scholarly journals Scalable network distance browsing in spatial databases

Author(s):  
Hanan Samet ◽  
Jagan Sankaranarayanan ◽  
Houman Alborzi
Author(s):  
Michael L. Zientek ◽  
Pamela D. Derkey ◽  
Robert J. Miller ◽  
J. Douglas Causey ◽  
Arthur A. Bookstrom ◽  
...  

Author(s):  
Haojun Huang ◽  
Li Li ◽  
Geyong Min ◽  
Wang Miao ◽  
Yingying Zhu ◽  
...  

2008 ◽  
Vol 36 (1) ◽  
pp. 433-434
Author(s):  
Zhihua Wen ◽  
Michael Rabinovich

Author(s):  
Shingo Takada ◽  
Akira Sato ◽  
Yasushi Shinjo ◽  
Hisashi Nakai ◽  
Akiyoshi Sugiki ◽  
...  
Keyword(s):  

2021 ◽  
Vol 13 (1) ◽  
pp. 12
Author(s):  
Juan Wang ◽  
Yang Yu ◽  
Yi Li ◽  
Chengyang Fan ◽  
Shirong Hao

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network policies and leaking sensitive processing states, due to running in a shared open environment and lacking the protection of proprietary hardware. Currently, Intel® Software Guard Extensions (SGX) provides a promising way to build a secure and trusted VNF (virtual network function) by isolating VNF or sensitive data into an enclave. However, directly placing multiple VNFs in a single enclave will lose the scalability advantage of NFV. This paper combines SGX and click technology to design the virtual security function architecture based on multiple enclaves. In our design, the sensitive modules of a VNF are put into different enclaves and communicate by local attestation. The system can freely combine these modules according to user requirements, and increase the scalability of the system while protecting its running state security. In addition, we design a new hot-swapping scheme to enable the system to dynamically modify the configuration function at runtime, so that the original VNFs do not need to stop when the function of VNFs is modified. We implement an IDS (intrusion detection system) based on our architecture to verify the feasibility of our system and evaluate its performance. The results show that the overhead introduced by the system architecture is within an acceptable range.


2011 ◽  
Vol 347-353 ◽  
pp. 3846-3855 ◽  
Author(s):  
Ali Baniyounes ◽  
Gang Liu ◽  
M. G. Rasul ◽  
M. M. K. Khan

In Australia the future demand for energy is predicted to increase rapidly. Conventional energy resources soaring prices and environmental impact have increased the interest in renewable energy technology. As a result of that the Australian government is promoting renewable energy; such as wind, geothermal, solar and hydropower. These types of energy are believed to be cost-effective and environmentally friendly. Renewable energy availability is controlled by climatic conditions such as solar radiation, wind speed and temperature. This paper aims to assess the potential of renewable energy resources, in particular wind and solar energy in an Australian subtropical region (Central and North Queensland) namely, Gladstone, Emerald, Rockhampton, Yeppoon, Townsville, and Cairns. Analysis is done by using the latest statistical state of Queensland energy information, along with measured data history of wind speed, solar irradiations, air temperature, relative humidity, and atmospheric pressure for those sites. This study has also shown that national assessments of solar and wind energy potential can be improved by improving local climatic data assessments using spatial databases of Central and North Queensland areas.


2014 ◽  
Vol 15 (18) ◽  
pp. 2219-2232 ◽  
Author(s):  
Jiejun Kong ◽  
Tingzhen Li ◽  
Dapeng Oliver Wu

2009 ◽  
Vol 21 (8) ◽  
pp. 1162-1177 ◽  
Author(s):  
Yunjun Gao ◽  
Baihua Zheng ◽  
Gencai Chen ◽  
Qing Li

Sign in / Sign up

Export Citation Format

Share Document