Using existing TCP/IP emulation layers over InfiniBand networks in Java applications presented rather poor communication performance and heavy overhead in host CPU. In this paper, we propose Jdib (Java Direct InfiniBa...
详细信息
At CCS 2003, Blomer Otto, and Seifert proposed a new CRT-RSA signature algorithm, which was claimed to be secure against hardware fault attack. Unfortunately, one year later Wagner presented a simple and practical fau...
详细信息
ISBN:
(纸本)9780769529431
At CCS 2003, Blomer Otto, and Seifert proposed a new CRT-RSA signature algorithm, which was claimed to be secure against hardware fault attack. Unfortunately, one year later Wagner presented a simple and practical fault attack on the so-called BOS algorithm. In this paper we give a further cryptanalysis of the BOS algorithm and can completely break the security of it with a probability at least 25%. Compared to Wagner's attack, the new attack is much simpler and requires fewer faulty signatures. We further conclude that the BOS algorithm is not safe for use in its present form.
This paper presents a parallelcomputing model based on mobile agent for the computer cluster system on the basis of the technology of mobile agent and parallelcomputing. The communication way of mobile agents is als...
详细信息
Fixed-priority with preemption threshold (FPPT) is an important form of real-time scheduling algorithm. However most of current research works concerning FPPT assume the task priorities are predefined and have a task ...
详细信息
ISBN:
(纸本)9780769529431
Fixed-priority with preemption threshold (FPPT) is an important form of real-time scheduling algorithm. However most of current research works concerning FPPT assume the task priorities are predefined and have a task model which constraints all tasks are released simultaneously. This presumption is too pessimistic. The major contribution of this paper is an appropriate schedulability analysis, based on response time analysis, for supporting FPPT scheduling on asynchronous task set in hard real-time systems. The simulation result illustrate that our approach can improve the breakdown utilization of asynchronous task set by 5%-27%.
As the network grows fast to large scale and heterogeneity, the distributed network management technologies do make management model flexible and scalable. However, to deal with the initial configuration of so large a...
详细信息
This paper proposes a scalable algorithm called APD (Adaptive Packet Dropping) for bandwidth control, which is based on active queue. A flow is mapped to an entry of hash table by hash function, and the counter of a f...
详细信息
This paper researches and analyses feature and advantages of IPsec VPN, points out its problem and disadvantages in the IPv4. After analyzing IPv6 network and its data package in deep, this paper studies the feasibili...
详细信息
ISBN:
(纸本)9780769529431
This paper researches and analyses feature and advantages of IPsec VPN, points out its problem and disadvantages in the IPv4. After analyzing IPv6 network and its data package in deep, this paper studies the feasibility of implementation of IPsec VPN in IPv6 network. Then it elaborates frame and modules which supports IPv6 of Openswan. Via recompiling the 2.6 kernel, adding the NETKEY module to kernel, installing Openswan and configuring it, a IPsec VPN which can runs in pure IPv6 network has been built. Finally, function and performance testing is done.
Software component adaptation is a crucial problem in component-based software engineering. In this paper, a component model is described firstly in mathematical specification which is helpful to specify formally comp...
详细信息
ISBN:
(纸本)9780769529431
Software component adaptation is a crucial problem in component-based software engineering. In this paper, a component model is described firstly in mathematical specification which is helpful to specify formally component adaptation. Three component adaptation architectures are described in formal semantic, including sequential architecture, alternative architecture and parallel architecture. The conditions of adaptation architecture are analyzed and the system will select automatically a proper architecture to adapt the components according to the architecture application conditions. The specification of the complex component can be obtained automatically based on the specification of the adapted components. To compose a component based on its semantics specification, the proposed architecture supports semantic representation of components and does not depend on the computing environment. The proposed approach in the paper offers a guarantee to the formal analysis of component adaptation and the validation of the proper component adaptation.
With the popularity of Java programming language and the progress on Java compiler techniques, people have been trying to use Java to develop applications where C/C+ + ruled before. However, to deliver comparable over...
详细信息
The problem of scheduling multiple divisible loads on bus networks with unknown parameters is addressed in this paper Most research in optimal partitioning of massive loads to be distributed among processors in a dist...
详细信息
ISBN:
(纸本)9780769529431
The problem of scheduling multiple divisible loads on bus networks with unknown parameters is addressed in this paper Most research in optimal partitioning of massive loads to be distributed among processors in a distributed system is under the assumptions of known and deterministic network resources. Lately, researchers have started addressing issues that are application oriented and go beyond those simple assumptions of load distribution. In this paper a heterogeneous network with unknown network resources is considered, and several strategies with increasing refinements that minimize the total processing time of multiple divisible loads are designed. These strategies perform close to the real distributed systems more and more. Application comparison of these proposed strategies is carried out.
暂无评论