The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although crowdsourcing can provide a large amount of information through mobile devices and mobile users, the information provided by them may be inaccurate. Various truth analysis techniques have been proposed to identify truth from the noisy data either in a heuristic manner or using statistical models. However, if the available data are limited or have large conflicts, it is difficult to identify...
In nowadays cloud computing systems, leveraging the virtualization technology, the customer's requested data computing or storing service is accommodated by a set of mutual-communicated Virtual Machines (VM) in a scalable and elastic manner. These VMs are placed in one or more datacenter nodes according to nodes' capacities, failure probabilities, etc. The VM placement availability refers to the probability...
High reliability is required in networks, and it is important to build robust networks that are tolerant to network failures. In content delivery services in particular, service interruptions due to disconnection of communication paths between the server and nodes that receive the service must be avoided. Content delivery services use a master server that contains the original content and multiple...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
Software evolution is a well-established research area, but not in the area of web systems/applications. Web projects are normally more complex than other software development projects because they have both server and client code, encompass a variety of programming languages, and are multidisciplinary. We aim to produce a catalog of web smells to help avoiding the problems in web development code...
The Memento protocol makes it easy to build a uniform lookup service to aggregate the holdings of web archives. However, there is a lack of tools to utilize this capability in archiving applications and research projects. We created MemGator, an open source, easy to use, portable, concurrent, cross-platform, and self-documented Memento aggregator CLI and server tool written in Go. MemGator implements...
Recent years have witnessed the explosion of the data universe. Facing the rapid growth of the data size, cloud storage is proposed as an approach to provide cost-efficient and reliable data storage service. As data size grows, data centers providing cloud storage service need more storage resources to meet the ever-increasing requirements. Data deduplication is a technology aiming to remove redundant...
With the advancement of sensor-embedded mobile electronic devices, participatory sensing has attracted more and more attention because it can collect data, analyze information and outsource tasks to those devices' users. However, range query results obtained at the requesters and dissemination data produced at the providers are usually sensitive and private to be disclosed, e.g., users' locations,...
For data center networks (DCNs), it is very important to perform multicast transmission reliably. However, due to packet loss in DCNs, not only the reliability of data transmission should be guaranteed, but also the network throughput should be maintained stably. To this end, in this paper, we design a multicast fat-tree data restoration strategy (MRDC). The advantage of MRDC is that it can haul back...
The new face of networking is growing in the named data networking (NDN). It differs from traditional way in requesting in which request and data packet is delivered with the help of content identification and not the IP addresses of server and client. By using this trend we can apply more security to the clients because there will be no IP addresses available which will help to hide the identity...
Aimed at the needs of positioning management for important equipments at the police department, we design and implement a positioning management system based on Radio Frequency Identification, micro-controller, satellite navigation module and the network module. We present the design of the hardware circuit, the software flow chart and software interface. We also verify the accuracy and reliability...
Day by day in India we are moving towards technologies so everything started becoming advance. The proposal of smart cities in India has already came which include better way of urbanization. Smart meters are the key component in smart cities. Here we are going to discuss about how smart meters will be helpful in making our energy consumption as well as metering system smart. Concepts of smart cities...
We present a platform that enables a service drone to guarantee reliability for mission completion and to update an application while in flight, using a robot operating system (ROS). The ROS is a flexible framework for writing robot software. It is a collection of tools, libraries, and conventions that aim to simplify the task of creating complex and robust robot behavior across a wide variety of...
Mobile cloud computing has dual benefits that includes cloud computing and mobile computing. In mobile cloud computing data storage and data processing take place outside the mobile device. As a result, there is a high chance of security attack. The security even becomes more critical when mobile phone is initiating the handoff during handover management process. Thus, the attacker may easily get...
Social media sharing is one of the most popular social interactions in online social networks (OSNs). Due to the diverse networking conditions and various privacy requirements of OSN users, scalable media sharing has become a promising paradigm. It allows a media data distributor to share a media content of different qualities with different data consumers. To guarantee user privacy in scalable media...
IEEE 802.11-based wireless LAN, commonly referred to as Wi-Fi, has become a universal solution for the last-hop network access. In large and public assembly places, people may use their mobile devices to view the video of the same popular events via the same wireless access points (APs). However, current 802.11 APs transmit the same video stream multiple times via separate unicast sessions due to...
It is a challenge to improve utilization of physical resources when allocating resources for virtual data centers (VDCs). In this work we proposed two reliability-aware VDC embedding methods NMP and NMPD. To reduce embedding cost, the proposals try to split VMs into clusters based on topological potential and modularity and assign each cluster to a server. Via simulations, we show that NMP can accept...
In this paper, we take a close look to understand the cloud-based file synchronization and collaboration systems. Using the popular Dropbox as a case study, our measurement reveals its cascaded computation and communication operations that are far more complicated than those in conventional file hosting. We show that this serial design is necessary for the cloud deployment, which effectively avoids...
Cloud computing provides everything like a service, with the aim of offering an infrastructure and an active application platform, which is scalable and efficient in terms of cost for customers. Cloud services are quite abstract without a set of well-defined characteristics and according to user requirements, there are several solutions available on the market of Cloud computing.
We have developed a prototype for a cost-aware, cloud-based content delivery network (CDN) suitable for a federated cloud scenario. The virtual CDN controller spawns and releases virtual caching proxies according to variations in user demand. A cost-based heuristic algorithm is used for selecting data centers where proxies are spawned. The functionality and performance of our virtual CDN prototype...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.