The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data with vastly different access characteristics is efficiently stored in multi-tiered storage systems. A cost-effective way to retain large volumes of infrequently accessed data is to store it on tape. Steady developments in tape technology deliver ever increasing storage capacities at low cost. This has established tape as a viable solution to cope with the extreme data growth in the context of...
Data protection and information security have always been intricate problems of the majority of software applications which have been deployed throughout the Internet. Consequently, a substantial effort has been put into the creation and development of a wide variety of solutions to tackle this very issue. The aim of this paper is to offer a means of performance measurement and security validation...
Present IoT services have been suggested as a specific thing-oriented service and they do not provide suitable IoT services on the space that ordinary users are living. Therefore, this paper proposes the user-centric thing environment service platform architecture that can provide the best appropriate services in the space which the user locates such as house, car and office. The user-centric thing...
Self-adaptive systems overcome many of the limitations of human supervision in complex software-intensive systems by endowing them with the ability to automatically adapt their structure and behavior in the presence of runtime changes. However, adaptation in some classes of systems (e.g., Safety-critical) can benefit by receiving information from humans (e.g., Acting as sophisticated sensors, decision-makers),...
Cloud computing has rapid growth in enterprise and academic areas. Computing platform makes up the transition from physical servers to virtual machines (VMs) in the cloud. Instead of many advantages, VMs remain several problems to employ effective utilization of physical computing resources, especially many-core accelerators. Even though GPGPU is a hopeful solution for high-load applications, existing...
This paper presents OpenCL Remote framework that extends the native OpenCL platform model to network scale and utilizes the native OpenCL's support of heterogeneous computing. OpenCL Remote boosts performance by distributing computation over network to many compute devices in parallel.
Today's laptops and mobile terminals are equipped with several network interfaces belonging to different access technologies. Users can benefit from multi-homing to access network services anywhere, at any time and from any network. Multipath TCP (MPTCP) is a modified version of Transmission Control Protocol (TCP) which allows a TCP connection to simultaneously send data over multiple paths. One of...
Provision of ubiquitous services is considered as an important source of revenue generation for future telecommunication operators. However, these services must be adaptable to a large variety of users within administrative networks. The request of such adaptations will be processed by various Adaptation Mechanisms (ADME) located in different parts of the administrative network; therefore ADMEs' selection...
Ubiquitous systems are generally embedded into the environment and provide their services all the time and everywhere. In order to increase transparency and personalization, ubiquitous applications are normally context-aware, i.e., they use information about entities of interest to adapt their services. Since they are connected to everyday elements, such systems are frequently shared by two or more...
Due to the rising importance of virtualization, extensive efforts have gone into determining and improving the performance of workloads on virtualized platforms. This has resulted in a series of modifications to the leading architecture used in virtualized system (x86) by adding hardware support for virtualization, the latest of which is the addition of tags and tag comparators to the x86 TLB. In...
In this work we examine how transparent compression in the I/O path can improve space efficiency for online storage. We extend the block layer with the ability to compress and decompress data as they flow between the file-system and the disk. Achieving transparent compression requires extensive metadata management for dealing with variable block sizes, dynamic block mapping, block allocation, explicit...
Wi-Fi hotspots deployed by domestic networks are an attractive approach to foster ubiquitous Internet access for mobile computers. However, it raises several security issues, since the owners of such hotspots cannot be trusted to be honest; therefore, visitors should consider them as potential Man-in-the-Middle attackers. On the other hand, the owners of such hotspots should not be legally accounted...
In user-centric pervasive computing environments where users can utilize nearby heterogeneous devices anytime and anywhere, context-aware remote rendering is essential. It is impractical not only to manually copy 3D content from one device to another whenever a user moves, but also to render complex 3D data locally on resource-limited devices, such as mobile phones and PDAs. In this paper, we propose...
The rise in multi-core architectures has led to the abundance of computing resources on a chip. Virtualization has emerged as a way to efficiently partition and share these resources. Thus, the emphasis in micro-architecture design, especially in ??86, has shifted towards providing hardware support for better performance of VMs on bare metal. One of the areas of focus for these efforts is the Translation...
The deployment of 10 Gigabit Ethernet (10 GbE) connections to servers has been hampered by the "fast-network-slow-host" phenomenon. Recently, the integration of network interfaces (INICs) is proposed to tackle the performance mismatch. While significant advantages over PCI-based discrete NICs (DNICs) were shown in prior work using simulation methodologies, it is still unclear how INICs perform...
Traditional approaches to network management are mostly based on the centralized client/server model. Due to the intrinsic limitations of SNMP-based management paradigms, such as information bottlenecks and lack of flexibility, have encouraged a trend towards distributed management system. The emergence of mobile agent frameworks has led many researchers to examine their applicability to network management...
Medical devices historically have been monolithic units - developed, validated, and approved by regulatory authorities as stand-alone entities. Modern medical devices increasingly incorporate connectivity mechanisms that offer the potential to stream device data into electronic health records, integrate information from multiple devices into single customizable displays, and coordinate the actions...
Based on GUI desktop environment, running PC-class applications with rich user experience has become popular in mobile devices. A window system is an essential component of GUI desktop. As a window system for mobile devices, we implemented X server on top of EGL and OpenVG. GPU-based X server described in this paper may serve as a standard model of a window system in future mobile devices because...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.