The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An autonomous decentralized system and a series of methods for reducing the detection time of path failures in the system are developed. Computing devices in the proposed system are organized into at least three groups based on their connectivity of system's graph model. Each computing device is assigned three identification values associated with their group memberships. The identification values...
In order to realize digital ecosystems, the total electric power consumption of computers and networks have to be reduced. In distributed systems, clients issue requests to servers and then servers send replies to clients. Here, application processes are composed of a pair of modules which mainly consume computation and communication resources, respectively. Based on the measurement of the power consumption...
Mixed reality techniques are boosting for aviation progress. In this paper, we present MRStudio, a mixed reality display system for aircraft cockpit. The system architecture is given, with special attention paid upon such technical issues as three-dimensional map construction for aircraft cockpit, computer vision based 6-DOF head tracking, virtual aircraft cockpit panel construction and registration,...
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is inefficient because hackers bypass these checks and directly send malicious data to the server. User input validation thus has to be duplicated from the client-side (HTML pages) to the server-side (PHP or JSP etc.). We present...
Authentication has been a cornerstone of computer security for decades. A considerable number of authentication protocols have been specified and implemented. This paper compares most common families of client-server authentication protocols and shows the benefits of the combined use of One Time Password (OTP) with Password Authenticated Key Exchange (PAKE) protocols. Then, the paper addresses a particular...
Enterprise applications are built for client server architectures and rebuilt using service-oriented principles. When such web service based applications are hosted on multicore there are specific performance issues due to spatial and temporal characteristics of the multicore. Existing literature addresses the spatial case where inherent parallelism is exploited and the temporal case, where data is...
We present Back Talk, a prototype that enhances video viewing for distributed viewers. The system captures engagement, general attentiveness, and viewer comments; the output auditory environment comprises audio cues triggered by sensed data, and comments.
Information presentation desktop applications such as media players, digital signage players are heavily encountered by us in our daily life. However current presentation oriented desktop application architectures are not flexible and less efficient in presenting a variety of information. Desktop applications rely on embedded files and the contents they present are bound to presentation layout. This...
Developing and less developing countries (LDCs) are identified in risk of stillbirth due to insufficient emergency medical take-care supports. The regular check-up of the fetal electrocardiography (FECG) could be an earliest prevention of this occurrence. This paper presents a research work aim to implement a simple, customize and portable emergency medical care for the FECG monitoring system from...
P2P video streaming is a cost effective and scalable alternative for client-server based video delivery over the Internet. In P2P video streaming schemes, the Internet peers contribute their bandwidth for data dissemination in a multicast group. Since the performance of a P2P streaming system is dependent on contribution of the group members, free riders is one of the main challenges of such systems...
Recent advances in multimedia software and hardware technologies and the availability of high-speed Internet service have been instrumental for growth in the online gaming industry. Multiple servers distributed across the network are commonly used to provide the desired quality-of-service (QoS) for the network game in order to achieve a higher quality-of-experience (QoE) to the players (clients)....
As protection against the current privacy weaknesses of StateLess Address Auto Configuration (SLAAC) in the Internet Protocol version 6 (IPv6), network administrators may choose to deploy the new Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Similar to the Dynamic Host Configuration Protocol (DHCP) for Internet Protocol version 4 (IPv4), DHCPv6 uses a clientserver model to manage addresses...
In this research dataware and software of client-server system for software reliability indexes evaluation are considered. Client-server section of the software system is meant for centralized storage of data about the tested software product, for command product development support and user provision with powerful computing resources of server stations. To establish platform-independence and flexibility...
Data gathered from sensor networks can easily reach the dimension of millions of data points. While there exists a great variety of sophisticated components for web-based data visualization, efficient and timely data retrieval is a non-trivial problem when dealing with large data sets. In this paper, we present a client-server architecture for a web application that allows a user to interactively...
In this paper we overview the different types of DoS attacks, present recent DoS defense methods as published in technical papers, and propose a novel approach to counter DoS. Based on common defense principles and taking into account the different types of DoS attacks, we survey defense methods and propose a simple-to-integrate DoS victim based defense method which aims at mitigating an attack's...
With the advances in the growth of wireless technologies, the usage of cell phones (i.e.) mobile users and the location based services have been increasing. However the location privacy of an individual user has become the challenging problem in the location based service providers. Here we propose an Anonymity server which is enclosed within an authentication server and a security key generator....
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
Due to the developing of network technology, the increasing size of enterprises, the rising of cloud computing, the monitoring of large scale distributed computing is more and more important. The studies of Distributed Monitoring on resources, programs, services, home and abroad, are lack of user-configurable and run-time management. This paper proposed an ECA rule-based configurable monitor frame...
In this paper, a new proposed method for extracting the syntax differences between different Java code versions is designed and implemented to support CVSs based on optimistic approach. This proposed algorithm relies on converting the codes into XML through Abstract Syntax Tree (AST) algorithm followed by applying a modified difference algorithm using a separate chaining within a hash table to extract...
Parallel program performance analysis plays an important role in exploring parallelism and improving efficiency of parallel programs. A remote interactive parallel program performance analysis tool based on dynamic code instrumentation is designed on the basis of analysis and comparison of existing program performance analysis tools. A hierarchical structure is adopted by this tool which consists...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.