16,350 research outputs found
Recommended from our members
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment
Most of the current cloud computing platforms offer Infrastructure as a Service (IaaS) model, which aims to provision basic virtualised computing resources as on-demand and dynamic services. Nevertheless, a single cloud does not have limitless resources to offer to its users, hence the notion of an Inter-Cloud enviroment where a cloud can use the infrastructure resources of other clouds. However, there is no common framework in existence that allows the srevice owners to seamlessly provision even some basic services across multiple cloud service providers, albeit not due to any inherent incompatibility or proprietary nature of the foundation technologies on which these cloud platforms are built. In this paper we present a novel solution which aims to cover a gap in a subsection of this problem domain. Our solution offer a security architecture that enables service owners to provision a dynamic and service-oriented secure virtual private network on top of multiple cloud IaaS providers. It does this by leveraging the scalability, robustness and flexibility of peer- to-peer overlay techniques to eliminate the manual configuration, key management and peer churn problems encountered in setting up the secure communication channels dynamically, between different components of a typical service that is deployed on multiple clouds. We present the implementation details of our solution as well as experimental results carried out on two commercial clouds
Autonomous flight and remote site landing guidance research for helicopters
Automated low-altitude flight and landing in remote areas within a civilian environment are investigated, where initial cost, ongoing maintenance costs, and system productivity are important considerations. An approach has been taken which has: (1) utilized those technologies developed for military applications which are directly transferable to a civilian mission; (2) exploited and developed technology areas where new methods or concepts are required; and (3) undertaken research with the potential to lead to innovative methods or concepts required to achieve a manual and fully automatic remote area low-altitude and landing capability. The project has resulted in a definition of system operational concept that includes a sensor subsystem, a sensor fusion/feature extraction capability, and a guidance and control law concept. These subsystem concepts have been developed to sufficient depth to enable further exploration within the NASA simulation environment, and to support programs leading to the flight test
An interdisciplinary analysis of Colorado Rocky Mountain environments using ADP techniques
The author has identified the following significant results. Good ecological, classification accuracy (90-95%) can be achieved in areas of rugged relief on a regional basis for Level 1 cover types (coniferous forest, deciduous forest, grassland, cropland, bare rock and soil, and water) using computer-aided analysis techniques on ERTS/MSS data. Cost comparisons showed that a Level 1 cover type map and a table of areal estimates could be obtained for the 443,000 hectare San Juan Mt. test site for less than 0.1 cent per acre, whereas photointerpretation techniques would cost more than 0.4 cent per acre. Results of snow cover mapping have conclusively proven that the areal extent of snow in mountainous terrain can be rapidly and economically mapped by using ERTS/MSS data and computer-aided analysis techniques. A distinct relationship between elevation and time of freeze or thaw was observed, during mountain lake mapping. Basic lithologic units such as igneous, sedimentary, and unconsolidated rock materials were successfully identified. Geomorphic form, which is exhibited through spatial and textual data, can only be inferred from ERTS data. Data collection platform systems can be utilized to produce satisfactory data from extremely inaccessible locations that encounter very adverse weather conditions, as indicated by results obtained from a DCP located at 3,536 meters elevation that encountered minimum temperatures of -25.5 C and wind speeds of up to 40.9m/sec (91 mph), but which still performed very reliably
Dynamic gating in the nucleus accumbens: Behavioral state-dependent synchrony with the prefrontal cortex and hippocampus
Contextual and sensory information, goals, and the motor plan to achieve them are integrated in the nucleus accumbens (NA). Although this integration needs flexibility to operate in a variety of environments, models of NA function rarely consider changing behavioral states. Here, intracellular recordings in anesthetized rats revealed rapid changes in the synchronization between NA up states and prefrontal cortical (PFC) local field potentials (LFPs). The synchronization of the NA with the PFC and ventral hippocampus also varied over time in awake rats, depending on the behavioral state of the animal: NA LFPs followed hippocampal theta rhythms during spatial exploration, but not during an operant task when they were instead synchronized with slower PFC rhythms. These data indicate that the ability of the NA to follow cortical inputs can rapidly change, allowing for a mechanism that could select an optimal response for a given behavioral condition
Program on State Agency Remote Sensing Data Management (SARSDM)
A planning study for developing a Missouri natural resources information system (NRIS) that combines satellite-derived data and other information to assist in carrying out key state tasks was conducted. Four focal applications -- dam safety, ground water supply monitoring, municipal water supply monitoring, and Missouri River basin modeling were identified. Major contributions of the study are: (1) a systematic choice and analysis of a high priority application (water resources) for a Missouri, LANDSAT-based information system; (2) a system design and implementation plan, based on Missouri, but useful for many other states; (3) an analysis of system costs, component and personnel requirements, and scheduling; and (4) an assessment of deterrents to successful technological innovation of this type in state government, and a system management plan, based on this assessment, for overcoming these obstacles in Missouri
Tiny Groups Tackle Byzantine Adversaries
A popular technique for tolerating malicious faults in open distributed
systems is to establish small groups of participants, each of which has a
non-faulty majority. These groups are used as building blocks to design
attack-resistant algorithms.
Despite over a decade of active research, current constructions require group
sizes of , where is the number of participants in the system.
This group size is important since communication and state costs scale
polynomially with this parameter. Given the stubbornness of this logarithmic
barrier, a natural question is whether better bounds are possible.
Here, we consider an attacker that controls a constant fraction of the total
computational resources in the system. By leveraging proof-of-work (PoW), we
demonstrate how to reduce the group size exponentially to while
maintaining strong security guarantees. This reduction in group size yields a
significant improvement in communication and state costs.Comment: This work is supported by the National Science Foundation grant CCF
1613772 and a C Spire Research Gif
Analysis of current middleware used in peer-to-peer and grid implementations for enhancement by catallactic mechanisms
This deliverable describes the work done in task 3.1, Middleware analysis: Analysis of current middleware used in peer-to-peer and grid implementations for enhancement by catallactic mechanisms from work package 3, Middleware Implementation. The document is divided in four parts: The introduction with application scenarios and middleware requirements, Catnets middleware architecture, evaluation of existing middleware toolkits, and conclusions. -- Die Arbeit definiert Anforderungen an Grid und Peer-to-Peer Middleware Architekturen und analysiert diese auf ihre Eignung fĆ¼r die prototypische Umsetzung der Katallaxie. Eine Middleware-Architektur fĆ¼r die Umsetzung der Katallaxie in Application Layer Netzwerken wird vorgestellt.Grid Computing
- ā¦