In this paper, we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic network. The dual line graph of a directed cyclic graph is considered as a system...
详细信息
In 2006, Jun et al presented a novel non-interactive verifiable secret sharing scheme constructed by Shamir's secret sharing scheme for secure multi-party communication protocol in distributed networks. In their s...
详细信息
The research recently focuses on the integration of peer-to-peer frame as incremental improvements to botnet. In hybrid P2P botnet, it is important to find a mechanism to select neighbor list for every super node, in ...
详细信息
OSGi is a widely used service-oriented platform which provides support for the development and execution of component-based e-business applications. The component monitoring of OSGi-based software is important to the ...
详细信息
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented ...
详细信息
With the great success of internet technology, internetware has become one of the most important software paradigms. But the open, dynamic and uncertain network makes it difficult to guarantee the performance of inter...
详细信息
In this paper, we present a periodic authentication scheme of integrity measurements based on TNC architecture. In TNC architecture, server authenticates security posture of endpoint before an endpoint is allowed to a...
详细信息
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. M...
详细信息
This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov...
详细信息
This paper presents a chaotic control method on network traffic. By this method, the chaotic network traffic can be controlled to pre-assigned equifibrium point according to chaotic prediction and the Largest Lyapunov Exponent (LLE) of the traffic on congested link is reduced, thereby the probability of traffic burst and network congestion can be reduced. Numerical examples show that this method is effective.
Building a software failure model (SFM) is an important means to compute the software reliability. While there are not enough faults data, the estimation for model parameters is not accurate, which would decrease the ...
详细信息
暂无评论