The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indoor positioning is a hot topic in current research. Most of the existing indoor positioning technologies based on time-difference-of-arrival (TDOA) require the time synchronization between base stations. In this paper, a high-precision multiple-antenna indoor positioning system based on chirp signal is proposed, in which each base station extracts TDOA information independently, so there is no...
A content delivery network (CDN) using community information that is extracted from the data of a social networking service (SNS) is proposed in this paper. The structure of the load characteristics of the CDN in terms of the number of servers, communities, and downloads is also shown as a tool for evaluating network performance.
In this paper, we present CLUE, a system event analytics tool for black-box performance diagnosis in production Cloud Computing systems. CLUE provides an unified and extensible means of profiling service transactional behaviors, and builds structured data called event sketches. CLUE further offers a set of analytic tools for summarizing and analyzing event sketches by integrating data mining and statistical...
In this paper, we propose a system and method for processing media in a convergence media service platform, which provide convergence media into which one or more sensory effects have been inserted based on media and user interaction feedback.
For traditional data warehouses, mostly large and expensive server and storage systems are used. In particular, for small- and medium size companies, it is often too expensive to run or rent such systems. These companies might need analytical services only from time to time, for example at the end of a billing period. A solution to overcome these problems is to use Cloud Computing. In this paper,...
OMA DS is used by the Content Storage Client and the Content Storage Server for synchronization, as defined in the OMA CPM Architecture. But most of the Synchronization systems are designed for flat structure data, which cannot be applied to the synchronization of hierarchical directory structure in CPM (Converged IP Messaging) directly. In order to fulfill the requirement of content synchronization...
In this paper, agent-based distributed automated testing framework is proposed, and for the current lack of automatic test task allocation function in distributed automated testing framework, an approach of automatic test task allocation based on the test node ability is given. The complex test task is broken down into atomic test tasks, the test tasks in the test definition file is represented using...
One of the challenges of P2P systems is to perform load balancing efficiently. A distributed hash table (DHT) abstraction, heterogeneous nodes, and non uniform distribution of objects cause load imbalance in structured P2P overlay networks. Several solutions are suggested to solve this problem but they have some restrictions. They assume the homogeneous capabilities of nodes, unawareness of the link...
We propose and evaluate a novel improvement to a previously published, unreliable covert channel based on the network traffic of multiplayer, first person shooter online games (FPSCC). Covert channels typically embed themselves within pre-existing (overt) data transmissions in order to carry hidden messages. FPSCC encodes covert bits as slight, yet continuous, variations of a player's character's...
Directory services are corporate computing objects responsible for providing information about user accounts, computer accounts, contacts, etc. Virtual directories are powerful tools for consolidating this data, modifying it if necessary, and presenting it to the end user in a highly customized manner. While attacks against directory services have been identified, attacks and vulnerabilities of virtual...
In this work, we make utilization of users' computers involved in this distributed storage system easily, and share their powerful resources with this P2P environment. Users can download the files from this P2P distributed storage system. To transfer more efficiently, this paper also proposes a parallel transfer algorithm for every node and replication mechanism. The experiment results have shown...
Runtime software adaptability — the ability to change an application's behavior during runtime — is an increasingly important capability for systems, both to support continuous operation and to support a good user experience. Achieving such adaptability may be very hard or easy; the degree of difficulty will largely reflect choices made in a system's architecture. Some architectural styles are much...
In order to enhance the performance of concurrent access, this paper presents a new design pattern named merged request pattern. Firstly, the algorithm of merged request pattern is advanced. The roles difference of ldquoproducer and consumerrdquo model is applied in concurrent access, which will make the response time of system abbreviated significantly. Secondly, integrated with traditional ldquotemplate...
In this paper, we introduce two methods to implement clock synchronization in fiber channel. One is based on ELS (extended link service) transmission and the other is based on primitive signal transmission. Compared with the method based on ELS transmission, the primitive method is at least 20 times faster and consumes less power. Furthermore, we propose an area efficient method to implement encoding...
Distributed systems are notoriously difficult to implement and debug. One important tool for understanding the behavior of distributed systems is tracing. Unfortunately, effective tracing for modern distributed systems faces several challenges. First, many interesting behaviors in distributed systems only occur rarely, or at full production scale. Hence we need tracing mechanisms which impose minimal...
Paper presents results of research based on need to have capable-enough data exchange framework on J2ME CDLC 1.0+ MIDP 1.0+ platform. Presented solution fulfils those needs by providing Midletcomm package with many features, user friendly and extensible interface.
Maintenance of critical emergency infrastructure is potentially lifesaving, but also expensive and tedious to document and track. In this paper we demonstrate a maintenance system based on Near Field Communication (NFC). NFC-enabled mobile phones and NFC tags are used to improve recurring maintenance processes: the maintenance task itself becomes more efficient; and the system facilitates real-time...
In mobile environments data from a client database often has to be integrated into a server database during a synchronization process. Thereby unique constraint violations are possible if the client has older data or only part of the data available offline. When inserting data into the server database in an online scenario, a unique constraint violation can be recognized and corrected immediately...
We introduce a low-level performance modelling formalism, Shared Transaction Markov Chains (STMCs), specifically designed for the capture and analysis of massively parallel stochastic systems through fluid techniques. We introduce the notion of a shared transaction between concurrently running Markov chains which allows a multi-phase synchronisation to accurately represent complex cooperation between...
The existing synchronization solutions of mobile database are not independent from the database server because they use database dependent information such as metadata or use specific functions of database server such as trigger and time stamp. These constraints are critical weak point in ubiquitous environment because various applications are running in various devices and servers in ubiquitous environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.