This paper investigates the radio resource allocation for the OFDMA systems. Two kinds of share auction mechanism are proposed, where the base station possesses of the subcarriers and plays as auctioneer, while the us...
详细信息
This paper investigates the radio resource allocation for the OFDMA systems. Two kinds of share auction mechanism are proposed, where the base station possesses of the subcarriers and plays as auctioneer, while the users play as bidders completing for them. These two kinds of auction are designed as first-price seal-bid, in which, the SINR auction aims at the desire for high throughput, and the fairness auction pay more attention to the fairness among users in the system. The auction-based resource allocation algorithm can reduce the burden of base station with a kind of distributed computation manner. Furthermore, the fairness auction only needs partial channel quality information with less overhead of signaling. Simulation results evaluate the performance of our proposed scheme.
Specialized networking protocol can be adapted for special requirements, which arise for cluster or distributed systems. So, such systems should use a protocol that is to satisfy needs of arbitrary tasks, which need s...
详细信息
Specialized networking protocol can be adapted for special requirements, which arise for cluster or distributed systems. So, such systems should use a protocol that is to satisfy needs of arbitrary tasks, which need support of rapid messages interchange and which, can start heavy computations as a reaction for message receipt. The objective is to implement an efficient data transfer protocol that needs to satisfy the fast and reliability of networking requirements the way in which this will be implemented based on the technology of Winsock using Visual C++ programming language.
Estimating network path properties such as latency, loss and available bandwidth is crucial to assist distributed applications such as P2P make the best use of Internet resources. Though quite a number of approaches a...
详细信息
Estimating network path properties such as latency, loss and available bandwidth is crucial to assist distributed applications such as P2P make the best use of Internet resources. Though quite a number of approaches are proposed to estimate these metrics, they have disadvantages of do not adapt to different network topologies, only apply to specific performance metric, and so on. In this paper, based on the architecture and routing characteristics of Internet, we propose a novel network path property estimation mechanism named NetGuru, which divides Internet into individual performance domains (PD) and maintains a performance server (PS) for each PD. NetGuru provides path performance estimation service to distributed applications through the collaboration of PSes in different PDs. Simulation result demonstrates that NetGuru can help improve P2P file transfer application efficiency.
In this paper, ambient calculus and ambient logics are introduced. Then we describe 3GPP authentication and key agreement protocol (AKA). This protocolpsilas goals are formally analyzed using ambient calculus. And we ...
详细信息
In this paper, ambient calculus and ambient logics are introduced. Then we describe 3GPP authentication and key agreement protocol (AKA). This protocolpsilas goals are formally analyzed using ambient calculus. And we verified this protocolpsilas goals using ambient logics. It shows that AKA protocol can achieve successfully the goals of authentication and key agreement.
Generally, quality software production seeks timely delivery with higher productivity at lower cost. Redundancy in a test suite raises the execution cost and wastes scarce project resources. In model-based testing, th...
详细信息
Generally, quality software production seeks timely delivery with higher productivity at lower cost. Redundancy in a test suite raises the execution cost and wastes scarce project resources. In model-based testing, the testing process starts with earlier software developmental phases and enables fault detection in earlier phases. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The paper presents a novel max-min multiobjective technique incorporated into a test suite optimization framework to find a better trade-off between the intrinsically conflicting goals. For illustration two objectives i.e. coverage and size of a test suite were used however it can be extended to more objectives. The study is associated with model based testing and reports the results of the empirical analysis on four UML based synthetic as well as industrial Activity Diagram models.
Peer-to-peer (P2P) has become a popular networking method with highly desired characteristics of robustness and scalability. However, the decentralized P2P computing models have some serious security problems which ma...
详细信息
Peer-to-peer (P2P) has become a popular networking method with highly desired characteristics of robustness and scalability. However, the decentralized P2P computing models have some serious security problems which may cause large-scale distributed denial of service (DDoS). This paper introduces the P2P technology and the DDoS attacks in the particular networking environment. The challenges for detection and prevention of P2P DDoS have been discussed and recent countermeasures highlighted.
The most obvious benefit from networked sensors in distributed control system is the reduction of cables, which means savings in cost and easiness in deployment and maintenance. Some current available sensor standards...
详细信息
The most obvious benefit from networked sensors in distributed control system is the reduction of cables, which means savings in cost and easiness in deployment and maintenance. Some current available sensor standards and protocols are complicate and cost for most industrial applications and low performance for real-time control systems. In this paper we propose a light-weight CAN-like sensor network protocol for real-time distributed control system with some unique features. Based on a novel event/action model, the protocol provides a resilient and scalable application layer that is independent with sensor developers and sensor users. The data link layer supports both event and master/slave communication mode, which greatly improves the real-time performance. An FPGA-based reference implementation of protocol stack is also validated on a Cyclone II development boards.
To reuse open source code it is necessary to understand how the software is implemented and how the software architecture is designed. However, it is not an easy task because open source typically does not have the de...
详细信息
To reuse open source code it is necessary to understand how the software is implemented and how the software architecture is designed. However, it is not an easy task because open source typically does not have the design document which maps features to source code components. In this paper, we propose a method to find the components relevant to a feature in open source code. Our solution is a static approach to recover the relationship between the software manual and the source code and it is based on information retrieval technique. In our approach, we build and analyze a weighted call graph using the similarity values obtained from the vector space information retrieval. Experimental application shows that our method is more robust and is less influenced by cut level than the method of Zhao et al.
Taguchi-based software metrics (numerical software measurements) define software quality in terms of "loss imparted to society" after a software product is delivered to the end user. Previous work has focuse...
详细信息
Taguchi-based software metrics (numerical software measurements) define software quality in terms of "loss imparted to society" after a software product is delivered to the end user. Previous work has focused on nominal-the-best and larger-the-best loss functions for estimating the loss to society. This paper focuses on the smaller-the-best loss function for estimating the loss to society. The smaller-the-best loss function is for a property whose value should be as small as possible. It is shown that the smaller-the-best loss function can be obtained from the nominal-the-best loss function by substituting zero for t, the target value in the nominal-the-best loss function. This derivation is illustrated and a case study utilizing the derivation is presented. Taguchi-based metrics are in line with six-sigma statistical quality control techniques that have been used with software products for several years. Experiences with Taguchi-based metrics have shown good correlation with existing popularly known software quality metrics.
暂无评论