The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Home Automation Systems have been continuously evolving in the past few years: some of the systems are focusing their attention on providing remote access and control of the system, while others are more focused on the interconnectivity of the devices and on integrating them into greater systems, like smart cities. In this paper we propose a hierarchical architecture for Home Automation Systems, which...
The distinguishing feature of the Fog Computing (FC) paradigm is that FC spreads communication and computing resources over the wireless access network, so as to provide resource augmentation to resource and energy-limited wireless (possibly mobile) devices. Since FC would lead to substantial reductions in energy consumption and access latency, it will play a key role in the realization of the Fog...
Data assurance and resilience are crucial security issues in cloud-based IoT applications. With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and delivery, effective solutions to protect data integrity and communications between drones and the control system have been in urgent demand to prevent potential vulnerabilities that may cause heavy losses. To secure drone...
All new Microsoft Azure and Bing servers are being deployed with an FPGA that sits both between the server and the data center network and on the PCIe bus. The FPGA is currently being used to accelerate networking on Azure machines and search on Bing machines, but could very quickly and easily be retargeted to other uses as needed. In this talk, I will describe how we decided on this architecture,...
As servers are equipped with more memory modules each with larger capacity, main-memory systems are now the second highest energy-consuming component in big-memory servers and their energy consumption even becomes comparable to processors in some servers. Meanwhile, it is critical for big-memory servers and their main-memory systems to offer high energy efficiency. Prior work exploited mobile LPDDR...
Cloud computing is a broad research area that uses many aspects of software and hardware solutions, including computing and storage resources, application runtimes or complex application functionalities. OpenStack is an open source cloud computing platform having a modular architecture, based on the IaaS (Infrastructure as a Service) model. The aim of this paper is to provide a high-level view of...
The perfect relationship between deployment costs and systems availability is one of the primary goals of companies that wish to provide some computer environment or service through the Internet. The question that everyone wants to know the answer is: How much may I save and still improve the availability of my system avoiding financial losses with an SLA contract breach? This paper attempts to respond...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Smart home user usually controls smart devices through smart application, which is managed by user's account. Thus, compromised account is possible and countermeasure to such attack can help protect both devices and data pertaining to them. In this paper, we propose a security countermeasure in case of compromised account in smart home system by introducing another layer of access control beyond the...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
In the avionic domain, the development trend has moved from federated to integrated architectures, which is called Integrated Modular Avionics (IMA). The ARINC 653 standard defines the execution environment for hosting several avionic software functions within a single computing module using strict temporal and spatial partitioning. ARINC 653 was successfully implemented (e.g., Airbus A380) and achieved...
Edge computing is an increasingly popular paradigm, wherein computation comes closer to the sources of data. A key challenge for edge computing is discovering and utilizing the heterogeneous resources of the vast number of mobile devices at the network edge. Mobile edge devices hide behind private networks, they are mobile and their owners hesitate to share them due to privacy considerations. We propose...
The need for performance has motivated the increasing adoption of solid-state drives (SSD) both in personal computers and data centers. However, the high cost per gigabyte and reduced lifetime hinder the thorough replacement of hard disk drives (HDD) with SSDs. To mitigate these issues, several architectures have been conceived based on hybrid storage systems, but performance and dependability models...
Results of simulation experiments with UAS crews have indicated that the crew had difficulties following rules of engagement and the law of armed conflict when engaging a target with a weapon. Defence Research & Development Canada is developing an intelligent adaptive interface, called the Authority Pathway for Weapon Engagement (APWE), which is a decision aid to support UAS crews in following...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
This paper describes a new architecture for Internet of Things (IoT) devices for extending their functions, by virtualizing their functions and setting them in a fog computing environment. This architecture is based on the cooperation of IoT devices and their extensions deployed on other servers in the fog computing environment via a virtualization method. An implementation example indicates the feasibility...
The rapid growth of data and high-dependency of industries on using data put lots of focus on the computing facilities. Increasing the efficiency and re-architecting the underlying infrastructure of datacenters, has become a major priority. The total cost of owning and running a datacenter (DC) is affected by many parameters, which until recently were ignored as their impact on the business economy...
The increasing heterogeneity of cloud resources, and the increasing diversity of services being deployed in cloud environments are leading to significant increases in the complexities of cloud resource management. This paper presents an architecture to manage heterogeneous resources and to improve service delivery in cloud environments. A loosely-coupled, hierarchical, self-adapting management model,...
Mobile device features such as camera and other sensors are evolving rapidly nowadays. Supported by a reliable communications network, it raises new methods in information retrieval. Mobile devices can capture an image with its camera and pass it to the retrieval systems to get the information needed. This system, called Mobile Content-Based Image Retrieval (MCBIR), generally consists of two parts:...
With the advent of IoT technologies and standards, IoT services has become popular these days. To populate IoT service, collaboration of IoT services on service level is essential. From the viewpoint of application, most of interfaces of existing IoT services are proprietary, which induces vertical silo problem. In this paper, IoT application architecture to access multiple IoT services using fog...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.