Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Modern DRAM suffers from a new problem called row hammering. The problem is expected to become more severe in future DRAMs mostly due to increased inter-row coupling at advanced technology. In order to address this problem, we present a probabilistically managed table (called PRoHIT) implemented on the DRAM chip. The table keeps track of victim row candidates in a probabilistic way and, in case of...
We present ARCHEx, a framework for cyber-physical system architecture exploration. We formulate the exploration problem as a mapping problem, where “virtual” components are mapped into“real”components from pre-defined libraries to minimize an objective function while guaranteeing that system requirements are satisfied. ARCHEx leverages an extensible set of patterns to enable formal, yet flexible,...
Over the past few years, NAND flash-based Solid State Drives (SSDs) are progressively replacing Hard Disk Drives (HDDs) in various applications ranging from personal computers to large-scale storage servers, due to their high performance and low power consumption. However, SSDs suffer from limited endurance, which is a major concern for their utilization in the server domain. Based on the unique characteristics...
Most architectures are designed to mitigate the usually undesirable phenomenon of device wearout. We take a contrarian view and harness this phenomenon to create hardware security mechanisms that resist attacks by statistically enforcing an upper bound on hardware uses, and consequently attacks. For example, let us assume that a user may log into a smartphone a maximum of 50 times a day for 5 years,...
Reliable federation identity management and efficient user authentication using single-sign-on (SSO) are desirable aspects of InterCloud to achieve inter-operable security objectives. Trust is an important aspect which enhances reliability of federated identity management. Existing service provider-initiated or identity-provider initiated identity sharing models for SSO does not analyse the reliability...
Several data center applications such as Hadoop and OpenStack VM provisioning utilize group communication (one-to-many or many-to-many transfers). Since these applications require reliable and stable delivery, they rely on TCP for all group communications. Even though multicast lends itself naturally to these group communication patterns, it has remained largely under-deployed in the Internet owing...
Flow-Aware Networking (FAN), after a few years of limited interest becomes again a promising concept for the Future Internet. In this paper, we present an integrated approach to ensure efficient and reliable transmission in FAN. The proposed solution is based on the central controller, which enhances an operation of particular mechanisms which compose the integrated system. The key mechanisms of the...
A major challenge for the widespread adoption of phase change memory (PCM) as main memory is its asymmetric write latency. Generally, for a PCM, the latency of a SET operation (i.e., an operation that writes '1') is 2-5 times longer than the latency of a RESET operation (i.e., an operation that writes '0'). For this reason, the average write latency of a PCM system is limited by the high-latency SET...
Due to the elasticity of cloud systems, many researchers have developed ideas to fabricate applications to provide cloud based online education. As cloud systems offer on-demand services, broad network access and resource pooling, the teaching to the students has migrated from classrooms to online cloud systems. Resource provisioning means to provide resources as per the requirement of the application...
Despite being an essential prerequisite at the basis of many applications ranging from surveillance to computational photography, the problem of initial background estimation seems to be marginally investigated. In this paper, we present a reliable CNN-based solution to estimate the initial background (BG) of a scene, given not necessarily a whole sequence but just a small set of frames containing...
The expanding applications of cloud computing has urged the researchers with strong requirements for developing trust management models. It is essential to create trust management system that is adoptable for improving the privacy of the consumers, enabling the service availability, providing security to both cloud service providers and consumers of cloud services. Due to the dynamic cloud environment...
Applications developed to fulfil distributed systems needs have been growing rapidly. Major evolutions have happened beginning with basic architecture relying on initiated request by a client to a processing side referred to as the server. Such architectures were not enough to cope up with the fast ever-increasing number of requests and need to utilize network bandwidth. Mobile agents attempted to...
Distributed communities of researchers rely increasingly on valuable, proprietary, or sensitive datasets. Given the growth of such data, especially in fields new to data-driven research like the social sciences and humanities, coupled with what are often strict and complex data-use agreements, many research communities now require methods that allow secure, scalable and cost-effective storage and...
Different security properties are provided by cryptographic architectures to protect sensitive usage models such as implantable and wearable medical devices and nano-sensor nodes. Nevertheless, the way such algorithms are implemented could undermine the needed security and reliability aims. Unless the reliability of architectures is guaranteed, natural or malicious faults can undermine such objectives...
In today's military environment large quantities of distinct information are available. In a time-constrained environment it is vital to have some way to judge the relative importance of information. Recent research has developed a fuzzy-based system to assign a Value of Information (VoI) determination for individual pieces of information. Subsequent work presented ideas for integrating complementary...
Medical Reports are amongst the most intensive and diverse processes in a Hospital Management Information System. In this paper, we propose an efficient and end-to-end framework for generating investigation test reports. The framework involves a novel template designer for result entry, an structured format for storing result entry template and data into XML suitable for lab reports and Electronic...
With the ever-increasing complexity of both embedded application workloads and multiprocessor platforms grows the demand for efficient mapping heuristics able of allocating several application workloads at runtime. The majority of promoted mapping techniques are bespoke implementations that consider an in-house operating system, which is developed to a particular architecture, restricting its adoption...
Currently, bike-sharing systems undergo a rapid expansion due to technical improvements in the operation combined with an increased environmental and health awareness of people. When it comes to the acceptance of such systems the reliability is of great importance. It depends heavily on the availability of bicycles at the stations. But, in spite of truck-based redistribution efforts by the operators,...
Performing statistical inference on massive data sets may not be computationally feasible using the conventional statistical inference methodology. In particular, there is a need for methods that are scalable to large volume and variability of data. Moreover, veracity of the inference is crucial. Hence, there is a need to produce quantitative information on the statistical correctness of parameter...
In the last decade, NAND flash-based SSDs have been widely adopted for high-end enterprise systems in an attempt to provide a high-performance and reliable storage. However, inferior performance is frequently attained mainly due to the need for Garbage Collection (GC). GC in flash memory is the process of identifying and clearing the blocks of unneeded data to create space for the new data to be allocated...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.