Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment pr...
详细信息
ISBN:
(纸本)3540309993
Micro-payment systems have the potential to provide non-intrusive, high-volume and low-cost pay-as-you-use services for a wide variety of web-based applications. We propose an extension, P2P-NetPay, a micro-payment protocol characterized by off-line processing, suitable for peer-to-peer network services sharing. Our approach provides high performance and security using one-way hashing functions for e-coin encryption. In our P2P-NetPay protocol, each peer's transaction does not involve any broker and double spending is detected during the redeeming transaction. We describe the motivation for P2P-NetPay and describe three transactions of the P2P-NetPay protocol in detail to illustrate the approach. We then discuss future research on this protocol.
In this paper we present our approach of a distributed environment for high-precision and high bitrate network measurements. These measurements can be performed on a standard PC system without changes in the kernel of...
详细信息
ISBN:
(纸本)0889864926
In this paper we present our approach of a distributed environment for high-precision and high bitrate network measurements. These measurements can be performed on a standard PC system without changes in the kernel of the operating system. Unique features of our system are support of measurements in a distributed manner as well as using different packet sampling models for measurement data flows. In addition, bounds of measurement accuracy on non real-time operation systems as well as a proof of concept are drawn. The shown measurement approach is essentially suited for estimating quality of Grid and realtime multimedia applications in the internet.
Multiple beam antennas can receive (or transmit) data on multiple beams simultaneously. The aim of this paper is to show the limitations of using IEEE 802.11 distributed coordination function (DCF) based schemes for m...
详细信息
A DDoS (distributed Denial-Of-Service) attack is a distributed, large-scale attempt by malicious users to flood the victim network with an enormous number of packets. This exhausts the victim network of resources such...
详细信息
In grid workflow systems, to verify fixed-time constraints efficiently at the run-time execution stage, some checkpoints are often selected so that we only need to conduct the fixed-time constraint verification at suc...
ISBN:
(纸本)3885793989
In grid workflow systems, to verify fixed-time constraints efficiently at the run-time execution stage, some checkpoints are often selected so that we only need to conduct the fixed-time constraint verification at such checkpoints rather than at all activity points. However, the existing typical checkpoint selection strategies are inefficient and/or ineffective because they may incur some unnecessary verification by selecting some unnecessary checkpoints or omit some necessary verification by omitting some necessary checkpoints. Therefore, in this paper, based on the run-time activity completion duration, we develop a new checkpoint selection strategy that is more efficient and effective than the existing typical checkpoint selection strategies. The final comparison and quantitative evaluation further demonstrate this point.
Mobile agents provide a new method for the distributed parallel computation. This paper presents the advantages of using mobile agents in a distributed parallel seismic data migration system, and describes the archite...
详细信息
ISBN:
(纸本)9810545711
Mobile agents provide a new method for the distributed parallel computation. This paper presents the advantages of using mobile agents in a distributed parallel seismic data migration system, and describes the architecture and concrete technologies for implementation. Mobile agent systems can distribute the load such that one node is burdened with several nodes, which would make small systems have the capability to deal with large and complex tasks. A domain decomposition strategy is used for distributing the workload and the tasks communicate. Different boundary condition and communication strategy in the different circumstance can be chosen using Agent technology to get the whole efficiency.
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an implicit business-value. Middleware that ...
详细信息
ISBN:
(纸本)0769522769
We consider pervasive computing applications that process and aggregate data-streams emanating from highly distributed data sources to produce a stream of updates that have an implicit business-value. Middleware that enables such aggregation of data-streams must support scalable and efficient self-management to deal with changes in the operating conditions and should have an embedded business-sense. In this paper, we present a novel self-adaptation algorithm that has been designed to scale efficiently for thousands of streams and aims to maximize the overall business utility attained from running middleware-based applications. The outcome is that the middleware not only deals with changing network conditions or resource requirements, but also responds appropriately to changes in business policies. An important feature of the algorithm is a hierarchical node-partitioning scheme that decentralizes reconfiguration and suitably localizes its impact. Extensive simulation experiments and benchmarks attained with actual enterprise operational data corroborate this paper's claims.
Emotion study is a multi-disciplinary research subject. In the past three decades, a number of theoretical models of emotion and computer applications have been proposed from different perspectives including psycholog...
详细信息
The internet and other various networks are growing into an interconnection environment of information pools that are often overwhelming. Knowledge technology has been developing intensely, however with limited succes...
详细信息
This paper examines the relationship among disaster tolerant systems, Information technology (IT) application operation and availability, and the executive level management visibility necessary for system operational ...
详细信息
ISBN:
(纸本)9806560426
This paper examines the relationship among disaster tolerant systems, Information technology (IT) application operation and availability, and the executive level management visibility necessary for system operational success. The current state of disaster tolerant application systems is explored including an investigation into the reliability and survivability requirements necessary to achieve disaster tolerant system operation through a simplified network architecture analysis. Specific focus is directed towards the risk of IT application downtime attributable to the increasing dependence placed on critical data-driven applications operating in distributed and unbounded networks. A method for disaster tolerance is proposed which mitigates unplanned downtime through a disciplined approach of computer and people based processes implementing specific documentation procedures. In addition, the importance of executive visibility into die system wide impact of downtime and the resultant effects on the total cost of ownership (TCO) of these critical systems is addressed.
暂无评论