This paper proposes a first step into a common solution, where combined and extended interests will hopefully allow us to surpass this threshold. While there are still some open issues, we hope to not only propose a b...
详细信息
This paper proposes a first step into a common solution, where combined and extended interests will hopefully allow us to surpass this threshold. While there are still some open issues, we hope to not only propose a basic working mechanism but also provide fresh ideas to start thinking off the beaten path. Our main contribution is to create a lightweight, end-to-end binding between path and service, which is then used as a basis to associate further attributes and mechanisms to this binding.
Access control and ensuring availability are important tasks for securing Web Services. Both requirements are not well studied on Web Services and especially not their interactions. However, considering this interacti...
详细信息
Access control and ensuring availability are important tasks for securing Web Services. Both requirements are not well studied on Web Services and especially not their interactions. However, considering this interaction is crucial. On one hand, access control is an established mechanism for protecting services from attacks targeting the service's availability. On the other hand, enforcing access control on Web Services is a complex task and therefore access control implementations potentially offer new possibilities for attacks. In this paper a solution for Web Service access control enforcement is presented using an event-based processing model focusing on ensuring Web Service availability.
Container-managed persistence is an essential technology as it dramatically simplifies the implementation of enterprise data access. However it can also impose a significant overhead on the performance of the applicat...
详细信息
In this paper we present a new theoretical model to assess the performance of a class of batch scheduling orders in a forward DVB-S2 satellite link. The scheduling order in a DVB-S2 link will determine the order in wh...
详细信息
In this paper we present a new theoretical model to assess the performance of a class of batch scheduling orders in a forward DVB-S2 satellite link. The scheduling order in a DVB-S2 link will determine the order in which IP packets are transmitted to the receivers and thus determines the amount of required padding and sub-optimal transmissions. The validity of the model is investigated by various simulation runs which show a very close agreement with the theoretical model. Using this model we also identify the optimal scheduling order within this class of orders, given that some mild and realistic conditions on the modulation and coding schemes apply.
In this article we present a novel packet scheduling algorithm LBFS-DRR, which combines features from the Last-Come First-Served scheduling discipline and the Deficit Round Robin (DRR) algorithm. In comparison with DR...
详细信息
ISBN:
(纸本)9781424412297;1424412293
In this article we present a novel packet scheduling algorithm LBFS-DRR, which combines features from the Last-Come First-Served scheduling discipline and the Deficit Round Robin (DRR) algorithm. In comparison with DRR it provides lower average packet delay, while preserving the advantageous feature like O(l) complexity, fairness, bandwidth guarantee. The lower mean delay is realized by giving service in a round first to flows transmitting bellow their (weighted) fair share. The algorithm exploits the high variability in the typical user traffic pattern resulting in lower mean file transfer delay.
In today's world of pervasive computing, the mobile devices are enriched with a variety of features and being used as a personal information delivery platform. The increased processing, storage and communication c...
详细信息
In today's world of pervasive computing, the mobile devices are enriched with a variety of features and being used as a personal information delivery platform. The increased processing, storage and communication capabilities of these devices combined with the latest developments in the area of service oriented architecture enables a new class of services, called nomadic mobile services (NMS). Recent research has resulted in different NMS provisioning approaches; each one employs/defines a different architecture and addresses a different mix of issues. This paper provides a comparative study of three NMS provisioning approaches based on their architectural design, development choices and prototyped applications. Each approach has its own merits considering the applications they aim at. However, in the future, a solution which uses Web services for better interoperability and employs proxy approach for better QoS could be a possible technical design.
A free spectral range matched scanning interrogator has been proposed and demonstrated with an ultra high wavelength resolution of 5 pm. This system has great applications for wavelength-modulated distributed sensors ...
详细信息
ISBN:
(纸本)9781424436484
A free spectral range matched scanning interrogator has been proposed and demonstrated with an ultra high wavelength resolution of 5 pm. This system has great applications for wavelength-modulated distributed sensors and multiple temperature/stress sensor arrays.
The latest trends in distributed and mobile collaboration technologies allow people to move across team forms and organizational boundaries as well as to collaborate among/in organizations and communities. The ability...
The latest trends in distributed and mobile collaboration technologies allow people to move across team forms and organizational boundaries as well as to collaborate among/in organizations and communities. The ability to query the company's distributed knowledge base and to cooperate with co-workers is still a requirement, but new paradigms such as service-oriented computing increased pervasiveness, and mobility enable new scenarios and lead to higher complexity of systems. Independently of the business domain, private "collaboration" has become a hot issue. Virtual communities, may these be social networks or virtual enterprises, have enjoyed a tremendous popularity recently and are starting to require functionalities for collaboration in the broadest sense similar to those in business environments. The wide-spread availability of mobile devices makes support for mobility an arising topic in this domain as well.
Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymme...
详细信息
Challenging networks require transmission protocols able to deal with the specificities of the environment. These adverse conditions include very long delays (delays in hours are normal), episodic connectivity, asymmetric data rates, higher bit error rate (The raw BERs are in the order of 10 -2 ), very high free space losses (around 250-300 dB) and power constraints that may severely compromise the effectiveness of standard transport protocols. Transmissions protocols must also relieve applications and other upper-layer protocols (like the bundle protocol from the Delay Tolerant Network architecture) from the need to deal with the characteristics of intervening communications networks and services. In this paper we analyse the impacts of parameters such as loss probability and propagation delay on Licklider Transmission Protocol (LTP) [1], [2] and the newly proposed Licklider Transmission Protocol-(LTP-T) [3] following a comparative study of both the protocols.
暂无评论