The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a distributed network coding (DNC) scheme based on improved online fountain codes is proposed for wireless sensor networks (WSNs). Specifically we propose an improved online fountain codes with the objection of optimizing the build-up phase of the conventional online fountain codes. Then based upon this method, we develop a distributed network coding scheme for sensed data gathering...
After analyzing the advance of technology, it is clear that use of the Internet, computers, smart phones and tablets has become ubiquitous and therefore, the creation and proliferation of cyber threats and attacks has grown exponentially. Consequently, Anti-Virus companies and researchers have developed new approaches for dealing with discovering and classifying malware. Among these, machine learning...
Public business information could increase the efficiency and fairness of the securities market for the benefit of investors, corporations, and economy. Since 1934, the U. S. Securities and Exchange Commission (SEC) has required disclosure of all listed companies in forms and documents. SEC's EDGAR, which is a data management system of SEC, began to collect electronic documents to help investors get...
At present the institutions of higher learning attempt to be competitive for their applicants. Therefore, they look for new ways of attracting them. One of the ways is also the efficient use of modern technologies since the young generation entering these institutions is the so-called digital natives who perceive technologies as an inseparable part of their lives. The purpose of this article is to...
Network service composition is becoming increasingly flexible, thanks in part to advances in virtualisation and cloud technologies. As these penetrate further into networks, providers are often looking to leverage this infrastructure to improve their service delivery. This desire poses a number of obstacles, including a diversity in device capabilities and the need for a value exchange mechanism....
The problem arises when there is no tool that can help users to make best decision for choosing provider that meets user requirements satisfactorily. Available tools only compare the services of providers without considering user requirements. Thus the objective of this paper is to present a tool, called PTUR to meet the requirements and satisfaction of user from the selected providers that are ranked...
As its complexity grows, securing a system is harder than it looks. Even with efficient security mechanisms, their configuration remains a complex task. Indeed, the current practice is the hand-made configuration of these mechanisms to protect systems about which we generally lack information. Cloud computing brings its share of new security concerns but it may also be considered as leverage to overcome...
This poster looks at adapting Intrusion Detection Systems solutions to multiple SDN based domains. We present a preliminary evaluation of the performance in terms of latency cost while offering IDS solutions as a service (IDSaaS) in SDN. The goal is to eventually be able to determine what resources are needed in order for the IDSaaS in SDN to perform in a manner that is almost comparable to running...
Separation of network control from devices in Software Defined Network (SDN) allows for centralized implementation and management of security policies in a cloud computing environment. The ease of programmability also makes SDN a great platform implementation of various initiatives that involve application deployment, dynamic topology changes, and decentralized network management in a multi-tenant...
Cloud key services are prominent targets for attacks. In fact, every service guarding sensitive data uses a policy system to do so. As of today, such policies are mostly static. However, as system environments change and attacks grow more sophisticated, such static policies cannot always sufficiently cope with attacks and may even unnecessarily hinder the legitimate user. We believe that more fine-grained...
In this work an unconditionally hiding auditing procedure for distributed (cloud) storage solutions is introduced. There is only one multi-party computation (MPC) scheme providing auditability which computationally protects the inputs of the computations. Building on this, we propose a computationally hiding solution that uses bilinear maps and therefore produces no additional overhead in the online...
Volcanic growth of expanding business and increasing market dimensions lead to need for high performing applications particularly in this internet era. Forrester predicts performance and availability should not to be taken lightly. To fight this onslaught, a business organisation no longer can just accelerate current practices and rely on human intelligence. The company's software also needs to be...
In this paper, we propose the architecture and fast virtual machine allocation mechanism to implement multiscreen engine on the smart node system. The proposed platform can provide clients with lower waiting time service on the non-preemptive multiscreen display tasks through cloud based network environments. In addition, the proposed scheme presents a greedily task allocation scheme on cloud based...
The application scheduling is an important requirement in the cloud computing context. It allows to define the required resources to execute applications tasks following predefined criteria, for instance, maximum execution time, number of virtual machines, volume of data, among others. Selecting process to choose the most appropriate execution structure is driven by scheduling algorithms. This paper...
This presentation will discuss the open source OpenStack project named Watcher, which is Optimization as a service. This service uses OpenStack cloud platform as the backbone to provide server, storage and network level optimization to one's cloud infrastructure.
In network education, there are several benefits for conducting cooperative practice among a variety of learning levels of learners. We have proposed a hands-on IP network practice system by constructing a virtual network on a cloud server. In our past study, we introduced a pseudo cooperative practice function to our system so that cooperative practice with a companion agent can be accomplished even...
Recently, "Agent-Oriented Computing" has been attracting attention as an approach to designing a system with high response capabilities. To develop and operate an agent system effectively, an agent framework is used. An agent system developed on DASH[1], a kind of agent framework, requires us to install the agent framework as an operating infrastructure and to operate DASH to benefit from...
Live migration of Virtual Machines (VMs) is a key technique to quickly migrate workloads in response to events such as impending failure or load changes. Despite extensive research, state-of-the-art live migration approaches take a long time to migrate a VM, which in turn negatively impacts the application performance during migration. We present, Quick Eviction, a new approach to significantly speed...
Today, web-based education technologies such as e-learning, distance learning, online course, virtual classrooms and interactive learning are commonly used outside the traditional education systems. Massive Open Online Courses, which were adopted with the evolution of these systems in 2008, have become the most popular education systems of today and access to a very large audiences with many modules...
We consider problems of two-user secret key generation through an intermediate relay. In the untrusted relay setting, the goal is to establish key agreement between the two users at the highest key rate without leaking information about the key to the relay. We characterize inner and outer bounds to the optimal tradeoff between communication and key rates. The inner bound is based on the scheme which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.