Secure distributed storage systems can achieve data security and fault resilience by providing encrypted and redundant data segments across multiple computing nodes. However, such systems might face severe performance...
详细信息
the technology of distributed objects improves the systems' reliability and extensibility, and yet brings the complexity of management and maintenance on objects. In this paper, a management mechanism of service o...
详细信息
In this paper, we propose a novel approach which uses full processor utilization to compute a particular class of dynamic programming problems parallelly. this class includes algorithms such as Longest Common Subseque...
详细信息
In this paper we present a new distributed Group Mutual Exclusion(DGME) based on Clients/Servers model, and uses a dynamic data structures. Several processes (Clients) can access simultaneously to a same opened sessio...
详细信息
ISBN:
(纸本)9780769527369
In this paper we present a new distributed Group Mutual Exclusion(DGME) based on Clients/Servers model, and uses a dynamic data structures. Several processes (Clients) can access simultaneously to a same opened session (Server). the algorithm ensures that, at any time, at most one session is opened, and any requested Session will be opened in a finite time. the number of messages is between 0 and m, where m is the number of session in the network. In the average case, O(Log(m)) messages are necessary to open a session. the maximum concurrency is n, where n is the number of processes in the network.
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) help...
详细信息
ISBN:
(纸本)9781538659069
Supply chain in industry is a flow of information and goods traversal through multiple suppliers such as raw material suppliers, manufacturers, distributors, retailers and end users. Supply chain management (SCM) helps in smooth monitoring and accounting of information and goods traversal among multiple users. However, the existing supply chain management processes lack in offering transparency of information, user's privacy, timely updates on demand peaks, improper tracing of information, quality management, deal repudiation and trust among users. To address these problems, we propose a novel framework for pharmaceutical supply chain management which uses an ethereum blockchain, a distributed ledger technology. We propose different smart contracts to manage pharmaceutical supply chain processes over an ethereum blockchain. this framework helps in achieving user privacy, transparency of the supplied drug, tracking of drugs, quality management, non-repudiation and demand supply management withthe improved trust among the users. At the end, we analyze the proposed framework in terms of fulfilling the pharmaceutical supply chain management requirements.
Problems arising from firewalls are common, cost time and money and have dramatic consequences for the operations of networks, especially in multi-firewall enterprise network. In fact, any misconfiguration that can ar...
详细信息
Current generation supercomputers have over one million cores awaiting highly demanding computations and applications. An area that could largely benefit from such processing capabilities is naturally that of exact al...
详细信息
ISBN:
(纸本)9780769548791
Current generation supercomputers have over one million cores awaiting highly demanding computations and applications. An area that could largely benefit from such processing capabilities is naturally that of exact algorithms for NP-hard problems. We propose a general implementation framework that targets highly scalable parallel exact algorithms for NP-hard graph problems. We tackle the problems of efficiency and scalability by combining a fully decentralized dynamic load balancing strategy with special implementation techniques for exact graph algorithms. As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. We present experimental results that show notable improved running times on all types of input instances.
the group mutual exclusion problem is a variant of mutual exclusion problem in a sense that only the same group of processes can enter their critical section simultaneously. In this paper we propose a quorum-based dis...
详细信息
ISBN:
(纸本)0780378407
the group mutual exclusion problem is a variant of mutual exclusion problem in a sense that only the same group of processes can enter their critical section simultaneously. In this paper we propose a quorum-based distributed algorithm for the group mutual exclusion problem in asynchronous message passing distributed systems. the message complexity of our algorithm is O(\Q\) in the best case and O(n\Q\) in the worst case, where \Q\ is a quorum size that the algorithm adopts, and n is the number of processes that make requests for resources.
this paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS Currently, there are various streaming services, but the service environment is limited from s...
详细信息
ISBN:
(纸本)0769524052
this paper examines technique of media access that flexible media service, provided user interaction, and guaranteeing QoS Currently, there are various streaming services, but the service environment is limited from specific operating system, each protocol. the media player on the real-time protocol have some problems that media access techniques depend on each network protocol, and the enable commands to control media are different from protocol environments. We propose media player that is able to streaming service using by adaptation on the various protocol and supporting ubiquitous environment. therefore, we analysis streaming protocol for real-time media service and implement control mechanism of player for protocol.
MANET: are composed of mobile nodes without any infrosiructure and nodes cooperate to set up routes for network communications. Because of these characters, MANETs operate in open medium, so they are particularly vuln...
详细信息
ISBN:
(纸本)0769524052
MANET: are composed of mobile nodes without any infrosiructure and nodes cooperate to set up routes for network communications. Because of these characters, MANETs operate in open medium, so they are particularly vulnerable to intrusions. In this paper, we present an efficient intrusion detection system called MAPIDS (Mobile Agent-based Peer-to-peer Intrusion Detection System). On detecting a suspicious activity, MAPIDS initiates a voting approach to make a collective decision and take further action. In contrast to other intrusion detection system based on collective decision, MAPIDS saves more bandwidth and energy and it is immune to sparse nodes problem.
暂无评论