The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile crowdsourcing has received considerable attention as it enables people to collect and share large volume of data through their mobile devices. Since the accuracy of the collected data is usually hard to ensure, researchers have proposed techniques to identify truth from noisy data by inferring and utilizing the reliability of users, and allocate tasks to users with higher reliability. However,...
Cloud datacenters must ensure high availability for the hosted applications and failures can be the bane of datacenter operators. Understanding the what, when and why of failures can help tremendously to mitigate their occurrence and impact. Failures can, however, depend on numerous spatial and temporal factors spanning hardware, workloads, support facilities, and even the environment. One has to...
The Internet of Things (IoT) paradigm describes a vision where different heterogeneous physical objects like cell phones, computers, sensors, cars, refrigerators, kitchen appliances, TVs, smart homes are connected over the Internet in a global network. Such an immense network of interconnected objects will raise some new dependability and security challenges. In this paper, we propose a way to address...
Conventional flow-monitoring methods, such as sFlow, cannot detect low-rate HTTP GET Flooding denial of service (DoS) attacks, which are a threat even if the traffic rate is low. To solve this problem, we propose a method for detecting DoS attacks on the basis of the burst-state duration of traffic calculated using a quick packet-matching function of a general router such as TCAM. In addition, we...
The integration of cloud computing and Internet of Things (loT) is quickly becoming the key enabler for the digital transformation of the healthcare industry by offering comprehensive improvements in patient engagements, productivity and risk mitigation. This paradigm shift, while bringing numerous benefits and new opportunities to healthcare organizations, has raised a lot of security and privacy...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candidate to realize lightweight and robust device authentication in Internet of Things applications. Unfortunately, it is particularly difficult to attain highly reliable responses and increase its modeling attack resistance simultaneously. This paper presents an approach to reduce the vulnerability of...
A system to control the data flow between detector sensors input streams for the data connected with a single event is elaborated. Obtained results show that a High Performance Computing cluster data exchange can be efficient AND fault-tolerant.
In this paper we consider the structure of a multifunctional radio receiving center. We talk about the issues of narrowband signals performance and reliability and the spectral mapping storage subsystem. The article presents two methods of reducing the volume of the data recorded and broadcast through the network. We have described the algorithm of the digital signal data packaging and have identified...
Nowadays we have a project of a high-performance parallel encrypted database on a cluster platform that will work with large volumes of data. For the smooth operation of the system, a reliable and high-speed data replication mechanism is required which should satisfy certain criteria of PostgreSQL DBMS and the mentioned project. In this article we consider the very essence of data replication, replication...
Device-to-Device (D2D) communication has emerged as a new technology, which minimizes data transmission in radio access networks by leveraging direct interaction between nearby mobile devices. D2D communication has a great potential in solving the capacity bottleneck problem of cellular networks by offloading cellular traffic of proximity-based applications to D2D links. This provides several benefits...
Nowadays, Machine-to-Machine (M2M) and Internet of Things (IoT) traffic rate is increasing at a fast pace. The use of satellites is expected to play a large role in delivering such a traffic. In this work, we investigate the use of two of the most common M2M/IoT protocols stacks on a satellite Random Access (RA) channel, based on DVB-RCS2 standard. The metric under consideration is the completion...
Data accountability can record and track data usage in cloud storage, in order to cope with users' fear of losing control of their own data or even data leakage. However, logs recording unauthorized data access could be omitted or falsified in untrusted cloud storage, which is the critical factor of unreliable data accountability. To address this problem, in this paper, we propose a novel Cloud Data...
Methods of expert assessment are considered. Key problems of expert evaluating are listed. Model of automatic expert system is introduced. Method of aggregation of heterogeneous expert assessment is proposed.
In this paper we propose a new infrastructure of storage overlay networks (SONs) that connect several distributed Internet nodes into an overlay network to provide in-network, aggregated storage. A SON node can encode, recode, and decode data on purpose. The SON improves information availability and security with erasure coding, and improves network efficiency by re-encoding received information....
Kaleido is a novel data system for multi-device synchronization. According to the theories of conflict-free replicated data types, Kaleido enables clients to synchronize replicated data types with operations, and gurantees high availability and eventual consistency. Implemented as a back-end as a service, Kaleido server is scalable so as to deal with a huge amount of requests from massive clients...
In this paper, we design a game theoretical framework for improving the Quality of Service (QoS) in cooperative RAN caching. Considering the cooperation under both single cell transmission and joint transmission, the QoS metric is uniformly quantified as the total content delivery time. Although the formulated cooperative content placement problem is proved NP-hard, noticing the local cooperative...
Customers often suffer from the variability of data access time in cloud storage service, caused by network congestion, load dynamics, etc. One solution to guarantee a reliable latency-sensitive service is to issue requests with multiple download/upload sessions, accessing the required data (replicas) stored in one or more servers. In order to minimize storage costs, how to optimally allocate data...
General aspects regarding software quality are discussed. Bayesian networks mathematical model is proposed to evaluate the software quality, from the reliability point of view. This model was previously used to evaluate a substation monitoring software system developed in Romania as case study. Currently, we extend it to evaluate the reliability of a software system for EMS (Energy Management Systems)...
By processing sensory data in the vicinity of its generation, edge computing reduces latency, improves responsiveness, and saves network bandwidth in data-intensive applications. However, existing edge computing solutions operate under the assumption that the edge infrastructure will comprise a set of pre-deployed, custom-configured computing devices, connected by a reliable local network. Although...
Completely independent spanning trees (CISTs) are important construct which can be used in data center networks for multi-node broadcasting, one-to-all broadcasting, reliable broadcasting, and secure message distribution, etc. As a recently proposed server-centric data center network, BCube has many good properties. By focusing on the connections between servers, we define the logic graph of BCube...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.