In this paper, we obtain the representation of connected regular digraphs as coset graphs of S-n. Applying this representation, we give the conditions of isomorphisms and the formula of automorphism groups of connecte...
详细信息
ISBN:
(纸本)9780769529431
In this paper, we obtain the representation of connected regular digraphs as coset graphs of S-n. Applying this representation, we give the conditions of isomorphisms and the formula of automorphism groups of connected regular digraphs, and their applications to Thompson's problem. It would have further more applications for parallel and distributed computing.
We propose a parallel algorithim for parallel computation it? photochemical reactions simulations. The proposed method is a modified version of the force matrix decomposition algorithim. The modification is based on t...
详细信息
ISBN:
(纸本)9780769533544
We propose a parallel algorithim for parallel computation it? photochemical reactions simulations. The proposed method is a modified version of the force matrix decomposition algorithim. The modification is based on the Bulk Synchronous parallel architecture model (BSP), which describes the supersteps of computation, communication, and synchronization. The performance of this parallel algorithim is also analysed. This method is found to he a feasible parallel algorithim for simulating the photochemical reactions high-efficiently.
Service network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret ...
详细信息
ISBN:
(纸本)9780769533544
Service network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG member. It is imperative to authenticate the data sent through the encrypted channel. This paper uses the symbols and approached presented by Lampson in his paper [15] to provide a formal proof of how encryption channel authenticates itself in SNG. It forms the basis of using encrypted channels in SNG.
Encryption is the basis and important method to ensure security of storage area network. And it is very expensive and will drop off performance of storage area network system to unacceptable situation. We evaluate per...
详细信息
ISBN:
(纸本)9780769529431
Encryption is the basis and important method to ensure security of storage area network. And it is very expensive and will drop off performance of storage area network system to unacceptable situation. We evaluate performance of encrypted storage area network using some current cryptographic algorithms, and want to observe some useful result to help researching and designing security system for storage area network.
We study the benefit optimization-based resource scheduling algorithm in three-dimensional QoS model in this paper. It is the management of economy model and the user alternation system provide QoS. The objective is t...
详细信息
ISBN:
(纸本)9780769533544
We study the benefit optimization-based resource scheduling algorithm in three-dimensional QoS model in this paper. It is the management of economy model and the user alternation system provide QoS. The objective is to maximize the system benefit. An iterative scheduling algorithm used to maximize the QoS needs of users and resource scheduler is proposed to optimal three-dimensional QoS based resource scheduling. The experiments show that optimal multiple QoS based resource scheduling results in less cost and more efficiency in resource allocation.
This paper addresses how, to exploit temporal and spatial data correlations to collect data energy efficiently from sensor nodes. In our approach, models are maintained by nodes and cluster heads, and replica models a...
详细信息
ISBN:
(纸本)9780769533544
This paper addresses how, to exploit temporal and spatial data correlations to collect data energy efficiently from sensor nodes. In our approach, models are maintained by nodes and cluster heads, and replica models are maintained by the base station. The base station uses the replica models to estimate the actual Measurement data in usual time, and an actual measurement datum is sent to the base station only when the error of the model's corresponding estimation exceeds allowable error bound.
Volunteer computing is a form of distributed computing in which the general public volunteers processing and storage to scientific research projects. This paper proposes a novel approach based on Hurst's rescaled ...
详细信息
ISBN:
(纸本)9780769533544
Volunteer computing is a form of distributed computing in which the general public volunteers processing and storage to scientific research projects. This paper proposes a novel approach based on Hurst's rescaled range analysis and fractal theory for time series are applied to study the deformation fractal characteristics of file Volunteer computing for HPC Project. It is found that the Volunteer may be regarded as a non linear dynamic system and the fractal dimension can be used to describe the dynamic variation characteristics of the whole platform and applied to diagnose the probable problem of the node's availability, The approach has been implemented and validated on a platform XtremeWeb.
Quantum Key Distribution (QKD) is an ingenious application of quantum mechanics in information field. In this paper, it provides a novel algorithm for three group to establish a quantum key over a long distance. The s...
详细信息
ISBN:
(纸本)9780769533544
Quantum Key Distribution (QKD) is an ingenious application of quantum mechanics in information field. In this paper, it provides a novel algorithm for three group to establish a quantum key over a long distance. The slaves node send qubits to the master node in the first group and the three master nodes in the three groups share Greenberger-Horne-Zeilinger (GHZ), send qubits to one of slave nodes in group3. Compared with (he classical network architecture, it is proved in theory that an eavesdropper (Eve) invariably introduce errors within communication network if it wants to gain useful information. The nodes must find Eve to guarantee the security, of the network.
The application of the semiclassical dynamics simulation on a parallel computer has been found to be a challenge. The most time consumable computations in this large scale simulation package are the calculations of th...
详细信息
ISBN:
(纸本)9780769533544
The application of the semiclassical dynamics simulation on a parallel computer has been found to be a challenge. The most time consumable computations in this large scale simulation package are the calculations of the Hamiltonian matrix elements, determination of egenvalues and eigenvectors of complex symmetric matrices, and evaluations of the first derivatives of various quantities with respect Cartesian coordinate. This paper outlines various strategies for the parallelization of these tasks. These techniques have been used in a recently developed computer simulation model for investigation of photochemical reactions induced by ultrafast layer pulses. The application of this parallel code is presented on one important photochemical reaction: response of C60 to ultrafast laser pulse.
The generation-based network coding has been successfully employed in overlay networks. The key idea is the generation-marking for packets along with the suitable control of buffering and transmission opportunity at n...
详细信息
ISBN:
(纸本)9780769533544
The generation-based network coding has been successfully employed in overlay networks. The key idea is the generation-marking for packets along with the suitable control of buffering and transmission opportunity at nodes in network. Building on recent work by Chou et al., who present the generation-based network coding for multicast networks, we extend this framework to arbitrary network coding problems over networks with delay. It is shown that generation-based technique can transform the nonzero-delay network into the zero-delay network and however, inappropriate transmission opportunity or short of memory at nodes may change the topology of the original network.
暂无评论