In this paper, we provide a generalized file replication scheme with a storage load balancing function in unstructured P2P file-sharing networks. The generalized file replication scheme is expressed as a weighted mixt...
详细信息
Packet-level erasure correction is considered for downstream packets each of which is delivered from a base station to an individual receiver (i.e., user) over a lossy shared wireless network where only a very limited...
详细信息
The paper analyzes the security of conventional network access authentication technology and provides a novel IP address pair based short signature technology which strengthens the security of authentication and contr...
详细信息
Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MA...
详细信息
A series of support vector machine (SVM) forecast experiments are carried out to reveal the relation between the SVM training sample size and SVM correct forecast ratio for simulation experiment results. Experiment re...
详细信息
A new Beowulf Clusters with IBM blade HS22 and DELL PC 755 has been built to perform parallel atomistic MD simulations. Lysozyme hydration was used as a model system to evaluate the system performance with different n...
详细信息
SERVQUAL model has been used to measure service quality in different industries. In most cases, this model was validated by confirmatory factor analysis approach. The objective of this research is to validate SERVQUAL...
详细信息
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more ...
详细信息
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more robust and sophisticated solutions. This paper proposes an intuitive obfuscation-based scheme, which uses vagueness in human perception of nearness to provide a flexible and robust location privacy scheme. Key to this work is the concept of vagueness degree, which aims to enhance its robustness against privacy attacks. Furthermore, our scheme is totally in line with human perception of privacy and provides a solution, which mostly suits proximity-based services, social networking environments, and other similar applications. The solution is also applicable to various environments ranging from geographical locations to IP-based and mobile networks. We propose three privacy-aware architectures for our scheme. In addition, it is shown that the time and space complexity of the scheme is polynomial. The robustness of the scheme against privacy attacks as well as its implementation issues are discussed.
As a local mobility management protocol, Proxy Mobile IPv6 (PMIPv6) is designed to enable mobile nodes to move in a domain without any involvement in the mobility signalling operation. However, a single domain cannot ...
详细信息
ISBN:
(纸本)9781424451753
As a local mobility management protocol, Proxy Mobile IPv6 (PMIPv6) is designed to enable mobile nodes to move in a domain without any involvement in the mobility signalling operation. However, a single domain cannot satisfy mobile nodes' movement requirement. Hence, we propose a solution to enable mobile nodes to move across multiple PMIPv6 domains. We introduce a new network entity called traffic distributor (TD) to manage the inter-domain handover. Through redirecting the traffic to the domain which currently visited by the mobile node, TD can ensure mobile node continue its session even when it moves across domains. We conduct a series of experiments to compare our proposal with Neumann proposal which is another proposal to handle inter-PMIPv6-domain issues. Experimental results show that our proposal is a viable alternative for inter-domain handover, it can outperform Neumann proposal in terms of binding cache entry numbers,transmission delay and handover delay.
In this paper, we develop an opportunistic spectrum scheduling scheme for cognitive radio networks. In the proposed scheme, the channel status (i.e., whether being occupied by primary users) and the instantaneous chan...
详细信息
In this paper, we develop an opportunistic spectrum scheduling scheme for cognitive radio networks. In the proposed scheme, the channel status (i.e., whether being occupied by primary users) and the instantaneous channel quality (SNR at the secondary receiver) are assumed to vary fast within a frame which consists of a fixed number of slots. At each scheduling epoch, each secondary user will observe the channel conditions, namely the channel status and the channel quality. Based on the queue size and the observed channel conditions, each secondary user will estimate the throughput for each channel over the frame to be scheduled. A scheduling algorithm is performed to maximize the expected aggregate throughput of all the secondary users. The performances of the proposed scheduling scheme in terms of throughput and percentage of packet drop are evaluated.
暂无评论