The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To optimize the multimedia proxy server effectively, this paper proposes a gain-based cache replacement policy using the multimedia proxy server gain model. The performance of the proposed gain-based policy is evaluated by simulation experiments. We compare it with some typical cache replacement policies in terms of the improvement on video quality, start-up delay, network resource cost.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
This paper is about the client/server model of security with Bar-coded Identity Cards. Client and server are not just two words put together but it includes a vast range of softwares by having a backbone of client/server database. By making a client/server database we have implemented our project with a new perspective. We have developed a compact and reliable software package for the management information...
The degree to which a cryptographic protocol is susceptible to successful attacks or penetrations cannot be accurately calculated because of the more fine and fast algorithms to break ciphers, being introduced. To deal with the issue, analysis of a cryptographic protocol becomes more vital; and more exhaustive search for vulnerabilities is required. Kerberos is a widely used security protocol for...
With the developing of the marine electrical propulsion system, the requirements on management and operation of the system are more important than ever before. The related simulated training system is applied widely. A general framework of the simulated training system for marine electrical propulsion system is introduced in this paper, which is constructed by five components: model calculating server,...
This paper describes the Web data mining technology, Web data mining process, data sources and uses, designs a personalized recommendation system based on Web use mining for e-commerce, and discusses in detail the function of each module of the system and implementation techniques. Through the mining of the historical log data of Web server, the system can access to the user browsing patterns to provide...
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured...
To run any application we need to first download the setup file/s and then install it on the system License costs, download and installation time costs are very high. Economically, this limits the number of applications that can be accessed on a system. In an organization, the challenges include installing the same application on multiple computers, accommodating multiple versions of the same application...
E-commerce site with interactive features is a business information system, which in the establishment of a virtual network of shopping malls, for personal shopping service to provide fast, so that people can buy their own homes satisfied with the goods. I hope to provide more economical sales channels for businessman. Traditional shopping is no longer suitable for modern people to the pace of shopping,...
Virtualization provides an excellent solution to resolve the portability, maintainability, development, and utilization problems in many system designs. In this paper, we are interested in energy-efficient designs for platform virtualization. In particular, we explore the computing resource mapping and the energy consumption relationship between virtual cores and physical cores when timing constraints...
Modern real-time systems increasingly operate with multiple interactive applications. While these systems often require reliable quality of service (QoS) for the applications, even under heavy workloads, many existing CPU schedulers are not very capable of satisfying such requirements. In this paper, we design and implement an Advanced Interactive and Real-time Scheduler, called AIRS. AIRS is aimed...
Testing and debugging account for at least 30% of the project effort. Scientific advancements in individual activities or their integration may bring significant impacts to the practice of software development. Fault localization is the foremost debugging sub-activity. Any effective integration between testing and debugging should address how well testing and fault localization can be worked together...
A full exploitation of the computational power available in a multi-core platform requires the software to be specified in terms of parallel execution flows. At the same time, modern embedded systems often consist of more parallel applications with timing requirements, concurrently executing on the same platform and sharing common resources. To prevent reciprocal interference among critical activities,...
The numbers of deployed computational servers in datacenters are becoming larger and larger driven by growing processing requirements, which poses a new challenge to software deployment due to the large amount of nodes involved in the deployment process. Consequently, traditional approach software deployment can not scale well because of their time-consumption properties. In order to solve this problem...
Cloud Computing is a paradigm in which data, applications or software are accessed over a network. This network of servers is called as “Cloud”. Using a client such as desktops, entertainment centers, tablet computers, notebooks, wall computers, handhelds etc, users can reach into the cloud for resources as they need them. Cloud computing is on-demand access to virtualized IT resources that are housed...
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model based on information Grid, and focus our discussion on the process of searching and invoking the wanted technologies with mobile agents.
We describe the design and implementation of a secure and robust architectural data management model suitable for cultural environments. Usage and exploitation of the World Wide Web is a critical requirement for a series of administrative tasks such as collecting, managing and distributing valuable cultural and artistic information. This requirement introduces a great number of Internet threats for...
Cloud computing, possibly the most significant new technique in the 21st century, is now bringing enormous impact to the society, especially the business world. It provides services that set clients free from worrying about data processing problems so that they can focus on their major businesses. In this article, characteristics of it will be discussed with several examples, in order to show that...
Virtualization is an effective mean of supporting the new internet architecture research,The ForCES idea of control element and forwarding element separation provide a basis for router virtualization. This paper focus on the research of virtual service application implement base on the ForCES framework, we built a virtual service application architecture based on the ForCES framework in PC, this system...
Password authentication is a widely used entity authentication means nowadays. In password authentication, the server needs to manage a password file containing all user passwords. This poses a tremendous threat to the safety of the passwords: if the server is compromised, all passwords are immediately disclosed. A common countermeasure to this issue of single point of failure is to deploy multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.