China is currently one of the fastest growing P2P streaming media in the world, with the consumer scaled up and enhancing the financial gain. The service information of P2P streaming media could help indicating the op...
详细信息
China is currently one of the fastest growing P2P streaming media in the world, with the consumer scaled up and enhancing the financial gain. The service information of P2P streaming media could help indicating the operators’ development and providing effective network content supervision. Moreover, the user behavior information plays an important role for raising the quality of network operators’ service. This paper proposed and has realized a system for active achieving P2P streaming media information. The system takes P2P streaming media traffic identification and user behavior identification technology as the core, mainly uses the network programming to forge a message in order to active achieving the service information and user behavior information which the P2P steaming media servers replied. Then the system could present the characteristic of diverse P2P streaming media business and user behavior through the friendly interface, directly and clearly.
J2EE and XML Development is a rich yet concise guide. It teaches you how, where, and why to use XML in each layer of your J2EE application. It categorizes and explains many recent Java and XML technologies and ways in...
详细信息
ISBN:
(纸本)9781930110304
J2EE and XML Development is a rich yet concise guide. It teaches you how, where, and why to use XML in each layer of your J2EE application. It categorizes and explains many recent Java and XML technologies and ways in which a J2EE application can best use them. It untangles the web of Java APIs for XML, including the JAX family, as well as other popular emerging standards like JDOM, explaining each in terms of its functionality, and illustrating its intended use through examples.
We have proposed the extended seminaive optimization technique for Netlog language,a rule based language suited for network *** extended seminaive optimization is a bottom-up evaluation technique optimizes the bottom ...
详细信息
We have proposed the extended seminaive optimization technique for Netlog language,a rule based language suited for network *** extended seminaive optimization is a bottom-up evaluation technique optimizes the bottom up evaluation of rule based languages by avoiding the repeated computation has been done in previous *** addition,we compared the efficiency of the extended seminaive evaluation method and the nave evaluation method of different *** nave method is the basic bottom up evaluation technique for rule based languages.
Existing code update protocols target efficiency and assume correct behavior from participating sensor nodes. This work aims for the progressive, resource sensitive verification of code updates in sensor networks to e...
详细信息
ISBN:
(纸本)9781595930545
Existing code update protocols target efficiency and assume correct behavior from participating sensor nodes. This work aims for the progressive, resource sensitive verification of code updates in sensor networks to ensure that unauthorized updates from malicious nodes are not propagated, while correct updates continue to be efficiently disseminated.
A confluence occurs when two rivers flow together; downstream the combined forces gather strength and propel their waters forward with increased vigor. In academic research, according to Varghese, a confluence occurs ...
详细信息
ISBN:
(纸本)9781450335492
A confluence occurs when two rivers flow together; downstream the combined forces gather strength and propel their waters forward with increased vigor. In academic research, according to Varghese, a confluence occurs after some trigger, perhaps a discovery or a change in technology, and brings two previously separate branches of research together. In this talk, I will discuss confluences in programming languages research. Here, confluences often occur when basic research finds application in some important new domain. Two prime examples from my own career involve the confluence of research in type theory and systems security, triggered by new theoretical tools for reasoning about programming language safety, and the confluence of formal methods and networking, triggered by the rise of data centers. These experiences may shed light on what to teach our students and what is next for programming languages research.
network programs are difficult to test, especially under the large space of network program behavior defined by packet dynamics such as packet delay and packet loss. It is unlikely for common approaches using testbeds...
详细信息
ISBN:
(纸本)9781479959532
network programs are difficult to test, especially under the large space of network program behavior defined by packet dynamics such as packet delay and packet loss. It is unlikely for common approaches using testbeds with random packet dynamics to cover the prohibitively large number of packet dynamics possibilities in a limited time. In this paper, we leverage symbolic execution to find the equivalence classes of packet dynamics which lead to exactly the same network program behavior, in order to efficiently check the large space of network program behavior. Specifically, we propose and develop a network program test platform, called Symbolic Packet Dynamics (SPD), to automatically and transparently test unmodified network programs for low-probability bugs and extreme-case performance under packet dynamics. SPD uses symbolic representation of packet dynamics, instead of random packet dynamics. Our experiments show that SPD can achieve significantly much higher packet dynamics coverage than random packet dynamics within the same amount of time, and thus it is much easier and takes much shorter time for SPD to detect low-probability bugs and extreme-case performance.
Any change in resource planning may lead to change in project duration and resources cost which will impact the total cost of the project when risk factors are taken into account. A neural network model for resource s...
详细信息
Any change in resource planning may lead to change in project duration and resources cost which will impact the total cost of the project when risk factors are taken into account. A neural network model for resource scheduling to minimize the total cost of a project was proposed to improve the situation and Morte Carlo simulation and genetic algorithm were used to solve it. A case study based on the Neural network model shows the optimization model is better than the Critical Path Method (CPM) network model.
From the Publisher: Java RMI contains a wealth of experience in designing and implementing Java's Remote Method Invocation. If you're a novice reader, you will quickly be brought up to speed on why RMI is s...
详细信息
ISBN:
(纸本)9781565924529
From the Publisher: Java RMI contains a wealth of experience in designing and implementing Java's Remote Method Invocation. If you're a novice reader, you will quickly be brought up to speed on why RMI is such a powerful yet easy to use tool for distributed programming, while experts can gain valuable experience for constructing their own enterprise and distributed systems. With Java RMI , you'll learn tips and tricks for making your RMI code excel. The book also provides strategies for working with serialization, threading, the RMI registry, sockets and socket factories, activation, dynamic class downloading, HTTP tunneling, distributed garbage collection, JNDI, and CORBA. In short, a treasure trove of valuable RMI knowledge packed into one book.
The article focuses on the development of the Operations Research Software Exchange Program, a system that offers possibilities for teaching, checking up knowledge and applications of network optimization. The basic t...
详细信息
The article focuses on the development of the Operations Research Software Exchange Program, a system that offers possibilities for teaching, checking up knowledge and applications of network optimization. The basic topics covered are dual graphs, Eulerian cycles, optimum spanning trees, critical paths, maximum flows, minimum cost flows and other problems. The aim of the course is to get more familiar with certain basic problems and algorithms using a personal computer. All variants have a cyclic structure and it is possible to solve a large number of examples.
Minimum cost network flow problems with a piecewise linear convex cost function are used to model various optimization problems. They are also used extensively to approximate nonlinear cost functions which may otherwi...
详细信息
暂无评论