The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile applications are usually developed in a native way, using languages and APIs specific for a given platform, hindering the portability. As an alternative, web technologies as JavaScript and PHP have been employed enabling a same implementation to be executed in different mobile platforms without any recompilation or recoding process. This paper compares the efficiency of Android applications...
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
Recently, a micro-service architecture has been adopted to an edge device in smart factory due to its maintainability and scalability. In the architecture, all services are generally implemented as Docker containers and deployed by Docker APIs which might be harsh to a factory operator. In this paper, we propose an easy-to-use web-based service deployment method for containerized service to in-factory...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
Software often requires frequent updates to improve performance and reliability. Typically, a general update process is performed after terminating a program although this is not applicable to applications that require non-disruptive services such as networks and satellites. In order to address this issue, network service providers often provide a technology termed as an in-service software upgrade...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Internet-of-Things (IoT) is emerging as one of the popular technologies influencing every aspect of human life. The IoT devices equipped with sensors are changing every domain of the world to become smarter. In particular, the majorly benifited service sectors are agriculture, industries, healthcare, control & automation, retail & logistics, and power & energy. The data generated...
Attribute-based encryption schemes provide read access to data based on users' attributes. In these schemes, user privacy is compromised as the access policies are visible. This privacy issue has been addressed in literature by enabling the data owner to obfuscate the policy in a setting where a single authority generates decryption keys. However, a single authority can figure out the hidden access...
In recent years, many database systems have been deployed in virtualized cloud platforms to take advantage of the general benefits of virtualization and cloud computing. However, deploying database systems in such environments poses some challenges that should be addressed. The performance of database systems can degrade due to the various overheads introduced by the virtualization including CPU,...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
The need for performance has motivated the increasing adoption of solid-state drives (SSD) both in personal computers and data centers. However, the high cost per gigabyte and reduced lifetime hinder the thorough replacement of hard disk drives (HDD) with SSDs. To mitigate these issues, several architectures have been conceived based on hybrid storage systems, but performance and dependability models...
Recent advances in the Internet-of-Things has given rise to the possibility of connecting different kinds of devices to the internet. With low computing resources constraining most IoT devices and their networks, managing the capabilities and services of the various constrained devices over the internet has been an issue for IoT implementations. Existing approaches to this problem lack end-to-end...
As the Internet of Things has emerged, it has become possible to develop applications and services through various types of input / output using things as well as various graphic displays. In view of the development of such interfaces, a distributed user interface (DUI) is emerging in which a plurality of devices are simultaneously used to utilize one application service. In order to activate a DUI-based...
In the US alone, data centers consumed around $20 billion (200 TWh) yearly electricity in 2016, and this amount doubles itself every five years. Data storage alone is estimated to be responsible for about 25% to 35% of data-center power consumption. Servers in data centers generally include multiple HDDs or SSDs, commonly arranged in a RAID level for better performance, reliability, and availability...
Mobile Broadband (MBB) Networks are evolving at a fast pace, with technology enhancements that promise drastic improvements in capacity, connectivity, coverage, i.e., better performance in general. But how to measure the actual performance of a MBB solution? In this paper, we present our experience in running the simplest of the performance test: "speedtest-like" measurements to estimate...
In these last few years, several recent studies have demonstrated the possibility to perform Human Activity Recognition (HAR) by smartphone sensor data, enabling in this way a new generation of context-aware mobile applications. Smartphone-based HAR systems can exploit the full set of embedded sensors beside the accelerometer in order to increase the accuracy of the detection process. At the same...
Personal Cloud Storage (PCS) is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Notably, content sharing is a key feature for PCS users. It however comes with extra costs for service providers, as shared files must be synchronized to multiple user devices, generating more downloads from cloud servers. Despite...
As a fundamental cloud service for modern Web applications, the cloud object storage system stores and retrieves millions or even billions of read-heavy data objects. Serving for a massive amount of requests each day makes the response latency be a vital component of user experiences. Due to the lack of suitable understanding on the response latency distribution, current practice is to use overprovision...
Efficient content retrieval is crucial for Named Data Delay Tolerant Networking (NDDTN). Previous studies have shown that using social properties reasonably can improve availability of forwarding data packets, reduce overhead and delay. In this paper, a forwarding strategy, called RIF based on Region of Interest (ROI), is proposed and put forward for NDDTN. RIF computes cumulative visiting time and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.