The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of smartphones and android applications has become a part of our everyday life. People use it for communication, entertainment and socialization purposes. Many of these applications available in online application markets can be used to broadcast live video and most of these applications are for socializing purposes. In this paper an android application idea is presented to broadcast a video...
Recently diverse testbeds are built to experiment and verify new service ideas on SDN/Cloud-leveraged networking. In the early stage of verification, easy and speedy execution of experiments is required. Thus, in this paper, we introduce S-Box virtualized playground, where lightweight experiments are automatically executed only with the virtualized resources in a single box. The proposed S-Box concept...
This paper focuses on the interoperable Sensor Web and Web Processing standards defined by the Open Geospatial Consortium. Special attention will be given to the combination of Sensor Web and the Web Processing Service, which opens up new outlooks in the field of disaster management, by having near real-time sensor data flows linked on-demand to different geoprocessing services. Though in an early...
DevOps (a portmanteau of “development” and “operations”) is a software development method that extends the agile philosophy to rapidly produce software products and services and to improve operations performance and quality assurance. It was born to accelerate the delivery of web-based systems and quickly bring new value to users. Many web-based systems evolve according to usage trends without a clear...
In a distributed system, there is always a question of how to distribute any data across the constituent systems. Consistent hashing is often used to get this system mapping based on a hash function and the data. Hence it becomes solely responsible for the distribution of the workload across the different systems. The default consistent hashing partitioning scheme doesn't factor in the load distribution...
We present an architecture that increases persistence and reliability of automated infrastructure management in the context of hybrid, cluster-cloud environments. We describe our highly available implementation that builds upon Chef configuration management system and infrastructure-as-a-service cloud resources from Amazon Web Services. We summarize our experience with managing a 20-node Linux cluster...
Flash memory SSD has emerged as a promising storage media and fits naturally as a cache between the system RAM and the disk due to its performance/cost characteristics. Managing such an SSD cache is challenging and traditional cache replacements do not work well because of SSDs asymmetric read/write performances and wearing issues. This paper presents a new cache replacement algorithm referred to...
Broadband Remote Access Servers (BRASes) are crucial middleboxes in DSL access networks, providing the first IP point in the network for subscribers and enforcing operator policies. The number of functions provided by BRASes, combined with the key role they play in the network, means that these devices are expensive, difficult to change, and constitute a single point of failure. In order to overcome...
Communicating systems are today composed of a huge number of distributed processes interoperate with diverse kinds of applications, services and actors. It therefore becomes crucial to monitor and manage these trustworthy interactions. For that purpose, passive testing techniques have been used particularly for checking the system conformance w.r.t. Its standard. Among these studies, trust behaviors...
In Industrial Ethernet environments, usually only small amounts of data are transmitted. These transmissions must be deterministic to meet hard real-time requirements. But prospectively, also the deterministic transmission of high amounts of data and data streams is required. In this paper, a system based on the modified Peer-to-Peer network Kad called HaRTKad combined with the standardized protocol...
The Great East Japan Earthquake caused catastrophic damage to Iwate Prefecture, Miyagi Prefecture, and Fukushima Prefecture. A lot of relief supplies were sent to these stricken areas from all over the country in case of the Great East Japan Earthquake. However, since the relief supplies accumulation hub got confused by management and sorting work of relief supplies, "the relief supplies shortage...
An application distribution management system for “Hybridcast” is proposed in this paper. This system will enable a broadcaster to comprehensively manage Web applications provided by service providers from registration to distribution and enable the operation of any application to be immediately terminated in the event of a problem. This paper describes the details of the proposed system and presents...
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in a smartphone, the cellular data and Wi-Fi interfaces often continue to be used even when the phone is in its idle state in order to accommodate background (necessary or unnecessary) data traffic produced by some applications. In addition,...
Caregiving a person suffering from dementia or loss of brain cognitive ability due to aging is a big physical, mental and emotional burden to family members. In this paper we present a novel system for assisting caregivers at home. The system employs heterogeneous sensing and artificial intelligence technologies to automatically and unobtrusively monitor the patient; assess possible risks that the...
Resource management in distributed environments, such as Cloud virtualized networks, is one of the main concerns of infrastructure providers. Despite the many advantages of centralized solutions, their unique point of failure and the lack of scalability make us consider the use of distributed and autonomic solutions. Beyond this, centralized solutions would be inefficient to deal with dynamic and...
Present NoSQL databases are passive entities, where users proactively access the databases serving requested issued by users. While NoSQL databases are scalable due to their horizontal scale-out designs, data items stored in potentially very large databases are difficult to retrieve in terms of access delay, programmability and usability. In this paper, we advocate supporting events in NoSQL. By introducing...
Traffic localisation is an important aspect of traffic management on the Internet. The caching of content and its distribution from localised servers is one mechanism that enables traffic localisation and reduces transit costs for network providers while enhancing service performance. However, personalized, dynamic user content is often un-cacheable due to its nature. As we move towards a world of...
Despite research spanning more than a decade in the area of Web services, the industry has not yet seen a consensus regarding an effective method for the provisioning of Web services. In recent years, a new paradigm for implementing Web services based on Representational State Transfer, the successful architectural foundation of the Web, has seen greater interest in the industry. We had previously...
One of the latest trends of realizing innovative Command and Control (C&C) channels involves leveraging Online Social Networks (OSNs) as a C&C channel. The number of botnets targeting the smartphones and the sophistication of those botnets have progressively increased. Due to their mobility, smartphones connect to a variety of networks which makes it harder for network centric detection of...
A smart evacuation needs a scalable and flexible system to provide service in both emergency and normal situations. A single cloud service is usually limited to support scaling up requirements in an emergency, especially one with a large geographic scope. In this article, the authors propose MCES, a multicloud architecture that deploys smart evacuation services in multiple cloud providers and that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.