Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In the era of big data processing, it is desirable to manage large volumes of data with high scalability, confidentiality protection, and flexible types of search queries. In this paper, we propose a design to store encrypted data on a cluster of distributed servers while supporting secure and authorized Boolean queries. In particular, the data owner encrypts the database with encrypted searchable...
The Domain Name System (DNS) has evolved to support the exponential growth of the Internet, by relying heavily on a highly distributed infrastructure. Nevertheless, trust between server must exist in order to guarantee correct functioning of the system, which is prone to attacks and errors. The Domain Name System Security Extensions (DNSSEC) is the current extension of the DNS system to provide security...
This is a fact already known by all many companies make large and important disbursements to keep their equipment and information safe from possible attacks and threats that are internal or external. Among the internal threats are the duplication of users, the change of credentials of access to the network, where fraud, sabotage and robberies through the network are actions that need to be faced with...
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
Economic Denial of Sustainability (EDoS) attacks have been threatening cloud consumers' financial viability due to the “pay-as-you-go” cloud resource charging scheme. EDoS attackers can take advantage of this pricing scheme to fraudulently consume the billable cloud resources from the cloud consumers and thus, drive up the cloud consumers' financial cost and eventually disrupt their economic sustainability...
Cooling systems consume around 40% of modern data centres' total energy consumption, thus reducing the energy waste in this sector will have positive environmental impact. There exist several cooling methods appropriate for particular conditions. Since environmental conditions, such as air temperature, change on seasonal bases, no single cooling method can be claimed to be the best. In contrast, data...
A tracking simulator is an online simulation system that utilizes dynamic parameter estimation for calibrating model parameters to achieve state synchronization with the process. It can be utilized as a plant-wide virtual sensors or as a predictive tool to provide production forecasts based on the current state of the plant. The appearance of industrial applications based on tracking simulators has...
Power quality is an important aspect in data centers and power system operators prefer data centers with high standard power quality. Modern data centers consume large amount of electrical power. As the cooling systems are accounted for 40% of the total power consumption in data centers, energy efficiency in this sector is of high importance. This research investigates if the existing energy efficient...
Lack of healthcare infrastructure has caused millions of deaths in developing countries. People in such countries generally suffer from infectious diseases and are denied treatment at appropriate time or not warned about emerging epidemics. This mainly happens because of poor establishment of public health services, lack of access to health statistics and nonexistence of precise medical data. The...
Mobile medical applications are increasingly being used by patients and consumers. However, due to their complexity, these applications are normally only accessible to smartphone users. People using low-end cellphones cannot benefit from this new technology. The goal of this paper is to expand health service platform to lower-end cellphones, so that people in underdeveloped regions can benefit from...
Data Centers (DCs) are becoming increasingly important in recent years and require efficient operation and management. Thus, a topic of focus has been DC Infrastructure Management (DCIM) that can manage ICT equipment, power equipment, HVAC systems, etc. In this study, we developed a method to design the ICT equipment layout in the server room by using DCIM and Computer Fluid Dynamics (CFD). The method's...
Recent studies have shown that attackers can force deep learning models to misclassify so-called “adversarial examples:” maliciously generated images formed by making imperceptible modifications to pixel values. With growing interest in deep learning for security applications, it is important for security experts and users of machine learning to recognize how learning systems may be attacked. Due...
With the growth of online services, a large amount of files have been generated by users or by the service itself. To make it easier to service users with different network environments and devices, online services usually keep different versions of the same file with various sizes. For users with high speed network and top of the line displays, a large size file with high precision can be supplied...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
Live VM migration is a technique that consists of a selection process and a migration process to migrate a VM from one host to another in the same data center without changing the IP address, or in a different data center with necessity to the VM to get a new IP address. The changing of IP address results into a mobility problem, which may render the service unreachable. In this paper, we propose...
In a world of the global communications, with continuous expansion to new horizons, which requires anytime and anywhere access to information sources, the need to manage the communication requirements is a very important issue. Traditional IP networks are facing difficulties in ensuring, to a user, a specific bandwidth[1] level for network access. Related to this matter, in this article we are proposing...
With the omnipresence of the Internet of Things and poorly secured devices with it in combination with high bandwidth networks, Distributed Denial of Service (DDoS) attacks have become one of the biggest threats for network security. With high bandwidth attacks flooding network infrastructure, the pressure to secure the attack targets shifts more and more to the network operators. Often without direct...
The reports from last years outline the fact that the web crawlers (robots, bots) activities generate more than a half of web traffic on Internet. Web robots can be good (used for example by search engines) or bad (for bypassing security solutions, scraping, spamming or hacking), but usually all take up the internet bandwidth and can cause damage to businesses that rely on web traffic or content....
We present a novel input sensitive analysis of a deterministic online algorithm \cite{r_approx16} for the minimum metric bipartite matching problem. We show that, in the adversarial model, for any metric space \metric and a set of n servers S, the competitive ratio of this algorithm is O(\mu_{\metric}(S)\log^2 n); here \mu_{\metric}(S) is the maximum ratio of the traveling salesman tour and the diameter...
Series-stacked server power delivery architectures have been proposed recently that can achieve much higher energy efficiency than conventional power delivery architectures. When servers are connected in series, differential power processing (DPP) converters can be used to regulate the server voltages when the servers are consuming different amount of currents. Server-to-bus DPP architecture has unique...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.