The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is increasingly becoming a significant solution for providing scalable computing resources via Internet [1]. However, as the increasing of data size in cloud computing applications and precision requirement in some special scenarios, bandwidth and precision are highly valued in floating-point associated applications, optimizing existing floating-point arithmetic is a significant way...
Cloud computing is the universal area where the data owners will outsource their relevant data to the untrusted public cloud, which allows the data users to retrieve the data with full integrity. To provide data privacy and integrity, most of the research works were focused under single data owner for secure searching of encrypted data over the cloud. Provided, various cloud service providers in day...
Computer science solutions for molecular biology problems are often presented in the form of workflows. There is a set of activities performed by different processing entities through managed tasks. Knowledge about the data trajectory throughout a given workflow enables reproducibility by data provenance. In order to reproduce an in silico bioinformatics experiment one must consider other aspects...
The diversity of the available protein search engines with respect to the utilized matching algorithms, the low overlap ratios among their results and the disparity of their coverage encourage the community of proteomics to utilize ensemble solutions of different search engines. The advancing in cloud computing technology and the availability of distributed processing clusters can also provide support...
In the age of Internet of Things (IoT), sensors form a foundational component of IoT services, yet they are rigid with little capability for programmable configuration or reusability as they are application-specific, manufacturer-specific. Emerging IoT applications often deploy a vast number of sensors which may serve multiple applications. Programmability is thus essential but not found in legacy...
Low latency is critical for delay-sensitive applications such as video surveillance, live streaming, and online data analytics. Fog computing enables the emergence of the latency-sensitive internet of things (IoT) network to support real-time applications. While the distance between sensing and processing is minimized in the fog network, the cross-fog latency is yet to be determined. In this paper,...
Virtual data centers (VDCs) are among competitive advantages offered to businesses by cloud computing. Through VDCs, organizations can use a pool of on-demand virtual infrastructures in the form of a data center without paying the up-front costs of an actual data center. With the advent of software-defined networks (SDNs), it is now possible to provide the VDC's tenants with overlay SDNs to cover...
Testing large complex distributed applications in cloud environments is a complex task. Developing tests to assess these kind of applications is time-consuming, and requires adapting and integrating many different tools for different purposes. The main objective of this demonstration is two-folded. First, it introduces ElasTest, a flexible open source testing platform aimed at simplifying end-to-end...
This paper discusses the open issues in incorporating trust techniques in the NFV environment specified by the ETSI NFV Industry Specification Group, and analyses the available technologies to fill this gap. ETSI is developing security and trust specifications within its NFV-SEC working group, with the aim of establishing and assessing trust of both the hardware platform and the virtualised infrastructure...
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the...
A modern web service or the Internet of Things (IoT) based service is composed of various loosely-coupled service components, called microservices, running on the cloud resource. It enables that the number of active servers be adjusted following the load fluctuation, so an efficient cloud resource allocation is required. This situation is modeled as variable-sized dynamic bin packing problem where...
With the steady increase of offered cloud storage services, they became a popular alternative to local storage systems. Beside several benefits, the usage of cloud storage services can offer, they have also some downsides like potential vendor lock-in or unavailability. Different pricing models, storage technologies and changing storage requirements are further complicating the selection of the best...
Cloud computing technology is gaining rapid growth in popularity. Mostly it is web based service and some private modules are built on intranet or virtual private network. Network security is a major concern for both cloud users and hosts of data centers. In addition to this, clients are also concerned about the infrastructure and service quality offered by cloud service providers. Cloud service providers...
This work proposes a parallel cloud-to-cloud data transfer method in which intermediate nodes are spawned and utilized in order to increase the transfer throughput by aggregating bandwidth. Existing data transfer methods do not take advantage of public cloud elasticity — the maximum throughput is limited by the available bandwidth of the source or/and destination transfer node. In this paper, a technique...
Although Fog computing specifies a scalable architecture for computation, communication and storage, there is still a demand for better Quality of Service (QoS), especially for agile mobile services. Both industry and academia have been working on novel and efficient mechanisms for QoS provisioning in Fog computing. This paper presents a classification of services according to their QoS requirements...
One of the considerable use cases for network functions virtualization (NFV) is the IP multimedia subsystem (IMS). With the emergence of software defined network (SDN) and NFV, the mobile network operators (MNOs) that are deploying the IMS look to make a gain from these leading technologies to mitigate hardware costs and reduce time to market. With the use especially of the NFV approach, the MNO looks...
Modern software applications are increasingly deployed and distributed on infrastructures in the Cloud, and then offered as a service. Before the deployment process happens, these applications are being manually - or with some predefined scripts - composed from various smaller interdependent components. With the increase in demand for, and complexity of applications, the composition process becomes...
This paper reviews recent advances in high speed short reach optical interconnects for Datacom links from the perspective of Ethernet applications, fiber development and system experiments based on the multimode-VCSEL paradigm.
In order to improve the safety of the operation of the hydrogen-cooled generator and ensure the stable operation parameters of the hydrogen as the cooling medium, this paper presents a low-cost and high-performance hydrogen quality monitoring system for the hydrogen-cooled generator with ARM microprocessor as the core. The system consists of a data terminal system and a cloud monitoring platform system...
In this paper, we report on a proof-of-concept wearable prototype, called iSeiz, that can detect specific seizure activity, namely generalized tonic-clonic, in epilepsy patients. We first describe the high-level architecture of iSeiz, and then elaborate on its hardware and software features, including its robust and low-computational intensive real-time seizure detection algorithm (SDA), as well as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.