The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Converting audio signal to packet stream and propagating through wireless local area network (Wi-Fi technology) to loud speakers that may be located at different rooms will be a popular scenario of multimedia applications. Since the packets received by separate speakers varied with the transmission paths and environment to them, this made the playable contents different from one speaker to another...
Highly available metadata services of distributed file systems are essential to cloud applications. However, existing highly available metadata designs lack client-oriented features that treat metadata discriminately, leading to a single metadata fault domain and low availability. After investigating the workload characteristics of Hadoop, we propose Client-Oriented METadata (COMET), a novel highly...
Softwares usually need to be updated to fix bugs or add new features. On the other hand, some critical softwares, such as cloud applications, need to provide service continuously, thus should be updated without downtime. Conventional Dynamic Software Updating (DSU) systems try to update programs while running, but they hardly consider the communication of the program to be updated with other programs,...
Despite of all the advances in smartphone technology in recent years, smartphones still remain limited by their battery life. Unlike other power hungry components in a smartphone, the cellular data and Wi-Fi interfaces often continue to be used even when the phone is in its idle state in order to accommodate background (necessary or unnecessary) data traffic produced by some applications. In addition,...
Microblogging is a new form of blogging in which microbloggers can share their status in short posts. Microbloggers can be kept up to date with current information from microblog senders, however, Web users cannot be simultaneously updated by microblogs, to obtain the most recent information, whilst they browse Web pages since these are not updated in real time. To circumvent this time lag and provide...
The ITER Neutral Beam Test Facility will be the project's R&D facility for heating neutral beam injectors (HNB) for fusion research operating with H/D negative ions. Its mission is to develop technology to build the HNB prototype injector meeting the stringent HNB requirements (16.5 MW injection power, 1 MeV acceleration energy, 40 A ion current and one hour continuous operation). Two test-beds...
The Access Grid (AG) is one of the most widely used technologies for building advanced collaborative environment, and a distributed collaborative Augmented Reality (AR) environment has been established with AG and AR technologies. In such distributed shared environment, one of the most difficult tasks is maintaining a consistent view of the shared AR scene among all participants. This paper presents...
Within the EU FP7 project FascinatE, a capture, production and delivery system capable of allowing end-users to interactively view and navigate around an ultra-high resolution video panorama showing a live event is being developed. Network-based processing is used to repurpose the content to suit delivery towards different device types and user selection of regions of interest. In this paper we report...
With the number of applications running upon the virtualized system increased, the virtual network circumstance becomes more and more complicated; the consequent security problems thereby have been a concern for industrial and academic fields. However, the current solutions are mostly confined to the enforcement of several patchy-works on system which still requires proficient hacking skills for administrators...
End-hopping is a technique proposed in the study of active defense in network security. In this paper, some supplements and modifications are made to the conception of "End-hopping" based on the previous research of our group. And the formal description is put forward. Methods are discussed to implement End-hopping for active defense. After analyzing the shortcomings of service migration,...
Parallel file systems are very sensitive to adverse conditions, and the lack of synergy between such file systems and some of the applications running on them has a negative impact on the overall system performance. Our observations indicate that the increased pressure on metadata management is one of the relevant causes of performance drops. This paper proposes a virtualization layer above the native...
The Barn project, a spatial data grid prototype under development currently, provides a grid environment for applications of the nationwide geological survey data. Within Barn, in order to reduce data access latency, avoid a single point of failure, and increase the performance and load-balance of the system, we have designed and implemented a set of replica management services. These services, based...
In early 2007, ChannelAdvisor undertook an ambitious project to rearchitect one of its core product offerings. Flush with early success from rapid customer adoption, the foundation for this product had grown well beyond its initial design. As defects grew in frequency and severity, pressure mounted to "fix it yesterday", but consensus on exactly how proved elusive. "Fix it right"...
This paper proposes a small SNTP server to set the correct time for in-home electric appliances. In-home electric appliances obtain the correct time through the Internet by using SNTP. The proposed method was implemented in a verification system with an embedded microprocessor, RTOS and the small resources of 1.8 MB which are assumed to be required for consumer use and was verified. As a result, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.