Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload en...
详细信息
ISBN:
(纸本)0889864470
Current high speed networks cannot be fully utilized by today's high end systems. The processing requirements of next generation network protocols require intelligent network cards with network protocol offload engines, for example based on a network processor. To reduce development time, we reuse existing software protocol stack implementations for partitioning and implementing on the network card. Though, manual partitioning is very time-consuming due to the complex protocol stacks. We outline an approach for tool supported software partitioning even for complex C source code.
This paper describes a music searching system based on an automatic indexing process created over a pattern recognition tool and MPEG-7 standard. We present a complete analysis of the involved technologies integration...
详细信息
This paper describes a music searching system based on an automatic indexing process created over a pattern recognition tool and MPEG-7 standard. We present a complete analysis of the involved technologies integration process and show a reference measure in the feasibility of this kind of application not only in the research environment but also in the production of real systems.
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these...
详细信息
ISBN:
(纸本)0889863989
Gigabit networks can not be fully utilized by today's end systems. The processing requirements of next generation network protocols with enabled encryption features will aggravate this situation. To overcome these shortcomings this paper presents an approach and prototype implementation for hardware support of IP/IPsec protocols. We out-line a hardware/software partitioning, where the data path of the IP/IPsec protocol is accelerated by a network processor. In contrast to other approaches, we reuse existing software protocol stack implementations.
Future network should be able to efficiently serve packet-based networks, such as the Internet. In this paper, based on results from COST 266, we explore characteristics of Optical Burst switching (OBS) and Optical Pa...
详细信息
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs...
详细信息
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs...
This paper reflects on existing caching concepts in proxies and stubs of component technologies and lines out their advantages and deficiencies. A new concept is introduced that averts proliferation of component stubs on client side while transparently providing efficient caching of attributes that doesn't require any changes to existing code at all. Common object-oriented design facilities and code generation tools are leveraged to support seamless integration of these caching concepts into the development cycle.
Focuses on Dempster-Schafer (D-S) evidence theory and fuzzy logic based information fusion methodology for telecommunication network management The production rules, fuzzy relations and fuzzy rules for fault diagnosis...
详细信息
Focuses on Dempster-Schafer (D-S) evidence theory and fuzzy logic based information fusion methodology for telecommunication network management The production rules, fuzzy relations and fuzzy rules for fault diagnosis are multi-source. The multi-source information should be fused to achieve more comprehensive information.. The fusion algorithms for production rules are presented, including the factor coordinator algorithm, sequential iteration algorithm and evidence theory based algorithm. The same is done for fuzzy relations and fuzzy rules. Furthermore, in order to get more reliable diagnosis results, the D-S evidence theory is adopted to fuse the fault diagnosis results from the experts, expert system and fuzzy reasoning system.
This paper presents the present study and research of knowledge discovery in database, points out the shortcoming of the classical a priori algorithm. Our research proposes the AprioriNEW algorithm based on reducing d...
详细信息
This paper presents the present study and research of knowledge discovery in database, points out the shortcoming of the classical a priori algorithm. Our research proposes the AprioriNEW algorithm based on reducing database, and analyses and appraises this algorithm in progress. The algorithm has been applied to mine the trap information in the network management.
Considering video transmission over an ATM network for a video on demand system, we propose a server of quality (SoQ) that has the main function of fitting the video transmission rate to the available network bandwidt...
详细信息
ISBN:
(纸本)0780370937
Considering video transmission over an ATM network for a video on demand system, we propose a server of quality (SoQ) that has the main function of fitting the video transmission rate to the available network bandwidth. The SoQ uses a "backpropagation" neural network to fit the MPEG quantization coefficients in a nonlinear way. Here are shown the SoQ specification and the results obtained from its main module implementation.
In this paper, we present a knowledge discovery system, Data Fusion Supported Frequent Episodes Discovery (DFSPED), for service-oriented proactive fault management in communication networks. The concept of network ser...
详细信息
In this paper, we present a knowledge discovery system, Data Fusion Supported Frequent Episodes Discovery (DFSPED), for service-oriented proactive fault management in communication networks. The concept of network service topology is proposed first, and context-free grammars and network service dependence graph are used to model the service-oriented proactive fault management. Secondly, with the approaches of data fusion, two catalogues of important fault-pertinent data sources, i.e., service-oriented trouble-reporting data and real time alarm messages, are fused by temporal and spatial associations. KDD techniques are applied to perform incremental mining in the fused sequential events, finding frequent episodes among faults, alarms and service. Fast restoration of key service interruption, fault prediction and preventive maintenance benefit a lot from the discovered episodes.
暂无评论