With the proliferation of the use of Internet for distributing multimedia and software content, there is an increasing need for efficient and secure data distribution mechanisms that can scale to large numbers of user...
详细信息
ISBN:
(纸本)9780769546001
With the proliferation of the use of Internet for distributing multimedia and software content, there is an increasing need for efficient and secure data distribution mechanisms that can scale to large numbers of users. The peer-to-peer protocol BitTorrent is scalable and is widely used to share unprotected files. The lack of security in BitTorrent obstructs its deployment for business applications. P2P systems have developed up to a point where their use in a business context is hampered by the lack of security. We propose to add the missing security services, widening the range of use of P2P systems. In this paper we propose a new and scalable security architecture for BitTorrent that provides reliable mechanisms for authentication, authorization, and confidentiality. The security architecture we propose for BitTorrent could be used in both personal and business contexts, and its comparison to existing architectures shows its efficiency.
In summary, the core design of B-trees has remained unchanged in 40 years: balanced trees, pages or other units of I/O as nodes, efficient root-to-leaf search, splitting and merging nodes, etc. On the other hand, an e...
详细信息
ISBN:
(纸本)9781424489589
In summary, the core design of B-trees has remained unchanged in 40 years: balanced trees, pages or other units of I/O as nodes, efficient root-to-leaf search, splitting and merging nodes, etc. On the other hand, an enormous amount of research and development has improved every aspect of B-trees including data contents such as multi-dimensional data, accessalgorithms such as multi-dimensional queries, data organization within each node such as compression and cache optimization, concurrency control such as separation of latching and locking, recovery such as multi-level recovery, etc. Gray and Reuter believed in 1993 that âB-trees are by far the most important access path structure in database and file systems.â?It seems that this statement remains true today. B-tree indexes are likely to gain new importance in relational databases due to the advent of flash storage. Fast access latencies permit many more random I/O operations than traditional disk storage, thus shifting the break-even point between a full-bandwidth scan and a B-tree index search, even if the scan has the benefit of columnar database storage. We hope that this tutorial of B-tree techniques will stimulate research and development of modern B-tree indexing techniques for future data management systems.
There are few studies of content delivery systems specializing in consumer generated video (CGV) exchange, and as for the real exchange technique, exchange through the file server in a network has become mainstream. A...
详细信息
The proceedings contain 68 papers. The topics discussed include: QoS routing for heterogeneous mobile ad hoc networks based on multiple exponents in the definition of the weighted connectivity index;a secure autonomou...
ISBN:
(纸本)9780769546353
The proceedings contain 68 papers. The topics discussed include: QoS routing for heterogeneous mobile ad hoc networks based on multiple exponents in the definition of the weighted connectivity index;a secure autonomous document architecture for enterprise digital right management;evolving e-learning ontologies for personal and cloud learning environments;efficient and rich context representation for web applications;a mashup personalization service based on semantic web rules and linked data;handling semantic conflicts in DaaS composition: a service mediation approach;enhancing recommender systems with access to electronic health records and groups of interest in social networks;adapting indexation to the content, context and queries characteristics in distributed multimediasystems;dynamic classifier aggregation using fuzzy t-conorm integral;and evaluating the impact of the development of innovative products: a multi-agent systems based methodology.
In recommendation systems, a central host typically requires access to user profiles in order to generate useful recommendations. This access, however, undermines user privacy;the more information is revealed to the h...
详细信息
Modern communication infrastructure (IP multimedia Subsystem (IMS) and Voice over IP (VoIP)) are vulnerable to zero day attacks and unknown threats. Anomalous SIP requests can be used to remotely launch malicious acti...
详细信息
Current antivirus software still focuses on using signature based algorithms on file content level to detect malware. Unfortunately, there is a simple way to circumvent this detection method: The malware author applie...
详细信息
ISBN:
(纸本)9781457709029
Current antivirus software still focuses on using signature based algorithms on file content level to detect malware. Unfortunately, there is a simple way to circumvent this detection method: The malware author applies a code transformation algorithm (e.g. a packing or encryption scheme) to his malware plaintext and saves the reverse transformation algorithm along with the unsuspicious looking block of transformed malware. Malware, which is obfuscated in that way, is called polymorphic malware. We call the transformation of the plaintext to the transformed malware as encoding and the reverse operation as decoding. Although current malware detection systems adopted and implemented several techniques to counter this, these methods are mostly either unreliable or suffer heavy performance drawbacks. We present a non-intrusive and lightweight method to monitor any executable code in real-time, which allows efficient detection of polymorphic malware.
The proceedings contain 62 papers. The topics discussed include: information dispersion over redundant arrays of optimal cloud storage for desktop users;placement matters: replica placement in peer-assisted storage cl...
ISBN:
(纸本)9780769545929
The proceedings contain 62 papers. The topics discussed include: information dispersion over redundant arrays of optimal cloud storage for desktop users;placement matters: replica placement in peer-assisted storage clouds;high-speed storage nodes for the cloud;on the performance of distributed clustering algorithms in file and streaming processing systems;defeating network jitter for virtual machines;utilizing memory content similarity for improving the performance of replicated virtual machines;energy-efficient virtual machine provision algorithms for cloud systems;efficiency assessment of parallel workloads on virtualized resources;coasters: uniform resource provisioning and access for clouds and grids;impact of cloud computing virtualization strategies on workloads' performance;towards profitable virtual machine placement in the data center;and using lightweight virtual machines to run high performance computing applications: the case of the weather research and forecasting model.
Due to the dramatically increasing amount of multimediacontents in several application domains, effective and flexible solutions for distributed data indexation are essential. In the management of these multimedia co...
详细信息
Due to the dramatically increasing amount of multimediacontents in several application domains, effective and flexible solutions for distributed data indexation are essential. In the management of these multimediacontents, the indexing process is the most important resource consumer, in terms of data transfer over the network and CPU consumption. As result of our research, we located two points for reducing resource consumption: the limitation of multimediacontent transfer over the network for indexing, as well as the reduction of multimedia indexing amount by employing only the most appropriate algorithms for performing indexation, only over the relevant contents. We present in this paper the solution developed in the context of the LINDO project for indexing multimediacontent into a distributed system that originally address these two points by reducing as much as possible the resource consumption through (1) a distributed indexing technique that avoids multimedia transfer, (2) a flexible mechanism for selecting the indexing algorithms to be employed on each remote server, according to the multimediacontent characteristics, its acquisition context and user queries history.
The proceedings contain 47 papers. The topics discussed include: a green and secure authentication for the 4th generation mobile network;DES-Chan: a framework for distributed channel assignment in wireless sensor netw...
ISBN:
(纸本)9781457717109
The proceedings contain 47 papers. The topics discussed include: a green and secure authentication for the 4th generation mobile network;DES-Chan: a framework for distributed channel assignment in wireless sensor networks;a novel distributed content replication and placement scheme for wireless mesh networks;MAR: message-aware routing for opportunistic wireless ad hoc networks;vertical handoff decision and network merit for integrated wireless and mobile networks;hierarchical DWT based optimal diversity power allocation for video transmission in MIMO wireless systems with quantized feedback;optimal subcarrier allocation for H.264 based scalable video transmission in 4G OFDMA systems;a packet scheduling scheme for 4G wireless accesssystems aiming to maximize revenue for the telecom carriers;impact of MAC parameters on the performance of IEEE 802.15.4 MAC protocol with ACK frame transmission;and a survey on backbone formation algorithms for wireless sensor networks.
暂无评论