At first, several QoS technologies are presented and analyzed, one single technology can not solve QoS problem perfectly. A new QoS model is brought forward, which integrates MPLS traffic engineering, DiffServ and Int...
详细信息
ISBN:
(纸本)9780769529431
At first, several QoS technologies are presented and analyzed, one single technology can not solve QoS problem perfectly. A new QoS model is brought forward, which integrates MPLS traffic engineering, DiffServ and IntServ. Design philosophy and implementation technique of this model are presented. At last, simulations about this model in NS2 are done. Comparing with MPLS network, network delay is shortened and packets loss rate is improved in proposed model.
Fine-grained parallel genetic algorithm (FGPGA), though a popular and robust strategy for solving complicated optimization problems, is sometimes inconvenient to use as its population size is restricted by heavy data ...
详细信息
ISBN:
(纸本)9780769529431
Fine-grained parallel genetic algorithm (FGPGA), though a popular and robust strategy for solving complicated optimization problems, is sometimes inconvenient to use as its population size is restricted by heavy data communication and the parallel computers are relatively difficult to use, manage, maintain and may not be accessible to most researchers. In this paper, we propose a FGPGA method based on GPU-acceleration, which maps parallel GA algorithm to texture-rendering on consumer-level graphics cards. The analytical results demonstrate that the proposed method increases the population size, speeds up its execution and provides ordinary users with a feasible FGPGA solution.
On the basis of general project risk element transmission theory, in order to consider an effective solution of portfolio selection problem. This research proposed a new neural network model: Risk Neural network model...
详细信息
ISBN:
(纸本)9780769529431
On the basis of general project risk element transmission theory, in order to consider an effective solution of portfolio selection problem. This research proposed a new neural network model: Risk Neural network model. Based on artificial neural network model analysis, we introduced three computational rules: analysis, weighted and polymerization in Risk Neural network. By solving the hidden layer of random variables characteristic Junction, a series of definitions were built in Risk Neural network, including feed-forward risk neural network model and muti-hidden layer risk neural network model. According to the series of definitions, we divided risk elements into discrete model and continuous model to be discussed separately, eventually the analytical model of Risk Neural network was built. The interactive approach was illustrated with a practical example.
The network traffic Emulation is used in generating background traffic for IDSs evaluation. The Background traffic can be used to evaluate the false positive level and the performance of the misuse IDSs and help train...
详细信息
ISBN:
(纸本)9780769529431
The network traffic Emulation is used in generating background traffic for IDSs evaluation. The Background traffic can be used to evaluate the false positive level and the performance of the misuse IDSs and help training normal behavior profiles for anomaly IDSs. Currently the emulation methods for the background traffic are either restricted by the performance bottleneck of the software and hardware, or lack of the semantic of flow and session. So they can't satisfy the IDS evaluation requirement in high-speed network environment. After analyzing the requirement of IDSs evaluation and the characteristics of network traffic, this paper proposes a differential equation model of active flow rate. Based on the equation, a structural simulation model of network flow is constructed and used in the network traffic emulation for IDS evaluation. This model is both simple for high performance and similar to the reality. The experiments show that the model proposed can generate traffic both realistic and controllable.
Wireless Mesh networks (WMNs) are an emerging technology for last-mile broadband Internet access. This new and promising paradigm allows a fast, easy and inexpensive network deployment. While much effort has been made...
详细信息
ISBN:
(纸本)9780769529431
Wireless Mesh networks (WMNs) are an emerging technology for last-mile broadband Internet access. This new and promising paradigm allows a fast, easy and inexpensive network deployment. While much effort has been made to address issues at physical, data link, and network layers, little attention has been paid to the security aspect central to the realistic deployment of WMNs. This paper addresses security of WMNs and proposes ISA (Identity-based Security Architecture) for WMNs. ISA eliminates the need for certificate-based public-key distribution indispensable in conventional PKI schemes. It provides a light weight network access protocol based on pairing and hash function. As to key revocation, it introduces a neighbor detection mechanism. The public key of a node is revoked if a certain threshold number of nodes accused the node. ISA also enables efficient network-wide key update via a single broadcast message.
A dynamic task distribution and scheduling technology of a message middleware for parallel data delivery on massive database systems is presented. The techniques of computer cluster and parallel processing are used to...
详细信息
As the size of the database increases, data mining algorithm faces more demanding requirements for efficiency and accuracy. Data mining for large data sets require large amounts of time and physical resources. Samplin...
详细信息
ISBN:
(纸本)9780769529431
As the size of the database increases, data mining algorithm faces more demanding requirements for efficiency and accuracy. Data mining for large data sets require large amounts of time and physical resources. Sampling is introduced as an effective method Facing large data sets, a new decision tree algorithm based on sampling is put forward. It can select small initial samples with similar distribution to the original data sets to study, and stop sampling according to the time complexity requirements and convergence criteria. Comparing with the existing flexible decision tree algorithm, the algorithm can reduce the computation time and I/O complexity, while maintaining the accuracy of the tree.
Advances in computing applications in recent years have prompted the demand for more flexible scheduling models for QoS demand The DWCS(Dynamic Window-Constrained Scheduling) is a flexible scheduling algorithm. This p...
详细信息
ISBN:
(纸本)9780769529431
Advances in computing applications in recent years have prompted the demand for more flexible scheduling models for QoS demand The DWCS(Dynamic Window-Constrained Scheduling) is a flexible scheduling algorithm. This paper applies DWCS into the open real-time system to support QoS demand. We propose a window-constrained CBS with which the real-time system can use the characteristic of DWCS to improve the scheduling performance. Moreover, the new scheduler can provide some QoS guarantee for real-time tasks. To evaluate the performance of the new server, the two server mechanisms have been implemented on the Linux kernel. The experimental results show that the new server is better than the old server. In the end, the future research directions are discussed.
Access control is a critical security service in sensor networks. Sensor networks provide the query service of the environmental monitoring data as the service provider to the users. The current access control scheme ...
详细信息
ISBN:
(纸本)9780769529431
Access control is a critical security service in sensor networks. Sensor networks provide the query service of the environmental monitoring data as the service provider to the users. The current access control scheme based on public key cryptography is high in expenses, and difficult to resist replay and DoS attacks. This paper proposes several effective access control schemes using the one-way key chain and the Merkle hash tree. Also this paper provides a revocation tree scheme to revoke the access control capability from compromised users. These schemes have several advantages over the current access control methods of low expenses in calculation, storage and communication, and resistance to node capture, query replay and DoS attacks.
Peer-to-Peer (P2P) information sharing attracts much attention from both legal and IT communities. P2P architectures have the potential to accelerate communication processes and reduce collaboration costs. A prototype...
详细信息
ISBN:
(纸本)9780769529431
Peer-to-Peer (P2P) information sharing attracts much attention from both legal and IT communities. P2P architectures have the potential to accelerate communication processes and reduce collaboration costs. A prototype, named vuCRN has been developed for researchers to facilitate document sharing legally.. However, some legal issues are preventing P2P to realise its real power. In this paper, the design processes of our P2P-based collaborative legal information sharing system are introduced. First P2P information sharing architecture and legal issues are described. Then legal concerns and the next stage of the prototype vuCRN are analysed from ontological level, conceptual level and functional level respectively.
暂无评论