The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MapReduce is a popular programming model used to process large amounts of data by exploiting parallelism. Open-source implementations of MapReduce such as Hadoop are generally best suited for large, homogeneous clusters of commodity machines. However, many businesses cannot afford to invest in such infrastructure and others are reluctant to use cloud services due to data security and privacy concerns...
Middleboxes, which implement specific network service functions – e.g. firewalls, load balancers, NATs – have traditionally been deployed as hardware appliances, thereby imposing significant constraints on network operators, who must ensure that the traffic is effectively routed to the appropriate set of middleboxes, following the right order. Being hardware-based, these boxes offer limited upgrade...
This article proposes a modification of the standard Linux scheduler for a support of a reconfigurable heterogeneous multiprocessor system. The standard Linux scheduler is limited to a homogeneous multiprocessor system only. The addition of the processing core with a different feature requires modification of a decision algorithm of the scheduler as a heterogeneous task cannot be executed on any processing...
The underlying operating system of transparent computing system TcOS is booting slowly and is taking up too much memory space. To solve these problems, this paper proposes a method of optimizing the kernel and application layer. It includes recompiling the kernel, modifying the kernel configuration, simplifying services and gnome desktop of the operating system. Experimental results show that the...
This paper presents the possibility to use cheap credit-card sized computer like Beaglebone board for realization of real-time motor control-namely the DC motor speed control based on PI-controller. It describes the design and implementation of software to determine the speed of the motor and feedback control. The software design integrates three modules which were developed as user space applications...
The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service...
In order to detect the security of Android software which isn't installed efficiently and accurately, this paper proposes a new malware detection method based on system calls frequency. Software samples are pretreated by Classification to refine and distinguish characteristics of various types of Android software; Restrictions and normalization are applied to process system call frequency information...
Encryption file system is designed to protect sensitive data stored on storage media. However, file encryption key is normally saved in memory with plaintext in the current known solutions. This brings potential security vulnerability such as the cold boot attack which can steal the file encryption key and in the end the encrypted file can be decrypted by the stolen key. This paper studies the current...
In computing era, a virtual version of a stratagem or resource, such as computer network resources, server, storage device, or a combination of these usually refers as virtualization where the framework segregates the resources into one or more execution instances. A Virtual Machine (VM) created on the host hardware as a software is called a hypervisor or a VM manager. Nowadays, hypervisor based virtualization...
Device drivers are essential components of any operating system (OS). They specify the communication protocol that allows the OS to interact with a device. However, drivers for new devices are usually created for a specific OS version. These drivers often need to be backported to the older versions to allow use of the new device. Backporting is often done manually, and is tedious and error prone....
With explosive growth of Android malware and due to its damage to smart phone users (e.g., stealing user credentials, resource abuse), Android malware detection is one of the cyber security topics that are of great interests. Currently, the most significant line of defense against Android malware is anti-malware software products, such as Norton, Lookout, and Comodo Mobile Security, which mainly use...
Lots of studies have shown that memory hardware error rates are orders of magnitude higher than previously reported. In order to fight with these memory hardware errors, many memory testing tools have been developed, especially software level online memory testers, which means these memory testers implemented in software can work with the OS (operating system) at the same time. However, validation...
Single-ISA heterogeneous multicore processors have gained increasing popularity with the introduction of recent technologies such as ARM big.LITTLE. These processors offer increased energy efficiency through combining low power in-order cores with high performance out-of-order cores. Efficiently exploiting this attractive feature requires careful management so as to meet the demands of targeted applications...
Virtual machines and virtualized hardware have been around for over half a century. The commoditization of the x86 platform and its rapidly growing hardware capabilities have led to recent exponential growth in the use of virtualization both in the enterprise and high performance computing (HPC). The startup time of a virtualized environment is a key performance metric for high performance computing...
Virtualization has become a key technology used in modern data centers. What began as a tool for server consolidation and energy efficiency has grown into an enabler for cloud computing. Cloud computing has become an accepted best practice for data centers. Virtualization is also becoming a key component of embedded and real-time systems in automotive systems, game consoles, and industrial settings...
Today's datacenter is shared among various applications with different QoS requirements, which poses a great challenge to deliver low delay transport with high throughput. Most of works address this challenge by reducing the in-network delay, but assumes a negligible local delay. However, we show that this assumption does not hold for a multi-tenant datacenter that a physical machine is shared by...
In this paper, we use experimental measurements to calibrate and validate a discrete-event simulator for dynamic speed scaling systems. The experimental implementation work iscarried out in an Ubuntu Linux environment using a quad-core 2.3 GHz Intel i7 processor with the Ivy Bridge micro-architecture. Our implementation provides fine-grain user-level control of process execution, and uses the Running-Average...
Traditionally, fieldbus networks are operated in closed environments, where all communication nodes are assumed to be trustworthy. Therefore, the corresponding standards do not consider any security requirements. New technology trends, such as the upcoming Internet of Things (IoT), demand an interconnection between all components of an industrial infrastructure. As a consequence of this, there is...
File system metadata is indispensable in both describing the data and maintaining the file system. Despite the importance of metadata in the file system, the overhead of maintaining the metadata cannot be taken lightly. It is because the metadata also have to be persisted on the storage device and it consumes IO bandwidth as well as creates journaling overhead. In this paper, we find that the random...
The evolution of mobile systems from hardware and software standpoints, and their increased use in our daily life has direct implications on all the sub-systems of a smartphone. The storage sub-system, in particular, has changed deeply over the years (in terms of density, power consumption, functionalities, form factor, throughput, and latency) and has become one of the core systems in a smartphone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.