The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a low complexity algorithm for decoding where network coding is deployed in client-server networks. We consider battery powered clients, so that minimizing their power consumptions is essential. Our focus is thus on developing a decoding algorithm that can reduce the computational complexity. Unlike general decoding algorithms that are based on Gaussian elimination, we propose...
Erasure coding has been increasingly replacing replication in distributed storage systems, thanks to its lower storage overhead with the same level of failure tolerance. However, with lower storage overhead, the reconstruction overhead of erasure codes can increase significantly as well. Under the ever-changing workload, in which the data access can be highly skewed, it is difficult to achieve a well...
We propose a Parity-based Data Outsourcing(PDO) model in this paper. This model outsources a set of raw data by associating it with a set of parity data and then distributing both sets of data among a number of cloud servers that are managed independently by different service providers. Users query the servers for the data of their interest and are allowed to perform both authentication and correction...
Today, information has become an important resource and so is its security. Many scientists attempted to use new methods inspired from DNA bio-techniques in the field of cryptography and steganography. The idea of using DNA cryptography has been specified as possible technology that gets a new hope for unbreakable algorithms as traditional cryptographic systems are now vulnerable to certain attacks...
Galois Field arithmetic forms the basis of Reed-Solomon erasure coding techniques to protect storage or communication systems from failures. Most recent implementations of Galois Field arithmetic rely on 128-bit vector instructions, such as Intel's Streaming SIMD Extensions, which allows us to perform fast Galois Field computations. However, these implementations are not optimized for multi-threaded...
The multi-view video streaming is one of promising technologies for emerging video services. For those applications of multi-view video streaming, video frames of all viewpoints, i.e., cameras, are needed to be transmitted to viewers because the demands of all the viewers' view-switching are unpredictable. However, existing transmission schemes are highly vulnerable to frame loss. Specifically, the...
In this paper we considered the problem of finding pairs of mutually orthogonal diagonal Latin squares of order 10. First we reduced it to Boolean satisfiability problem. The obtained instance is very hard, therefore we decomposed it into a family of subproblems. To solve the latter we used the volunteer computing project SAT@home. In the course of 10-month long computational experiment we managed...
End-users in online video services are sensitive to the overall quality of the video at screen, but also, and more importantly, to other factors, including the latency between the video generation and the playback for live videos. If the improvement of the quality of the perceived video has been well investigated by the multimedia community, the impact of delay, latency, and re-buffering has not received...
SQL Injection Attack (SQLIA) has been consistently ranked among the top security threats against web applications for more than a decade. Nowadays, attackers use sophisticated tools to launch automated injection attacks. The problem of prevention and detection of SQLIA has been long attended by the research community, but hardly any solution exists for protecting multiple websites in a shared hosting...
Caching networks have been extensively studied from an information-theoretic perspective for various network topologies. In particular device-to-device (D2D) topologies have been considered and it has been shown that rates similar to a centralized server setup can be achieved. Hierarchical networks with an intermediate layer of cache called mirrors between the server and the users have been looked...
Fountain-code based cloud storage framework gives dependable online stockpiling arrangement through putting unlabeled substance obstructs into numerous capacity hubs. Luby Transform (LT) code is one of the prevalent wellspring codes for capacity frameworks because of its productive recuperation. However, to guarantee high achievement deciphering of wellspring codes based capacity, recovery of extra...
Homomorphic encryption scheme is one of useful tools for handling encrypted sensitive information. However, most of existing schemes have not been widely used in practical applications due to their inefficiency. In this paper, we give an additive homomorphic encryption scheme which can be used for evaluating some statistical information, such as the mean and the variance. To compute the information...
In Cloud-based VDI, users can access the virtual desktop service anytime and anywhere with the wide variety of terminals. The lightweight virtual desktop display protocol is required to support more users on the limited resources and to provide service to mobile users. In this paper, we design and implement the virtual desktop system using lightweight virtual desktop display protocol which would reduce...
Government and private organizations of Bangladesh have started getting adopted to various web applications due to the easy accessibility. Services provided by web applications include online education, banking, reservation, shopping, resources, and information sharing. However the awareness of web application security has not been developed yet. No through study has been done on the existing vulnerabilities...
Cloud storage is an important service of cloud computing where the data owners store their data in cloud servers so that users can access the data from cloud servers anywhere irrespective of their device and location such as thin clients with limited memory capabilities, CPU and limited bandwidth. The owners can also reduce the maintenance and burden of cloud storage. However this cloud storage is...
In emergency scenarios, e.g., natural disasters, the infrastructure of telecommunication system is partially or even completely disrupted. While the bandwidth and energy resources of system are limited, the maltimedia communication demand of myriad usen may reach the peak of data traffic. This in tum makes the system more challenging to serve the users high quality of maltimedia streaming with con...
In this paper, a RTP streaming media application for video signals on demand or multicast is proposed based on MPEG-4 coding features and RTP/RTCP principles. A optibase's MPEG-4 Movie Maker 400 card and Apple's DARWIN streaming media sever are used, and RTP packing algorithm based on the MPEG-4 transmission is also used. Experiments show that the algorithm has efficient transmission and packet loss...
In order to solve the existing problem which H.264 video transmission encryption technology can not meet a good compromise between security and encryption efficiency, this paper puts forward a H.264 video transmission encryption technology based on Blowfish algorithm. The experimental results show that this encryption technology can obtain a good compromise between security and encryption efficiency...
Many organizations, including businesses, government agencies and research organizations, are collecting vast amounts of data, which are stored, processed and analyzed to mine interesting patterns and knowledge to support efficient and quality decision making. In order to improve data quality and to facilitate further analysis, many application domains require information from multiple sources to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.