Search results for "Server"
showing 10 items of 586 documents
Second Opinion System for Intraoral Lesions
2014
In this paper we present the prototype of a teledentistry system to perform the remote diagnosis of oral diseases. It makes use of a particular device called intra-oral (or dental) camera properly designed to shoot video and take pictures of the inner part of the mouth. The intra-oral cameras can be connected via USB to a common PC and they are very cheap, unlike the intra-oral photography kit for DSLR cameras. Usually this kind of devices are used in dentistry studies for local visualization by means of specialized software. The novelty of our system is that the real-time video produced by this device is canalized into a video streming by means of Video LAN client server (VLC) and pictures…
An interest-aware video streaming platform: Shaping its architecture to better suit users' demands
2014
This paper investigates how a p2p television platform can take advantage of the presence of frequent channel viewers to grant them a more satisfying service than to less regular spectators. The idea we explore is to learn beforehand about the users’ interests, in order to cluster them in groups that display different behaviors; then, the video chunk scheduling algorithm of the p2p overlay is altered, with the aim of serving frequent spectators in a privileged manner, providing them with a faster access to the selected channel. An analytical model is developed, to capture the difference in startup delay that the proposed changes introduce; several additional performance metrics are numerical…
Kata Containers: An Emerging Architecture for Enabling MEC Services in Fast and Secure Way
2019
New coming applications will be only possible through Mobile Edge Servers deployed in proximity of the mobile users. Due to the user's mobility and server's workload, service migration will be an integral part of the services. For this reason, a standardized architecture should be designed to accomplish a workload migration in a secure and timely manner. Most research done to date has focused on the use of either virtual machine (VM) or container or a mix of both recently. A final solution might be an architecture only having the advantages of both technologies as the security of the VM and the speed of the containers. Custom solutions, actually, by using both technologies, need continuous …
Integrating Variability Management in Data Center Networks
2017
International audience; Data centers have an important role in supporting cloud computing services (i.e. checking social media, sending emails, video conferencing,..). Hence, data centers topologies design became more important and must be able to respond to ever changing service requirements and application demands. An ultimate challenge in this research is the design of data center network that interconnects the massive number of servers, and provides efficient and fault-tolerant routing algorithm. Several topologies such as DCell, FlatNet and ScalNet have been proposed. However, these topologies generally seek to improve the scalability without taking into consideration the energy usage …
Model-based approaches for the development of event-based systems using embedded services
2010
This paper presents a development use case of event-based system using (embedded) services specified in UPnP specification. Although we use only UPnP, we considered that the use case is also applicable for other (XML-based) service description technologies.
A genetic approach for adding QoS to distributed virtual environments
2007
Distributed virtual environment (DVE) systems have been designed last years as a set of distributed servers. These systems allow a large number of remote users to share a single 3D virtual scene. In order to provide quality of service in a DVE system, clients should be properly assigned to servers taking into account system throughput and system latency. The latter one is composed of both network and computational delays. This highly complex problem is known as the quality of service (QoS) problem. In this paper, we study the implementation of a genetic algorithm (GA) for solving the QoS problem in DVE systems. Performance evaluation results show that, due to its ability of both finding goo…
Secure interworking with P2PSIP and IMS
2010
In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement this system model and analyze it in several aspects: number of hops and delay, trust improvement and protection against malicious or compromised intermediate peers. We conclude that the proposed architecture is feasible and improves security. As far as we know our research is the first study …
Relativistic Positioning Systems in Flat Space-Time: The Location Problem
2013
The location problem in relativistic positioning is considered in flat space-time. When two formal solutions are possible for a user (receiver) of the system, its true location may be obtained from a standard set of emission data extended with an observational rule. The covariant expression giving the location of the user in inertial coordinates is decomposed with respect to an inertial observer.
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques
2013
Nowadays HTTP servers and applications are some of the most popular targets for network attacks. In this research, we consider an algorithm for HTTP intrusions detection based on simple clustering algorithms and advanced processing of HTTP requests which allows the analysis of all queries at once and does not separate them by resource. The method proposed allows detection of HTTP intrusions in case of continuously updated web-applications and does not require a set of HTTP requests free of attacks to build the normal user behaviour model. The algorithm is tested using logs acquired from a large real-life web service and, as a result, all attacks from these logs are detected, while the numbe…
A Harris-based Region Detector on a Computational Grid
2007
This paper introduces a new Harris-based feature detector algorithm, characterized by no parameters tuning to detect region of interest. Preliminary results show that the proposed methodology returns good results with respect to standard detectors which need a set of parameters. An uncommon parallel implementation of the proposed algorithm is presented to support the high computational workload which is required to avoid the approximation of the results. Our parallel approach differs from the conventional one because an internal scheduler, based on the expected running time, is used to balance the data distribution on a client-server model. The aim of this paper is also to underline the adv…