The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present an architecture that increases persistence and reliability of automated infrastructure management in the context of hybrid, cluster-cloud environments. We describe our highly available implementation that builds upon Chef configuration management system and infrastructure-as-a-service cloud resources from Amazon Web Services. We summarize our experience with managing a 20-node Linux cluster...
Flash memory SSD has emerged as a promising storage media and fits naturally as a cache between the system RAM and the disk due to its performance/cost characteristics. Managing such an SSD cache is challenging and traditional cache replacements do not work well because of SSDs asymmetric read/write performances and wearing issues. This paper presents a new cache replacement algorithm referred to...
Broadband Remote Access Servers (BRASes) are crucial middleboxes in DSL access networks, providing the first IP point in the network for subscribers and enforcing operator policies. The number of functions provided by BRASes, combined with the key role they play in the network, means that these devices are expensive, difficult to change, and constitute a single point of failure. In order to overcome...
Communicating systems are today composed of a huge number of distributed processes interoperate with diverse kinds of applications, services and actors. It therefore becomes crucial to monitor and manage these trustworthy interactions. For that purpose, passive testing techniques have been used particularly for checking the system conformance w.r.t. Its standard. Among these studies, trust behaviors...
In Industrial Ethernet environments, usually only small amounts of data are transmitted. These transmissions must be deterministic to meet hard real-time requirements. But prospectively, also the deterministic transmission of high amounts of data and data streams is required. In this paper, a system based on the modified Peer-to-Peer network Kad called HaRTKad combined with the standardized protocol...
The Great East Japan Earthquake caused catastrophic damage to Iwate Prefecture, Miyagi Prefecture, and Fukushima Prefecture. A lot of relief supplies were sent to these stricken areas from all over the country in case of the Great East Japan Earthquake. However, since the relief supplies accumulation hub got confused by management and sorting work of relief supplies, "the relief supplies shortage...
An application distribution management system for “Hybridcast” is proposed in this paper. This system will enable a broadcaster to comprehensively manage Web applications provided by service providers from registration to distribution and enable the operation of any application to be immediately terminated in the event of a problem. This paper describes the details of the proposed system and presents...
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in a smartphone, the cellular data and Wi-Fi interfaces often continue to be used even when the phone is in its idle state in order to accommodate background (necessary or unnecessary) data traffic produced by some applications. In addition,...
Caregiving a person suffering from dementia or loss of brain cognitive ability due to aging is a big physical, mental and emotional burden to family members. In this paper we present a novel system for assisting caregivers at home. The system employs heterogeneous sensing and artificial intelligence technologies to automatically and unobtrusively monitor the patient; assess possible risks that the...
Resource management in distributed environments, such as Cloud virtualized networks, is one of the main concerns of infrastructure providers. Despite the many advantages of centralized solutions, their unique point of failure and the lack of scalability make us consider the use of distributed and autonomic solutions. Beyond this, centralized solutions would be inefficient to deal with dynamic and...
Present NoSQL databases are passive entities, where users proactively access the databases serving requested issued by users. While NoSQL databases are scalable due to their horizontal scale-out designs, data items stored in potentially very large databases are difficult to retrieve in terms of access delay, programmability and usability. In this paper, we advocate supporting events in NoSQL. By introducing...
Traffic localisation is an important aspect of traffic management on the Internet. The caching of content and its distribution from localised servers is one mechanism that enables traffic localisation and reduces transit costs for network providers while enhancing service performance. However, personalized, dynamic user content is often un-cacheable due to its nature. As we move towards a world of...
Despite research spanning more than a decade in the area of Web services, the industry has not yet seen a consensus regarding an effective method for the provisioning of Web services. In recent years, a new paradigm for implementing Web services based on Representational State Transfer, the successful architectural foundation of the Web, has seen greater interest in the industry. We had previously...
One of the latest trends of realizing innovative Command and Control (C&C) channels involves leveraging Online Social Networks (OSNs) as a C&C channel. The number of botnets targeting the smartphones and the sophistication of those botnets have progressively increased. Due to their mobility, smartphones connect to a variety of networks which makes it harder for network centric detection of...
Augmented-reality (AR) interfaces are receiving growing attention due to their versatility and usefulness in numerous application areas. In this paper, we tackle the problem of environmental awareness in consumers at the time of purchase: we design, implement, and evaluate a novel interface for overlaying product ecological information in the consumer's field of vision. The identification of the product...
The paper presents application of SIP protocol in the context of bag-of-tasks grid architecture. The SIP protocol has been used in realization of the execution management service. The main idea is use of stateful SIP proxy as request broker. The paper provides description of the concept, and the prototype system that has been built, as well as calculation of estimated performance level and it's relation...
Over the last few years, MapReduce systems has become popular for processing large-scale data sets and are increasingly being used in web indexing, data mining, and machine learning. Unlike simple application scenarios such as word count, many applications of MapReduce exhibit strong skewed access patterns in real production environment, the data access is non-uniform, often only a small portion of...
In this paper, we present Vehicle Station Gateway (VSG) and Unified Gateway Protocol (UGP) for accessing vehicle bus data from smart car applications. They have been proposed and discussed as part of the ISO Standard Projects in ISO TC204 & TC22. We evaluate the feasibility of these approaches with a prototype implementation of vehicle trouble diagnosis and vehicle body network control applications...
Security of sensitive data in the cloud is a critical issue as they can easily be transferred between different locations and then violate some constraints such as country-based regulations. There is notably a specific need to control the path followed by the data when they are transferred within the cloud. This paper is then presenting a new approach using OpenFlow and allowing to enforce in the...
Security domains partition military Communications and Information Systems (CIS) to enable the handling of data payloads at different confidentiality levels. Information exchange between security domains is in most cases extremely restrictive or even entirely prohibited. While this protection principle holds for user traffic, it significantly hinders the unified management of networks and IT systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.