535 research outputs found

    Desktop Sharing Portal

    Get PDF
    Desktop sharing technologies have existed since the late 80s. It is often used in scenarios where collaborative computing is beneficial to participants in the shared environment by the control of the more knowledgeable party. But the steps required in establishing a session is often cumbersome to many. Selection of a sharing method, obtaining sharing target’s network address, sharing tool’s desired ports, and firewall issues are major hurdles for a typical non-IT user. In this project, I have constructed a web-portal that helps collaborators to easily locate each other and initialize sharing sessions. The portal that I developed enables collaborated sessions to start as easily as browsing to a URL of the sharing service provider, with no need to download or follow installation instructions on either party’s end. In addition, I have added video conferencing and audio streaming capability to bring better collaborative and multimedia experience

    NoSQL Data Stores In Publish/Subscribe-Based RESTful Web Services

    Get PDF
    In the era of mobile cloud computing, the consumption of virtualized software and Web-based services from super-back-end infrastructure using smartphones and tablets is gaining much research attention from both the industry and academia. Nowadays, these mobile devices generate and access multimedia data hosted in social media and other sources in order to enhance the users’ multimedia experience. However, multimedia data is unstructured which can lead to challenges with data synchronization between these mobile devices and the cloud computing back-end. The issue with data synchronization is further fueled by the fact that mobile devices can experience intermittent connectivity losses due to unstable wireless bandwidths. While previous works proposed Simple Object Access Protocol (SOAP) -based middleware for the Web services’ synchronization, this approach is not efficient in a mobile environment because the SOAP protocol is verbose. Thus, the Representational State Transfer (REST) standard has been proposed recently to model the Web services since it is lightweight. This thesis proposes a novel approach for implementing a REST-based mobile Web Service for multimedia file sharing that utilizes a channel-based publish/subscribe communication scheme to synchronize smartphone or tablet-hosted NoSQL databases with a cloud-hosted NoSQL database. This thesis evaluates the synchronicity and the scalability of a prototype system that was implemented according to this approach. Also, this thesis assesses the overhead of the middleware component of the system

    RESTful PUBLISH/SUBSCRIBE FRAMEWORK FOR MOBILE DEVICES

    Get PDF
    The growing popularity of mobile platforms is changing the Internet user’s computing experience. Current studies suggest that the traditional ubiquitous computing landscape is shifting towards more enhanced and broader mobile computing platform consists of large number of heterogeneous devices. Smartphones and tablets begin to replace the desktop as the primary means of interacting with IT resources. While mobile devices facilitate in consuming web resources in the form of web services, the growing demand for consuming services on mobile device is introducing a complex ecosystem in the mobile environment. This research addresses the communication challenges involved in mobile distributed networks and proposes an event-driven communication approach for information dissemination. This research investigates different communication techniques such as synchronous and asynchronous polling and long-polling, server-side push as mechanisms between client-server interactions and the latest web technologies namely HTML5 standard WebSocket as communication protocol within a publish/subscribe paradigm. Finally, this research introduces and evaluates a framework that is hybrid of REST and event-based publish/subscribe for operating in the mobile environment

    The crowd as a cameraman : on-stage display of crowdsourced mobile video at large-scale events

    Get PDF
    Recording videos with smartphones at large-scale events such as concerts and festivals is very common nowadays. These videos register the atmosphere of the event as it is experienced by the crowd and offer a perspective that is hard to capture by the professional cameras installed throughout the venue. In this article, we present a framework to collect videos from smartphones in the public and blend these into a mosaic that can be readily mixed with professional camera footage and shown on displays during the event. The video upload is prioritized by matching requests of the event director with video metadata, while taking into account the available wireless network capacity. The proposed framework's main novelty is its scalability, supporting the real-time transmission, processing and display of videos recorded by hundreds of simultaneous users in ultra-dense Wi-Fi environments, as well as its proven integration in commercial production environments. The framework has been extensively validated in a controlled lab setting with up to 1 000 clients as well as in a field trial where 1 183 videos were collected from 135 participants recruited from an audience of 8 050 people. 90 % of those videos were uploaded within 6.8 minutes

    A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

    Get PDF
    In late 2017, a sudden proliferation of malicious JavaScript was reported on the Web: browser-based mining exploited the CPU time of website visitors to mine the cryptocurrency Monero. Several studies measured the deployment of such code and developed defenses. However, previous work did not establish how many users were really exposed to the identified mining sites and whether there was a real risk given common user browsing behavior. In this paper, we present a retroactive analysis to close this research gap. We pool large-scale, longitudinal data from several vantage points, gathered during the prime time of illicit cryptomining, to measure the impact on web users. We leverage data from passive traffic monitoring of university networks and a large European ISP, with suspected mining sites identified in previous active scans. We corroborate our results with data from a browser extension with a large user base that tracks site visits. We also monitor open HTTP proxies and the Tor network for malicious injection of code. We find that the risk for most Web users was always very low, much lower than what deployment scans suggested. Any exposure period was also very brief. However, we also identify a previously unknown and exploited attack vector on mobile devices
    • …
    corecore