The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The drastic increase in the commodity computer and network performance for the last generation has a resultant of faster hardware and more sophisticated software. But, the supercomputers of the current generation are still incapable of solving the current problems in the field of science, engineering, and business. This problems arises as a single machine cannot facilitate the availability of various...
Push technology has become an essential part of many web applications that require near real-time notification. The Hypertext Transfer Protocol (HTTP) is widely used for exchanging information between clients and servers. The growth of the Internet of Things (IoT) and the expansion/penetration of Internet access to new areas have resulted in the ever-rapidly increasing number of Internet users. Consequently,...
Tomorrow's immersive applications will leverage Mixed Reality interfaces accessing a multitude of services from distributed clouds. They will face extreme latency constraints, massive datasets, spontaneous collaboration, and constant service churn. This paper outlines our experience evolving an application designed to support collaborative work in Urban Design (UD) practices. The application, UD Co-Spaces,...
With the rapid development of cloud computing and emerging services, traffic in data center network is experiencing an explosive growth, which has brought a great challenge to the existing electrical data center networks. In order to take full advantage of the large bandwidth of optical interconnects, the optical and electrical hybrid data center network is proposed. However, there are still some...
The continuous evolution of mobile networks is demanding and promising. The increase in mobile population, the introduction of new applications and use cases which represents a major shift in the paradigm from voice to data especially with the adoption of the IP network from the internet in the mobile networks. This has imposed challenges in current architecture of mobile networks in terms of backhaul...
In this paper we address the issue of connecting abstract task definitions at a mission level with control functionalities for the purpose of performing autonomous robotic missions using multiple heterogenous platforms. The heterogeneity is handled by the use of a common vocabulary which consists of parametrized tasks such as fly-to, take-off, scan-area, or land. Each of the platforms participating...
Distributed Denial of Service (DDoS) attacks represent major risks for the current cloud computing architecture. The rate of DDoS attacks in cloud is growing because of the essential characteristics of cloud computing. In this paper, we propose to use Software Defined Network (SDN) architecture and Fast Entropy approach in order to secure cloud computing environment from DDoS attacks in real time...
Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network...
To address the risk of location privacy disclosure in location-based services (LBSs), existing solutions generally introduce a single trusted anonymizer between the users and the location service provider (LSP). However, a single anonymizer offers limited privacy guarantees and incurs high communication overhead in continuous LBSs. Once the anonymizer is compromised, it may put the user information...
The problem of the discovery and marketing of new drugs can be vastly accelerated through High Performance Computing (HPC), molecular modeling techniques, and more specifically by means of the techniques commonly named as computational drug discovery (CDD) and in silico high throughput screening. These techniques usually assume a unique interaction site (active site) between potential drugs and a...
Finding an appropriate resource to host the next application to be deployed in a Cloud environment can be a non-trivial task. To deliver the appropriate level of service, the functional requirements of the application must be met. Ideally, this process involves filtering the best resource from a number of possible candidates, whilst simultaneously satisfying multiple objectives. If timely responses...
The proliferation of big data and big computing boosted the adoption of machine learning across many application domains. Several distributed machine learning platforms emerged recently. We investigate the architectural design of these distributed machine learning platforms, as the design decisions inevitably affect the performance, scalability, and availability of those platforms. We study Spark...
Edge computing enables application services to leverage low-latency responses, e.g., for augmented reality. Infrastructure-as-a-service for edge computing (EC-IaaS) allows multiple application service providers (ASPs) to use a virtualized resource (i.e., virtual machines (VMs) and virtual networks) for various applications services on the common edge computing infrastructure. For ASPs, the proximity...
In this research, I want to investigate programming language and middleware abstractions which offer an alternative approach in client/server Web application development, for dealing specifically with coordination between client and server components that has flexibility in mapping components to physical locations. I work on a middleware and JavaScript interpreter that provides support for modular...
The problem of securely storing and processing a hierarchy of sensitive data is of paramount importance in many sectors, like Defense or Critical Infrastructures, just to name a few. Since years Industry and Academia have been involved in researches focused on multilevel security, formal languages, and new platform modeling frameworks. The Multiple Independent Levels of Security/Safety is a new paradigm...
PCIe bus is widely applied because of its high-bandwidth, high reliability and low cost characteristic. Research on PCIe root complex architecture based on FPGA begin to receive attentions. However, current methods are usually expensive, code closure and poor flexibility. A new open source PCIe root system architecture based on Xilinx SOPC platform is proposed in this paper. The system is mainly composed...
We describe low end-to-end latencies of 6.69 ms in the 5G CHARISMA network, that has been optimised for both device and system technologies speed, as well as with its virtualised, hierarchical and distributed, edge-centric architecture, that processes data as near as possible to their source and destination. Such an ultra-high speed 5G network can be utilised in intelligent transport system (ITS)...
With the continuous development of Vehicular Ad-hoc Network and Cloud Computing, the concept of Autonomous Vehicular Cloud has emerged. In the highway scenario, Autonomous Vehicular Cloud has high dynamic and mobility and the node resources can be used for a short time, which brings great challenges to the use of resources. In order to improve the efficiency of computing resources, the introduction...
Different information visualization techniques can be found in the literature due to the quantity and variety of data stored in computational systems. In this context, the classification of chart images becomes important because it allows various types of graphs to be detected automatically in different contexts, allowing a more specific processing for each type of visualization, for example, data...
The rapid development of intelligent terminals and mobile Internet industry has brought many challenges and opportunities to the mobile network. Mobile Network Open Services can provide users and developers with the open resources consisted of network infrastructure, network data and diversified services, so as to build an open, flexible, collaborative Internet ecosystem. The ability to open the mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.