transition. Role transition process basically determines who is authorized to trigger for changes, who is mandated...
Domain Name System (DNS) is the most widely used name resolution system for computers and services in the Internet. The number of domain name registrations is reaching 276 million across all top level domains (TLDs) today and the DNS query count is increasing year over year. The main reason of the high DNS query count is the increase of out-of-bailiwick domain name delegation since it (NS without...
The NSF EPSCOR funded Solar Nexus Project is a collaborative effort between scientists, engineers, educators, and technicians to increase the amount of renewable solar energy in Nevada while eliminating its adverse effects on the surrounding environment and wildlife, and minimizing water consumption. The project seeks to research multiple areas, including water usage at power plants, the effect of...
Softwares usually need to be updated to fix bugs or add new features. On the other hand, some critical softwares, such as cloud applications, need to provide service continuously, thus should be updated without downtime. Conventional Dynamic Software Updating (DSU) systems try to update programs while running, but they hardly consider the communication of the program to be updated with other programs,...
The attempts of malicious access and attacks from the Internet to the internal computers of organizations never stop today and corresponding countermeasure for each technique is required. Most organizations introduce some firewall facilities as one of the solutions to protect their internal computers as well networks from those attacks. However, in most organizations, the network administrator has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.