In this paper, a new encryption mode, which we call the 2D-Encryption Mode, is presented. 2D-Encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical prop...
详细信息
In this paper, a new encryption mode, which we call the 2D-Encryption Mode, is presented. 2D-Encryption Mode extends ID-encryption modes, as ECB, CBC and CTR, to two dimensions. It has good security and practical properties. We first look at the type of problems it tries to solve, then describe the technique and its properties, and present a detailed mathematical analysis of its security, and finally discuss some practical issues related to its implementation.
In this paper we describe a mechanism for redundant multicast transmission of multimedia data supporting adaptive QoS over the Internet and we investigate its behaviour using simulation. There are two major issues tha...
详细信息
In this paper we describe a mechanism for redundant multicast transmission of multimedia data supporting adaptive QoS over the Internet and we investigate its behaviour using simulation. There are two major issues that have to be considered when designing and implementing such a mechanism, the fairness, which is the ability to cope with receiver heterogeneity, and the adaptation schemes. The proposed mechanism uses a friendly to the network users congestion control policy to control the transmission of the data. We evaluate the adaptive multicast transmission mechanism through a number of simulations in order to examine its behaviour to a heterogeneous group of receivers and its behaviour against TCP and UDP data streams. The main conclusion of the simulation was that the proposed mechanism has friendly behaviour against the dominant traffic types of today's Internet and treats a heterogeneous group of receivers with fairness.
Simulation has always been a valuable tool for experimentation and validation of models, architectures and mechanisms in the field of networking. In the case of the DiffServ framework, simulation is even more valuable...
详细信息
Simulation has always been a valuable tool for experimentation and validation of models, architectures and mechanisms in the field of networking. In the case of the DiffServ framework, simulation is even more valuable, due to the fact that an analytical approach of mechanisms and services is infeasible because of the aggregation and multiplexing of flows. In this work, we have extended the functionality of a widely used simulation environment towards the direction of realistic traffic generation and a series of mechanisms defined by the DiffServ architecture. The modules created are being presented and a case study of a simulation scenario that exploits the functionality provided by them is described.
We study the problem of allocating optical bandwidth to sets of communication requests in all–optical networks that utilize Wavelength Division Multiplexing (WDM). WDM technology establishes communication between pai...
详细信息
Shared or networked virtual environments are one of the most promising uses of the virtual reality technology. While a lot of research has been done in the area of multi-user virtual environments corresponding to the ...
详细信息
ISBN:
(纸本)0769511988
Shared or networked virtual environments are one of the most promising uses of the virtual reality technology. While a lot of research has been done in the area of multi-user virtual environments corresponding to the sharing of events very few research has been done on specific services and functionality. However both the requirements and the kind of the offered services affect significantly the design of a system. In this paper we present the main issues in the design of a platform to support the distant education process using networked virtual environments. We also introduce the term Educational Virtual Environments and their basic requirements. According to these requirements of the educational virtual environments we propose both a suitable architecture and a protocol for the interaction between the components of this architecture.
Motivated by the problem of WDM routing in all–optical networks, we study the following NP–hard problem. We are given a directed binary tree T and a set R of directed paths on T. We wish to assign colors to paths in...
详细信息
A virtual reality system for the hand acupuncture treatment is proposed. The hand acupuncture, called sujichim, is mostly conducted at home and many people try to learn and apply it to the health care of their family....
详细信息
ISBN:
(纸本)1586030140
A virtual reality system for the hand acupuncture treatment is proposed. The hand acupuncture, called sujichim, is mostly conducted at home and many people try to learn and apply it to the health care of their family. Using our system, a novice can easily perform the acupuncture by himself to improve his body condition. According to the experiments, our system is proved to be very effective and easy to use.
This paper presents a decision-tree approach to the problems of part-of-speech disambiguation and unknown word guessing as they appear in Modern Greek, a highly inflectional language. The learning procedure is tag-set...
详细信息
It is a classical result from graph theory that the edges of an l-regular bipartite graph can be colored using exactly l colors so that edges that share an endpoint are assigned different colors. In this paper we stud...
详细信息
暂无评论