The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices have been helping to empower underserved communities around the world. From bringing information on health and farming to substituting expensive devices, cellular phones and apps have proved to be powerful tools in poverty alleviation and disaster relief. The Mobile Lab at Santa Clara University focuses on developing mobile solutions for social benefit and, in this paper, we describe...
The current IoT ecosystem is Cloud centric which can not handle a diverse set of IoT applications and services, especially those demanding real time response. This paper proposes an Edge Computing (EC) architecture that provides an intermediate computing layer for IoT data. The proposed architecture utilizes Virtual IoT Devices (VID) for local data processing, management of physical IoT devices and...
We present an analysis of how to determine security requirements for software that controls routing decisions in the distribution of discrete physical goods. Requirements are derived from stakeholder interests and threat scenarios. Three deployment scenarios are discussed: cloud and hybrid deployment as well as on-premise installation for legacy sites.
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
Economic Denial of Sustainability (EDoS) attacks have been threatening cloud consumers' financial viability due to the “pay-as-you-go” cloud resource charging scheme. EDoS attackers can take advantage of this pricing scheme to fraudulently consume the billable cloud resources from the cloud consumers and thus, drive up the cloud consumers' financial cost and eventually disrupt their economic sustainability...
The pervasiveness and significance of software have upset its subordinate role in the original software-hardware relationship. Software has become a main factor for defining and differentiating various “things”. This has led to a new emerging technology trend called Software-defined Anything (SDx), where a system's functionality and diversity are largely characterized by its software. SDx technologies...
Telehealth relies on the ability of Information and Communication Technology (ICT) to maximize the quality of care provided remotely. Remote Patient Monitoring (RPM) is a key part within telehealth that enables patient to use devices to measure vital signs and sends it to a healthcare professional. Patients usually have multiple devices to measure vital signs. Those devices might be manufactured by...
Mobile medical applications are increasingly being used by patients and consumers. However, due to their complexity, these applications are normally only accessible to smartphone users. People using low-end cellphones cannot benefit from this new technology. The goal of this paper is to expand health service platform to lower-end cellphones, so that people in underdeveloped regions can benefit from...
Network Function Virtualization is an emerging paradigm to allow the creation, at software level, of complex network services by composing simpler ones. However, this paradigm shift exposes network services to faults and bottlenecks in the complex software virtualization infrastructure they rely on. Thus, NFV services require effective anomaly detection systems to detect the occurrence of network...
The Internet of Things (IoT) describes the emerging paradigm that connects sensors, often located at the edge of the network, to stream processing engines located at the core of the network to enable online data-driven monitoring, management, and control. As IoT applications require increasing volumes of streaming data to be processed by complex workflows in a timely manner, it is becoming important...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
Live VM migration is a technique that consists of a selection process and a migration process to migrate a VM from one host to another in the same data center without changing the IP address, or in a different data center with necessity to the VM to get a new IP address. The changing of IP address results into a mobility problem, which may render the service unreachable. In this paper, we propose...
A novel mobility-aware and energy-efficient coded caching provisioning strategy, Mobee, is proposed for a Cloud Radio Access Network (C-RAN). The placement of the Maximum-Distance Separable (MDS) encoded content at the Base Stations (BSs) is optimized to minimize the total energy consumption of the network comprising the transport and the caching energy consumptions. To account for user mobility,...
Current Distributed Radio Access Networks (DRANs), which are characterized by a static configuration and deployment of Base Stations (BSs), have exposed their limitations in handling the temporal and geographical fluctuations of capacity demands. At the same time, each BS's spectrum and computing resources are only used by the active users in the cell range, causing idle BSs in some areas/times and...
Over the past years, the worldwide population, especially in developed countries, faces a new issue: the ageing of the population. In developed countries, special attention is paid to monitoring and providing medical services to the elderly. In EU, the number of persons dealing with cardiovascular diseases is increasing. The number of persons needing special medical services depends on the economic...
This paper presents a high level model to describe bag of tasks (BoT) applications and a framework to evaluate user level approaches to scheduler BoTs on coarser works units. The scheduler consolidates the load of the tasks in a given number of virtual machines (VMs) providing the estimated makespan. The framework allows to change the policy of tasks selection in order to compare the length of the...
At the beginning, there is overview of three basic Cloud Computing services — SaaS, PaaS and laaS. There is a definition of these services review, advantages and their security problems and effects. Next part tells about portability problems of each service, mainly the IaaS service, which has the most interoperability and portability problems.
A cloud platform records a wealth of information regarding program execution. Most cloud service providers offer dashboard monitoring tools that visualize resource usage and billing information, and support debugging. In this paper, we present a tool that visualizes cloud execution logs for a different goal — to facilitate program understanding and generate documentations for an application using...
As the cloud computing technique provides a great chance for promoting English teaching quality, in this paper, we aim to construct English writing teaching system by fully exploiting the intelligent cloud service platform. Cloud computing platform contains computer clusters and exploits distributed computation and virtualization technologies to integrate hardware and software into a unified resource...
With the technology improvements, managing a large amount of multimedia objects such as audio, video, picture or a combination of these has become possible. Multimedia data needs more real time storage and high data transfer than traditional textual and numeric data. In addition to these requirements, significant amount of computation is demanded for multimedia applications to serve many users at...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.