Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 72, Issue 9September 2016
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
article
REDU: reducing redundancy and duplication for multi-failure recovery in erasure-coded storages

Data reliability is a significant issue in large-scale storage systems. Erasure codes provide high data reliability via data recovery, which however generates a large amount of data transmission in the network. The bandwidth cost of the data ...

article
Support vector analysis of large-scale data based on kernels with iteratively increasing order

This study presents an efficient approach for large-scale data training. To deal with the rapid growth of training complexity for big data analysis, a novel mechanism, which utilizes fast kernel ridge regression (Fast KRR) and ridge support vector ...

article
Communication optimization for RDMA-based science data transmission tools

Big data has raised new challenges to data communication and transmission capacity. RDMA (Remote Direct Memory Access) Transport Protocol can reduce the communication delay of big data through kernel memory bypass technology and zero-copy technology. ...

article
FITDOC: fast virtual machines checkpointing with delta memory compression

Virtualization provides the function of saving the entire status of the execution environment of a running virtual machine (VM), which makes checkpointing flexible and practical for HPC servers or data center servers. However, the system-level ...

article
Synchronization support for parallel applications in virtualized clouds

Cloud computing platforms have become very attractive for parallel applications, thanks to the system virtualization technology that allows versatile and pliable computing environments. However, owing to the virtualization overhead, parallel ...

article
Adaptive sparse matrix representation for efficient matrix---vector multiplication

A wide range of applications in engineering and scientific computing are based on the sparse matrix computation. There exist a variety of data representations to keep the non-zero elements in sparse matrices, and each representation favors some matrices ...

article
Performance analysis for contention adaptation of M2M devices with directional antennas

In the directional carrier sense multiple access-collision avoidance (directional-CSMA-CA) mechanism, the efficient channel access mechanism with a collision-controlled concept is one of the most challenging topics. Especially, in capillary machine-to-...

article
Exploring an area by groups of UAVs in the presence of a refueling base

This research investigates the problem of area exploration using groups of unmanned aerial vehicles without service interruption under limited fuel constraints, where each group is assigned backup or search role depending on the situation. This paper ...

article
Design and implementation of a collaborative team-based cloud storage system

With the rapid development of the Internet and information technology, cloud computing has been increasing in popularity. Cloud Storage Services, in which users can store their own files in the Internet space using cloud computing technology, have now ...

article
An advanced approach to security measurement system

The importance of information security has increased gradually. Initially, the notion of information security was limited to only a few areas. Now, it has expanded to cover a variety of areas. For example, critical infrastructure facilities such as ...

article
Intelligent data management framework for advanced Web service

The paradigm of rich Internet application (RIA) emerged since users' tendency to use Web applications was changed for the sake of convenience, and the Flex was presented as a platform to develop the RIA with the advantage of prevalence by the Adobe. The ...

article
Intelligent secure patching service for enhancing infrastructure control system performance

Various ICT features are being embedded in an industrial control system (ICS), in accordance with the advancement of information communication devices and an increase in convenience. ICS features and efficiency have been improved through a convergence ...

article
Study on predicting sentiment from images using categorical and sentimental keyword-based image retrieval

Visual stimuli are the most sensitive stimulus to affect human sentiments. Many researches have attempted to find the relationship between visual elements in images and sentimental elements using statistical approaches. In many cases, the range of ...

article
Real time intrusion detection system for ultra-high-speed big data environments

In recent years, the number of people using the Internet and network services is increasing day by day. On a daily basis, a large amount of data is generated over the Internet from zeta byte to petabytes with a very high speed. On the other hand, we see ...

article
Integrated management system for a large computing resources in a scientific data center

Recently, many scientists in a basic science field have been using high-performance computer to analyze the large-scale data according to developed IT technology. A data center with large computing resources provides high-performance computing resources ...

article
Benefits of cloud computing adoption for smart grid security from security perspective

Cloud computing is a new IT trend with several economic benefits and many applications are migrating to the cloud environment. However, there are concerns on its adoption for critical data infrastructure caused by security issues and privacy data. ...

article
Towards the advanced security architecture for Microgrid systems and applications

Microgrid is an electrical power supply system in some areas centering on a decentralized power supply independent from the existing wide area power supply system, and it is critical to secure its security because it is a core domain of Smartgrid 2.0 as ...

article
Fitness switching genetic algorithm for solving combinatorial optimization problems with rare feasible solutions

The goal of meta-heuristic algorithms such as genetic algorithm is to explore the search space of the combinatorial optimization problems efficiently to locate the optimal solutions, the feasible solutions with the best output values. However, typical ...

article
Detecting and monitoring game bots based on large-scale user-behavior log data analysis in multiplayer online games

Online games with a variety of genres and game style have become popular. While the market for online games is growing, unauthorized program software is used and operated by some users. They damaged fair players and furthermore, bot program users have ...

article
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem

With the fast development of the Internet technology, there is an exponential growth in wireless networks-enabled applications across the globe. To ensure secure communication among all such applications, the authentication with key agreement has ...

article
Architecture for speeding up program execution with cloud technology

Cloud technology uses MapReduce to make computers quickly process a huge amount of data with plentiful resources in clouds, but requires that applications should be developed or reprogrammed to process data in a batch mode of MapReduce. By our solution ...

article
Security analysis of SDDO-based block cipher for wireless sensor network

Switchable data-dependent operations (SDDOs) that were introduced by Moldovyan (MMM-ACNS 2003, LNCS, vol 2776, pp 316---327. Springer, Heidelberg, 2003), have been proposed as a primitive suitable to designing efficient ciphers with simple key ...

article
Mobile application tamper detection scheme using dynamic code injection against repackaging attacks

The Android platform, with a large market share from its inclusive openness, faces a big problem with repackaging attacks, because reverse engineering is made easy due to the signature method that allows self-sign and also due to application structure. ...

article
Capability-based semantic matching for dynamic resource allocation in tactical edge environment

There are technological, operational, and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth, size, weight and power limitations, ad-hoc and mobile network, and so on. Moreover, ...

article
Scientific trend analysis and curation with Korean R&D information

With the development of web, the amount of information from science and technology is generated and managed in web environments. Then, many researchers are interested in the extracting and analyzing scientific issues from various science data. The ...

Comments