The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we evaluate the performance of peer selection algorithms: MLH (Minimum Logical Hop) and MPH (Minimum Physical Hop) to increase the number of joining peers and to decrease inter-AS traffic volume in P2P live streaming, where we assume that every peer's logical hop count (the number of providing peers between an origin streaming server and the peer) is limited by a predetermined value...
During the last decade, intrusion detection systems (IDSs) have become a widely used measure for security management. However, these systems often generate many false positives and irrelevant alerts. In this paper, we propose a data mining based real-time method for distinguishing important network IDS alerts from frequently occurring false positives and events of low importance. Unlike conventional...
In this paper, we analysis content distribution method for content delivery networks. It is necessary to manage content distribution differentially based on its characteristic. To address this issue, we explained origin server capability with multi-priority service and revenue concept. For including the aspect of operational revenue, we define a performance index with the terms `plus' and `minus'...
Emerging massively multiplayer online real time strategy games require complex game server architecture to make the transmission of the state information of a huge number of units generated by a lot of players feasible. This architecture design is supported by network traffic simulations based on the accurate characterization of player behavior. However, these characteristics of player behavior in...
This paper describes an object-oriented real-time framework for Ada 2005 and the Ravenscar profile. The framework uses the Ada 2005 real-time features implemented on the AVR32 UC3 microcontroller series to control the execution-time of tasks and interrupt handlers. An example application using the framework and test results are given.
We discuss a systematic approach to network forensic collection and analysis of data in converged networks. Since attacks cannot be completely avoided, it is necessary to have appropriate forensics systems. Upon integration into a network forensic infrastructure, we expect this forensic model will enable a faster response and more structured investigations of VoIP-based network attacks.
Although component middleware is increasingly used to develop distributed, real-time and embedded (DRE) systems, it poses new fault tolerance challenges, such as the need for efficient synchronization of internal component state, failure correlation across groups of components, and configuration of fault-tolerance properties at the component granularity level. This paper makes two contributions to...
BitTorrent(BT) in recent years has emerged as the de facto protocol for sharing content over P2P networks. Although BitTorrent was created for purposes of sharing time-insensitive content, streaming is not supported. In this paper, we propose minimal changes to BT's mechanisms for supporting real-time downloads. The significance of adding such a capability to BT is that the peer will have an ability...
The following topics are dealt with: databases; algorithms; Web applications; e-technology; real time systems; artificial intelligence and applications; software engineering; networking; security; information retrieval; image processing; multiagent; genetic algorithms; signal processing; pattern recognition and applications; neural networks; data mining; parallel and distributed computing; software...
The paper will introduce a new operating system architecture microkernel for education. For its safe, small, and flexible feature, microkernel is becoming widely use in various aspects. Taking it to education, will from different design architecture to make learner get deeper understanding of operating system mechanisms. Fiasco is a real, second-generation microkernel whose source code is less than...
The popularity of a new generation of smart peer-to-peer applications has resulted in several new challenges for accurately classifying network traffic. In this paper, we propose a novel 2-stage P2P traffic classifier, called self learning traffic classifier (SLTC), that can accurately identify P2P traffic in high speed networks. The first stage classifies P2P traffic from the rest of the network...
The primary goal for asynchronous event handling (AEH) in the Real-Time Specification for Java (RTSJ) is to have a lightweight concurrency mechanism. However the RTSJ neither provides a well-defined guideline on how to implement AEH nor requires the documentation of the AEH model used in the implementation. Also the AEH API in the RTSJ are criticized as lacking in configurability as they do not provide...
Software architectures is a critical aspect in the design and development of software. Architecture of software is a collection of design decisions that are expensive to change. A correct architecture has the largest single impact on cost and quality of the product. Though architecting constitutes 10% of the product development cycle, it determines 90% of the product development costs. Given the impact...
In this paper, we describe the design of our architecture for continuous, heterogeneous analysis over streams, aka CHAOS that combines stream processing, approximation techniques, mining, complex event processing and visualization. CHAOS, with the novel concept of computational stream analysis Cube, provides an effective, scalable platform for near real time processing of business and enterprise streams...
Personalization of service delivery is an important means for the telecommunication industry of keeping their customers in spite of their market becoming more open to other players. Personalization involves using user-specific, dynamic information about communication activities, device capabilities, user context, and service availability for making real-time decisions about handling running sessions...
In this paper, a novel scheme is proposed for the network TV or IPTV system to automatically grab electronic program guide (EPG for short) information by Web searching. The scheme can be used to realize EPG information roboticized acquirement and delivery in network TV system by analyzing and extracting the EPG information from relative Web pages on Internet. This approach can maximally reduce manpower...
The following topics are dealt with: data mining; genetic algorithm; software engineering; Web applications; information management; data management; wireless networks; databases; neural networks; ad hoc networks; real time systems; social network; security; multimedia; multi-agent system; artificial intelligence; distributed systems; parallel systems.
Monitoring of Service Level Objectives (SLOs) determines an essential part of Service Level Agreement (SLA) management, since customers are to be reimbursed, if a provider fails to fulfil them. By automating this process, a timely detection of a violation is possible. The compliance approach must be flexible to adapt to potential changes, must be scalable with respect to the amount of data, and has...
This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies...
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence not fully trusted by the clients. We introduce the abstraction of a fail-aware untrusted service, with meaningful semantics even when the provider is faulty. In the common case, when the provider is correct, such a service guarantees consistency (linearizability) and liveness (wait-freedom)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.