Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impa...
详细信息
ISBN:
(纸本)0769524052
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impact of dynamic environment. In addition, we propose a file storage strategy in the improved Chord model. Withthe strategy, shared file can be transmitted from multiple nodes simultaneously that could speed up the download, and at the same time the strategy can guarantee data security by means of introduction of a special metadata file.
the paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly clas...
详细信息
ISBN:
(纸本)0769524052
the paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly classify the bargaining scenarios and present the optimal bargaining strategy under sub-incomplete information for corresponding bargaining scenarios;then extend them to the optimal pricing strategies under incomplete information condition;thirdly, discuss the conditions for convergence of optimal strategy;Finally, the analysis shows that the bargaining strategic profiles form the sequential equilibrium and the agreement is unique under certain conditions.
this paper presents a run-time scheduling policy to map tasks to resources in grid computing systems based on Multi-Agent System (MAS). this policy schedules tasks in run-time and avoids the waste of resources. A simu...
详细信息
ISBN:
(纸本)0769524052
this paper presents a run-time scheduling policy to map tasks to resources in grid computing systems based on Multi-Agent System (MAS). this policy schedules tasks in run-time and avoids the waste of resources. A simulation result is presented to prove the availability of this policy.
Context-aware computing is a computing paradigm in which appiications can discover and take advantage of context information. Faced withthe diverse mix of distributed and heterogeneous sensors, embedded devices and m...
详细信息
ISBN:
(纸本)0769524052
Context-aware computing is a computing paradigm in which appiications can discover and take advantage of context information. Faced withthe diverse mix of distributed and heterogeneous sensors, embedded devices and mobile devices in the ubiquitous computing environments, it is fairly difficult for users to develop context-aware applications. this paper proposes ScvdWare, a middleware to support the development of context-aware applications. We introduce the developing language, compiling and assembling of a context-aware application. To illustrate the developing process, we design an example which shows how the application adapts to changes in the environments.
Grid is a distributedcomputing and resource environment. Security is an important issue in the grid environment. In this paper we present a prototype of the grid security architecture. It shows that the architecture ...
详细信息
ISBN:
(纸本)0769524052
Grid is a distributedcomputing and resource environment. Security is an important issue in the grid environment. In this paper we present a prototype of the grid security architecture. It shows that the architecture is scalable, and meets the security requirements of the grid.
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. One of important aspects in RBAC is constraints that con...
详细信息
ISBN:
(纸本)0769524052
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. One of important aspects in RBAC is constraints that constrain what components in RBAC are allowed to do. there are lots of research have been achieved to specify constraints for secure system developers. However more work is need urgently to met requirements for interoperability of machine and people understandable constraints specification in open and distributed environment. In this paper we propose another approach to specify constraints using Semantic Web technologies. the Web Ontology Language (OWL) specification of basic RBAC components and constraints are described in detail.
Security is an important issue in research and appliance of grid computing. Grid security model is composed of a series of mechanism and strategy to solve various practical security problems. this paper presents a gri...
详细信息
ISBN:
(纸本)0769524052
Security is an important issue in research and appliance of grid computing. Grid security model is composed of a series of mechanism and strategy to solve various practical security problems. this paper presents a grid security model based on virtual organization referring to GSI (a security component in Globus). the model consists of a logical model and a physical model.
this paper presents a ubiquitous computing technology called Virtual Personal computing Environment (VPCE), which enables users to access their personalized computing environments anywhere using any available terminal...
详细信息
ISBN:
(纸本)0769524052
this paper presents a ubiquitous computing technology called Virtual Personal computing Environment (VPCE), which enables users to access their personalized computing environments anywhere using any available terminals. the key feature of the VPCE is that it can be constructed dynamically by reassembling application services and resources distributed over networks, which is different from the traditional desktop personal computing environment that is tied to an individual computer to execute. In VPCE, users work with a heterogeneous collection of application services, and data access by application as well as the application accessed by users are distributed over networks, while the applications and data distribution is transparent to the users.
Quality of Service (QoS) has now become a central issue in network design and application. this article describes a distributed architecture for linking geographically distributed network performance measurement and e...
详细信息
ISBN:
(纸本)0769524052
Quality of Service (QoS) has now become a central issue in network design and application. this article describes a distributed architecture for linking geographically distributed network performance measurement and evaluation system (NPMES) based on in-depth research on the key techniques of network QoS. the prototype implementation of NPMES and the performance evaluation criteria based on performance aggregation are carefully introduced Our contribution is presenting a new performance evaluation criteria based on performance aggregation to access QoS. Experiment results indicate the scalable NPMES can do the real-time detection on network performance of ISPs from the end user's perspective. the performance, aggregation approach is a bran-new idea, and of a definite practicability.
I/O for parallel and distributed systems has drawn increasing attention over the past decade as it has become apparent that I/O performance, rather than CPU performance, may be the key limiting factor in the performan...
详细信息
ISBN:
(纸本)0769524052
I/O for parallel and distributed systems has drawn increasing attention over the past decade as it has become apparent that I/O performance, rather than CPU performance, may be the key limiting factor in the performance of future systems. Prefetch is the fundamental approach for improving the overall read performance. In this paper, we study three parallel prefetching algorithms-LRU-Lookahead, Fixed Horizon, and Greedy algorithmin, and explore the performance characteristics of each of the algorithms using the trace-driven simulation.
暂无评论