The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The noise pollution is still a troubling problem for us, especial in hospital, library, baby-care center, etc. Although many decibel-meters are applied to those environment, which indeed must be kept quit, but the decibel-meters can only detect the noise pollution limited to nearest area around the device. We will face the incorrect measuring data from the decibel-meters in bigger space like library...
This work proposes a framework for proactive resource allocation in IaaS clouds to improve the system performance. In this system framework, the over-commit approach is applied to improve resource utilization and to show the performance impact. Although the over-commit approach could obtain better resource utilization, there are still some risks. When the amount of aggregated resources requested by...
In this paper we propose and evaluate an auction-based resource allocation mechanism in a cloud-based radio access network (C-RAN), where the spectrum is managed by several mobile virtual network operators (MVNOs) and the physical resource is owned by the C-RAN operator. Technically, our approach consists of two coupled auctions in a hierarchical way: the lower-level auction between end users and...
Cloud-based Radio Access Network (C-RAN) is a promising architecture for future cellular networks, in which Baseband Units (BBUs) are placed at a centralized location, with capacity-constrained fronthaul connected to multiple distributed Remote Radio Heads (RRHs) that are far away from the BBUs. The centralization of signal processing enables the flexibility for coordinated multi-point transmission...
Survivability of contents/files in data centers, when a disaster occurs, is becoming a major challenge in designing cloud-based services. To handle such a situation, a robust communication protocol is needed, so that provisions can be made to allocate an alternative fault-free path, when a disaster disrupts the path used for data communication before the disaster occurs. In this work we have presented...
On behalf of the advisory committee of COOL Chips 20, I extend greetings to each of the conference attendees. This year we celebrate the 20th anniversary of this conference series that is part of the premier conference series on microprocessor architecture and technology and software. Today we have issues in cloud computing, cyber security, IoT, Big Data, and artificial intelligence, especially deep...
Access to sensitive information is traditionally achieved through an authentication and authorization process via a username/password combination to validate a user's identity that is stored within the system being accessed. This method creates delays before sensitive information can be obtained in the circumstance that the user's identity is previously unknown, due to necessary human intervention...
Many recent projects and research activities in the telco sector are adopting the Cloud Computer paradigm consolidating their infrastructures towards converged and all-IP next generation networks providing typical telco services within LTE (and soon 5G) and also fixed network environments, e.g., often still adopting IP Multimedia Subsystem (IMS) architecture solutions. In this perspective, cloud computing...
With the various technological advances, mobile devices are not just being used as a means to make voice calls; but are being used to accomplish a variety of tasks. Mobile devices are being envisioned to practically accomplish any task which could be done on a computer. This is hurdled by the limited computational resources available with the mobile devices due to their portable size. With the mobile...
Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight...
The proliferation of consumer Internet of Things (IoT) devices offers as many convenient benefits as it poses significant vulnerabilities. Patching or otherwise mitigating these vulnerabilities will be difficult for the existing home security ecosystem. This paper proposes a central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic...
This demo presents the architecture of GENI (Global Environment of Network Innovations) [1] edge cloud computing network in the form of compute and storage systems, a mobile 4G LTE edge and a high speed campus network. GENI's edge computing strategy proceeds by deploying self-contained packages of network, computing, storage resources, or GENI Racks [2] connected via high speed fiber to LTE BS(s)...
Following the Service-Oriented Architecture, Cloud services are exposed as Web APIs (Application Program Interface), which serve as the contracts between the service providers and service consumers. With increasing massive and broad applications of Cloud-based development, a large number of diversified APIs are emerging. Due to their wide impacts, any flaw in the cloud APIs may lead to serious consequences...
The pervasive computing discipline has evolved substantially since its inception. A lot of progress has been made in scaling pervasive computing, which has led to new, societal-scale capabilities such as mobile crowdsensing and the Internet of Things. Pervasive computing applications have also expanded from smart appliances and smart environments in the early days to systems of much broader scope...
Cloud computing is one of the recent trending technology. Cloud computing provides the user with multiple resources. The resources include storage, capacity, processing and so on. There are different types of services provided by the cloud, they are Infrastructure as a Service(IaaS), Software as a Service(SaaS) and Platform as a Service(Paas). The user need not invest large amount of money for the...
Vehicular ad hoc network is based on MANET all the vehicle to vehicle and vehicle roadside are connected to the wireless sensor network. In this paper mainly discuss on the security in the VANET in the lightweight cloud environment. Moving vehicle on the roadside connected through the sensor nodes and to provide communication between the vehicles and directly connected to the centralized environment...
The new advent of digitized has lead to rise of volume, velocity and variety of data by passing every hour. In reality, most of the data were stored on Cloud for managing the storage system. Most of the organizations were moving their data into the Cloud. Thus, Cloud Computing will play a vital role in today's world. Cloud Computing provides remote access to the Client on the basis of Pay-What-Use...
Cloud computing has become an extremely attractive area of research and practice over the last few years. However, there are many concerns over privacy of shared documents while adopting and using public cloud solutions. Private cloud solution is useful for organizations to implement their own privacy policies. Through this paper we propose a method to upload privacy preserving application on private...
Content Delivery Networks (CDN) interconnect several surrogate a.k.a replica servers that use geographical proximity as a criteria for delivering multimedia content. The delivered content may be enriched by value-added video services (e.g. in-stream video advertisements). The purpose of this demo is to show the prototype we developed in order to enable a cost-efficient and agile provisioning of value-added...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.