The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LocalMaxs extracts relevant multiword terms based on their cohesion but is computationally intensive, a critical issue for very large natural language corpora. The corpus properties concerning n-gram distribution determine the algorithm complexity and were empirically analyzed for corpora up to 982 million words. A parallel LocalMaxs implementation exhibits almost linear relative efficiency, speedup,...
World of computing is witnessing an immense growth in all aspects. Increased usage of internet for communication and the growth of Social Networking led to the invention of NoSQL database technologies capable of handling large amount of structured or unstructured data. Apache Cassandra is such an open source distributed data management system designed to handle large amount of data and is now being...
4G/3G Networks have been widely deployed around the world to provide high wireless bandwidth for mobile users. However, the achievable 3G/4G bandwidth is still much lower than their theoretic maximum. Signal strengths and available backhaul capacities may vary significantly at different locations and times, often leading to unsatisfactory performance. Band-width aggregation, which uses multiple interfaces...
Collective I/O is a parallel I/O technique designed to deliver high performance data access to scientific applications running on high-end computing clusters. In collective I/O, write performance is highly dependent upon the storage system response time and limited by the slowest writer. The storage system response time in conjunction with the need for global synchronisation, required during every...
Data with vastly different access characteristics is efficiently stored in multi-tiered storage systems. A cost-effective way to retain large volumes of infrequently accessed data is to store it on tape. Steady developments in tape technology deliver ever increasing storage capacities at low cost. This has established tape as a viable solution to cope with the extreme data growth in the context of...
Signaling related attacks, such as the signaling storms, threaten the stability of mobile networks and are a frequent cause of multiple service degradations and even several network outages. This paper proposes a performance evaluation approach to the problem using techniques from probability theory, in general Markov Chains and queueing networks. It proposes a model of a mobile network under signaling...
The proliferation of the big data analysis and thewide spread usage of public/private cloud services make itimportant to expand the storage capacity as the demand isincreased. The scale-out storage is gaining more attention sinceit can inherently provide scalable storage capacity. The flashSSD, on the other hand, is getting popular as the drop-inreplacement of the slow HDD, which seems to boost the...
Botnets have fully integrated and adapted in mobile devices. Security of mobile devices are not designed to detect threats such as botnets. This allows botnets to infect devices and go unnoticed. In this paper we propose an enhanced botnet detection technique called “Logdog” for mobile devices using log analysis. Our approach relies on analyzing logs of mobile devices to find evidence of botnet activities...
In the latest years, we observed an exponential growth of the market of the mobile devices. In this scenario, it assumes a particular relevance the rate at which mobile devices are replaced. According to the International Telecommunicaton Union in fact, smart-phone owners replace their device every 20 months, on average. The side effect of this trend is to deal with the disposal of an increasing amount...
Although OSNs are major and growing large scale web applications, there is still a lack of workload models and tools for performance evaluation and testability studies. This fact motivates us to develop a general purpose benchmark for evaluating the main hardware and software resources associated to this kind of applications. To this end, we have developed a flexible workload model based on interactive...
As product of the combination of Internet technology and sensor network, Internet of things (IoT) greatly facilitates the mutual interaction of the information world and physical world. Furthermore, with the rapid development of modern transportation systems, as a typical successful application of IoT in the real life, intelligent traffic system (ITS) has a great significance on management of the...
This scheme is a method for controlling functionality of a mobile device. The operation of the element function of the mobile device is blocked by a blocking code, and the operation of the blocked element function is unblocked by an unblocking code. The blocking code is a code used to block the operation of the element function of the mobile device in an area in which a user is located, and the unblocking...
Parallel file systems are important infrastructures for both cloud and high performance computing. The performance of metadata operations is critical to achieve high scalability in parallel file systems. Nevertheless, traditional parallel file systems are lack of scalable metadata service. To alleviate these problems, some previous research distributes metadata to separated large-scale clusters and...
Distributed storage systems play an increasingly critical role in data centers to meet the ever-increasing data growth demand. Heterogeneous storage systems, with the coexistence of hard disk drives (HDDs) and solid state drives (SSDs), can be an attractive distributed store solution due to the balanced performance, large capacity, and economic cost. The consistent hashing distribution algorithm that...
Smart mobile devices have become ubiquitous, and people prefer to choose smartphone in daily life rather than use traditional personal computer. However, due to the hardware capability, performance of smartphones varies greatly and sometimes it cannot meet the demand of users. Furthermore, if smartphone is attacked by malicious application, the local private sensitive information will be leaked which...
Although cloud computing has made significant achievement, it still faces many challenges, such as slow interactive performance and unsatisfying user experience over a long-haul wide-area or wireless network. To address these challenges, we proposed a software-defined streaming-based code scheduling framework according to the concept of transparent computing. This framework uses the idea of code streaming...
In this work, routing strategies of an arriving request to a server in a prioritized limited multi-server processor-sharing (PS) system are studied in order to optimize a given performance criterion. In this system, an arriving request enters the dispatcher, which routes this request to each server according to a predetermined strategy. In the prioritized limited PS server, a high-priority request...
A Virtual Private Network (VPN) is a technology that is used to securely connect private network passing through a public network such as the Internet. Using a VPN, a computer, tablet, or smartphone is able to securely connect with others in the Internet as if they were part of a private network. Using this technology may also bring security threats like spoofing, snipping, and hacking as the data...
Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation...
The ability to remotely discover and configure devices in an automation network without the need for prior knowledge of the network topology or the identities of hosts and servers is a key requirement for industrial networks and cyber-physical systems. The Dynamic Host Configuration Protocol (DHCP) as a UDP-based standardized network protocol became very successful in computer networking and also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.