Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literatur...
详细信息
ISBN:
(纸本)0769511864
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literature, not much work is found to provide QoS guarantees based on fault tolerance. Reliability of network links is considered as one of the parameters when providing QoS guarantees to applications. Considering reliability of network links as a parameter for QoS guarantees gives the applications more flexibility in choosing the network resources. A new terminology for dispersity routing is presented which will be useful in providing QoS guarantees based on reliability. Dispersity routing transmits the traffic along multiple paths. Also, a reliable backup resource allocation method is presented that can be used in the context of dispersity routing for fault tolerant real-time networks. An assumption is made that higher capacity is assigned to the links which are more reliable. This will help in availability of resources for a longer period of time. Also, reliability of links is considered to compute multiple paths along with shortest path metric.
This is a case study on using a DSP board to construct an encryption/decryption module embedded in a e-commerce Web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algori...
详细信息
This is a case study on using a DSP board to construct an encryption/decryption module embedded in a e-commerce Web server. The idea of using DSP is to push beyond the key length limits of encryption/decryption algorithms and computational power in a software environment while avoiding the heavy investment in a dedicated hardware encryptor/encryptor. The low cost, high computational power, high flexibility of DSP and the ubiquitous availability of a PC peripheral component interconnect slot for the DSP can provide any Web browser or Web server an excellent cost-effective option to improve the security level of Internet applications. The paper provides a step-by-step procedure and reveals every detail of a successful implementation of a DSP RSA encryptor/decryptor for an e-commerce Web server by using the latest TMS320C6000/sup TM/ Evaluation Module (EVM) DSP hardware. A strong prime concept and Garner algorithm are introduced to generate more secure keys and compute encryption/decryption more efficiently than that of recent publications. Experiments show that the performance of using DSP hardware encryption can be 300 times faster than that in software environment.
This paper introduces the invocation profile as the basis for a suite of metrics to indicate the presence and mix of object-oriented mechanisms in a system written in an object-oriented language. This addresses concer...
详细信息
This paper presents a mechanism for active resource management (ARM) in a differentiated services environment.. While the differentiated services architecture and the bandwidth broker agent provide a mechanism for QoS...
详细信息
ISBN:
(纸本)0769515282
This paper presents a mechanism for active resource management (ARM) in a differentiated services environment.. While the differentiated services architecture and the bandwidth broker agent provide a mechanism for QoS management through resource reservation, this mechanism is based on a static provisioning of resources. As bandwidth requirements are typically dynamic, such a static reservation approach can either lead to wasted bandwidth or leave applications resource-starved. The active resource management approach presented in this paper addresses this problem by dynamically, reallocating resources based on current network state and applications requirements. An implementation and evaluation of ARM using the NS-2 simulation toolkit is also presented.
E-businesses are increasingly looking towards data mining systems for meeting their business intelligence needs. However, the current state of the art in data mining does not allow any one system to be able to meet th...
详细信息
ISBN:
(纸本)0769509819
E-businesses are increasingly looking towards data mining systems for meeting their business intelligence needs. However, the current state of the art in data mining does not allow any one system to be able to meet the diverse business intelligence needs of e-businesses. A second bottleneck is the high initial cost involved in establishing data mining infrastructure within an organisation. We propose the concept of a federated data mining system hosted by an Application Service Provider (ASP) as a means of alleviating the bottlenecks of high cost and diverse data mining needs. We also present an XML DTD, which provides the basis for data mining systems to describe their services and architecture to the rest of the federation.
The paper addresses two fundamental aspects of content based image retrieval (CBIR) systems: visual feature extraction and retrieval system design which uses multiple regions-of-interest (ROIs) as the key to retrieve ...
详细信息
ISBN:
(纸本)9628576623
The paper addresses two fundamental aspects of content based image retrieval (CBIR) systems: visual feature extraction and retrieval system design which uses multiple regions-of-interest (ROIs) as the key to retrieve relevant images. Visual feature extraction is performed on all images in the database where each image is segmented into a number of homogenous regions. Low-level attribute calculation is performed on each region whose color and texture information is obtained using color histogram analysis and wavelet decomposition, respectively. The proposed retrieval system supports queries based on system-user interaction that takes into account the user's requirements. The implementation of binary color sets is employed to ensure efficiency of the system. Several multiple regions-of-interest query strategies have been adopted which use statistical analysis and a hierarchical framework to improve the retrieval results. These schemes are compared with the single ROI retrieval methods. Experimental results show the Multiple ROI query strategies perform better than other existing methods, such as those using global features or single ROI.
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the def...
详细信息
ISBN:
(纸本)0769513069
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the defect content after a review. The methods are highly reliant on the quality of the data. If the number of reviewers is fairly small, it becomes difficult or even impossible to get reliable estimates. This paper presents a comprehensive study of estimates based on two reviewers, using real data from reviews. Three experience-based defect content estimation methods are evaluated vs. methods that use data only from the current review. Some models are possible to distinguish from each other in terms of statistical significance. In order to gain an even better understanding, the best models are compared subjectively. It is concluded that the experience-based methods provide some good opportunities to estimate the defect content after a review.
This paper presents a softwareengineering process that includes family-based aspects for aero-engine control software. The process uses a "family capability" derived from family analysis of the embedding sy...
详细信息
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, repor...
详细信息
ISBN:
(纸本)0769512127
This past October, the Associated Press reported that for over a month hackers effectively penetrated Microsoft's firewall and, potentially, had access to source code for future products. Over the past year, reported commercial espionage has been increasing steadily. These events underscore the necessary for security engineers to define and implement strong information assurance infrastructures. The concept of defense in depth is used to provide sufficient detection and defensive countermeasures to ensure an enterprise's information is protected. Over the past three years, Harris has conducted research leading to the development of an assurance superstructure tool: the Integrated Design Environment for Assurance (IDEA). Building upon concepts developed during the Network Vulnerability Tool (NVT) program, the IDEA program refined the design and provides a comprehensive assurance analysis superstructure. The IDEA program benifited from the NVT architecture to gain greater adaptive capabilities to address the evolving capabilities of external vulnerability assessment and risk management tools. This re-architected solution builds upon lessons learned during the NVT project.
暂无评论