The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
We study the dynamic energy optimization problem in data centers. We formulate and solve the following offline problem: given a set of jobs to process, where the jobs are characterized by arrival instances, required processing time, and completion deadlines, and given the energy requirements of switching servers ON or OFF, in which time-slot which server has to be assigned to which job, and in which...
paper deals with the transition of companies to information systems operated using cloud computing services. The influence on the competitiveness of company and its organizational support is analysed. The developmental trends and their impact on company management are also described. The benefits and drawbacks from the transition to flexible ICT architecture are emphasized. Theoretical framework and...
Mobile devices are expected to perform complex tasks exceeding their current hardware capabilities. Traditional cloud-based solutions are often useful, but fail in adversarial environments with limited communication connectivity. This can be exemplified in battlefield scenarios where soldiers may require access to large processing capabilities, without sacrificing their own mobility. In this paper,...
Massive data applications such as E-science applications are characterized by complex treatments on large amounts of data which need to be stored in distributed data centers. In fact, when one task needs several datasets from different data centers, moving these data may cost a lot of time and cause energy's high consumption. Moreover, when the number of the data centers involved in the execution...
In the recent years cloud computing has become one of the hottest topics in the field of information technology. It links a certain amount of computing, storage and software resources to make a huge scale of shared virtual IT resource pool, providing unlimited capacity IT services for remote computer users. Cloud computing attracts the attention of more and more enterprises by using its advantages...
Hadoop is a popular open-source MapReduce implementation and has been widely used in many large scale systems. For improving I/O performance of Hadoop, a method which controlled file storing location based on sequential I/O speed of the storage device was proposed. However, the method did not take account of virtualized environment. In this paper, we focus on virtualized environment with a fixed number...
A cheating detectable secret sharing scheme is a secret sharing scheme that can detect forged shares in reconstructing a secret. For example, if we store shares in cloud storage, there is a possibility of it being forged. If the administrators of cloud storage are malicious, it is easy for them to forge a share. Therefore, cheating detectable secret sharing schemes have attracted attention, and many...
Nowadays, big data problems are ubiquitous, which in turn creates huge demand for data-intensive computing. The advent of Cloud Computing has made data-intensive computing much more accessible and affordable than ever before. One of the crucial issues that can significantly affect the performance of data-intensive applications is the load balance among cluster nodes. In this paper, we address the...
This work focuses on the issue of a high performance computing education based on systems such as grid, cloud, HPC cluster or systems with hybrid environments. The goal is based on the analysis of the High Performance Computing Strategic Research Agenda in Europe and the published findings in USA in context of needs for education and training specifically in HPC and Compute Intensive Science. In order...
Automation has gained the most famous and biggest attention in the industrial world lately. This is because it causes less man involvement, higher accuracy, money and time savings, unlike the conventional methods. Thus, the “Internet of Things” (IoT) concept came to the picture. This research paper reveals an implementing method of IoT concept for a manufacturing line to inspect and control an automatic...
In Cloud Computing one of the most cogent issues is the storage of data because the entire data reside over a set of interconnected resource pool that enables the virtual machine to access those data. The data management and services may not be fully trustworthy because the resource pools are situated over various corners of the world. There are various issues that need to be addressed, but privacy...
Recently, Network Function Virtualization (NFV) has been getting the attention for reason of operational efficiency, cost savings and service scalability. The NFV can be described as integrating an independent software on the general purposed hardware such as server and switch in order to replace the legacy hardware-based network device. Therefore, NFV can help ensure that carriers can quickly respond...
Software-as-a-Service (SaaS) providers offer on-demand, highly scalable applications to the end users. To maximize their profit, the providers must make profit-aware scheduling decisions about assigning client requests to virtual resources, while respecting the agreed upon Service-Level Agreement (SLA). Given the highly dynamic nature of the cloud environment, unexpected events may affect the initial...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
Software as a Service (SaaS) is one of the major service models of cloud computing and a new software delivery model, in this software delivery model, software is hosted centrally, is licensed to users on subscription basis, and typically is accessed by users through a Web browser. Before SaaS was introduced, the traditional software delivery model was Software as a Product (SaaP): software was sold...
This paper presents a new method for Computer Hardware Experiment teaching. Previous hardware experiments of computer is built on a computer connected to a hardware equipment locally, and then student operate the hardware devices on the switches, buttons, etc. to carry out experiments and verify the developed hardware code is correct. Such experimental methods have lots of significant limitations...
Cloud computing is a technology in which online service providers can store and host organizational data and information without the need for computer hard drives to be centered in organizations. The information is hosted on a network server where it can be accessed by enterprises and users when in need. Small and large companies, as well as institutions of higher learning, are embracing this technology...
At present the institutions of higher learning attempt to be competitive for their applicants. Therefore, they look for new ways of attracting them. One of the ways is also the efficient use of modern technologies since the young generation entering these institutions is the so-called digital natives who perceive technologies as an inseparable part of their lives. The purpose of this article is to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.