The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While most microkernel-based systems implement non-essential software components as user space tasks and strictly separate those tasks during runtime, they often rely on a static configuration and composition of their software components to ensure safety and security. In this paper, we extend a microkernel-based system architecture with a Trusted Platform Module (TPM) and propose a verification mechanism...
Personal communication devices are extensively used for mobile computing thanks to ever increasing wireless coverage and processing capability. However, they are constrained in terms of both human interaction (screen size and resolution, keyboard) and lifetime; hence mobile computing often relies on the possibility to migrate applications and communication sessions among several (fixed or mobile)...
A steady increase in the number of cores within many-core platforms causes increasing contentions for the interconnect medium and leads to non-negligible latencies of intercore communication. In order to study the worst-case execution times of applications, it is no longer sufficient to only take into account schedulability requirements, but the communication delays also have to be considered. In...
Cyber-physical systems (CPS) must perform complex algorithms at very high speed to monitor and control complex real-world phenomena. GPU, with a large number of cores and extremely high parallel processing, promises better computation if the data parallelism often found in real-world scenarios of CPS could be exploited. Nevertheless, its performance is limited by the latency incurred when data are...
Multi-core operating systems inherently face the problem of concurrent access to internal kernel state held in shared memory. Previous work on the Sloth real-time kernel proposed to offload the scheduling decisions to the interrupt hardware, thus removing the need for a software scheduler, no state has to be managed in software. While our existing design covers single-core platforms only, we now present...
The Domain Name System belongs to the core services of the Internet infrastructure. Hence, DNS availability and performance is essential for the operation of the Internet and replication and load balancing is used for the root and top level name servers. This paper proposes an architecture for credit based server load balancing (SLB) for DNS. Compared to traditional load balancing algorithms like...
For the information system, Database acts an important role in it. How to find a way to audit the operation of the database is becoming more and more important. An effective database auditing system can not only reduce the potential security risk, also make it possible to trace the source when errors happen. In this paper, we design and implement an effective audit framework. To avoid causing any...
Many wireless sensor network applications require a gateway device to interface with services running on the Internet. Because of the software complexity involved in this device, it is often realized using a real-time operating system running on an application processor. Most systems burden the user with developing the protocol handling and device configuration and management inside the application...
Current technology trends for efficient use of infrastructures dictate that storage converges with computation by placing storage devices, such as NVM-based cards and drives, in the servers themselves. With converged storage the role of the interconnect among servers becomes more important for achieving high I/O throughput. Given that Ethernet is emerging as the dominant technology for datacenters,...
Sniffer tools capture protocol data. Kernel-profiling tools track function calls and events occurring in the kernel. These two types of tools help us observe external and internal behaviors of networking protocols, respectively. We need both types of data for a comprehensive view of protocol behavior. However, none of existing tools performs these two tasks in an integrated way. We developed Kernel...
Programming languages have long incorporated type safety, increasing their level of abstraction and thus aiding programmers. Type safety eliminates whole classes of security-sensitive bugs, replacing the tedious and error-prone search for such bugs in each application with verifying the correctness of the type system. Despite their benefits, these protections often end at the process boundary, that...
Linux kernel contains a full featured CAN bus networking subsystem. It can be accessed from applications via several different interfaces. This paper compares the performance of those interfaces and tries to answer the question, which interface is most suitable for capturing traffic from a big number of CAN buses. Motivation for this work is the development of various CAN traffic analyzers and intrusion...
Host multihoming allows individual hosts to be multiply connected to the network, e.g. by concurrent use of two network prefixes, each network prefix tied to a separate network interface. Such multihoming capability improves the host's ability to implement such features as load-balancing, fail-over and multi-path transport protocols. However, IP does not directly support host multihoming today. The...
Graphics processing units (GPUs) have specialized throughput-oriented memory systems optimized for stream-ing writes with scratchpad memories to capture locality explicitly. Expanding the utility of GPUs beyond graphics encourages designs that simplify programming (e.g., using caches instead of scratchpads) and better support irregular applications with finer-grain synchronization. Our hypothe-sis...
IPv6 was introduced but yet it is not widely used. Research work has been pointed to many directions, specifically, on how to migrate from IPv4 to IPv6, on how to adapt hardware devices to support a transitory period from coexistence between IPv4 and IPv6 to established use of IPv6, and on how should operating systems perform when using IPv6 as compared to IPv4. This work provides a comparative performance...
The paradigm of software-defined networks (SDNs) and one of its enabling technologies, OpenFlow, have been widely welcomed by researchers and practitioners because of their flexibility in networking. Most cloud operators are attracted by the ability to “virtualize” networks at data centers, which is one of the most appealing out of various promising applications. How virtual networking is implemented...
Latency and cost of Internet-based services are driving the proliferation of web-object caching. Memcached, the most broadly deployed web-object caching solution, is a key infrastructure component for many companies that offer services via the Web, such as Amazon, Facebook, Linked In, Twitter, Wikipedia, and YouTube. Its aim is to reduce service latency and improve processing capability on back-end...
Introduction, description the structure and implementation process for WinPcap, then analyzed differences between IPv4 and IPv6 packet header, finally proposed a method to improve the efficiency of capturing packets. Using VC + + 6.0 program experiment implemented IPv6 packets capture and verify that the improved method is efficiency than the traditional method on capture packet.
“Bufferbloat” is the growth in buffer size that has led Internet delays to occasionally exceed the light propagation delay from the Earth to the Moon. Manufacturers have built in large buffers to prevent losses on Wi-Fi, cable and ADSL links. But the combination of some links' limited bandwidth with TCP's tendency to saturate that bandwidth results in excessive queuing delays. In response, new congestion...
Four main challenges (volume, velocity, variety, veracity) have confronted computation algorithm designers in big data mining. Homomorphic cryptosystem with secured multi-party computation of matrix operations has been shown to yield high privacy preserving while data miners perform information retrieval from big data. This research concerns with the computation complexity of the big data with specific...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.