The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development o...
详细信息
The introduction of third generation mobile communicationsystems allows the service providers to offer a large variety of services which are in the Universal Mobile Telecommunication System subsumed under the categor...
详细信息
The introduction of third generation mobile communicationsystems allows the service providers to offer a large variety of services which are in the Universal Mobile Telecommunication System subsumed under the categories conversational, streaming, interactive and background class. While the conversational and streaming classes have a guaranteed bandwidth and delay, the interactive and background class consume the remaining system capacity. On the downlink this system capacity is limited by the base station transmit power and on the uplink by the interference. In our analysis we approximate the capacity which the services with quality of service leave for best-effort services belonging to the interactive class. The background class is neglected. We focus our analysis on the downlink since for UMTS the expected traffic is assumed to be asymmetric with the bulk of it towards the mobile station and derive the distribution of the bandwidth available for best-effort users according to a spatial user distribution.
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of resources distributed across multiple ad...
详细信息
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of resources distributed across multiple administrative domains, organizations and enterprises. To accomplish this, Grids need infrastructure that supports various services: security, uniform access, resource management, scheduling, application composition, computational economy, and accounting. Although several initiatives are engaged in the development of Grid technologies, Grid accounting issues are yet to be addressed. To overcome this limitation, we propose a new infrastructure called GridBank that provides services for accounting. The support of computational economy and accounting services can lead to a self-regulated accountability in Grid computing. This paper presents requirements of Grid accounting and different economic models within which it can operate and proposes a Grid Accounting Services Architecture to meet them. The paper highlights implementation issues with a detailed discussion on the format for various records/databases that the GridBank needs to maintain. It also presents protocols for interaction between the GridBank and various components within Grid computing environments.
Several experiments and observations have revealed the fact that small local distinct structural features in RNA molecules are correlated with their biological function, for example in post-transcriptional regulation ...
详细信息
Several experiments and observations have revealed the fact that small local distinct structural features in RNA molecules are correlated with their biological function, for example in post-transcriptional regulation of gene expression. Thus, finding similar structural features in a set of RNA sequences known to play the same biological function could provide substantial information concerning which parts of the sequences are responsible for the function itself. The main difficulty lies in the fact that in nearly all the cases the structure of the molecules is unknown, has to be somehow predicted, and that sequences with little or no similarity can fold into similar structures. The algorithm we present searches for regions of the sequences that, according to base pairing rules, can fold into similar structures, where the degree of similarity can be defined by the user. Any information concerning sequence similarity in the motifs can be used either as a search constraint, or a posteriori, by post-processing the output. The search for the regions sharing structural similarity is implemented with the affix tree, a novel text-indexing structure that significantly accelerates the search for patterns having a symmetric layout, like those forming RNA hairpins. Tests based on experimentally known structures have shown that the algorithm is able to identify functional motifs in the secondary structure of non coding RNA, such as Iron Responsive Elements (IRE) in the untranslated regions of ferritin mRNA, and the domain IV stem-loop structure in SRP RNA.
This paper surveys and investigates the strengths and weaknesses of a number of recent approaches to advanced workflow modelling. Rather than inventing just another workflow language, we briefly describe recent workfl...
详细信息
Intrusion Tolerant systems provide high-integrity and high-availability services to their clients in the face of successful attacks from an adversary. The Intrusion Tolerant distributed Object systems (ITDOS) research...
详细信息
Scaling network intrusion detection to high network speeds can be achieved using multiple sensors operating in parallel coupled with a suitable load balancing traffic splitter. This paper examines a splitter architect...
详细信息
Scaling network intrusion detection to high network speeds can be achieved using multiple sensors operating in parallel coupled with a suitable load balancing traffic splitter. This paper examines a splitter architecture that incorporates two methods for improving system performance: the first is the use of early filtering where a portion of the packets is processed on the splitter instead of the sensors. The second is the use of locality buffering, where the splitter reorders packets in a way that improves memory access locality on the sensors. Our experiments suggest that early filtering reduces the number of packets to be processed by 32%, giving a 8% increase in sensor performance, while locality buffers improve sensor performance by about 10%. Combined together, the two methods result in an overall improvement of 20% while the performance of the slowest sensor is improved by 14%.
In this paper the forward link performance of a satellite based UMTS system designed for the delivery of mul- timedia broadcast multicast services is investigated for different physical layer paramete
In this paper the forward link performance of a satellite based UMTS system designed for the delivery of mul- timedia broadcast multicast services is investigated for different physical layer paramete
Adaptive resource management (ARM) technology has emerged as a way to: (1) support applications' varying resource needs, and (2) provide reusable solutions to commonly occurring problems. Most existent works on AR...
详细信息
Adaptive resource management (ARM) technology has emerged as a way to: (1) support applications' varying resource needs, and (2) provide reusable solutions to commonly occurring problems. Most existent works on ARM have focused on centralized approaches. However, centralized ARMs are not scalable, which may result in slow responses and wrong allocation decisions based on inaccurate system state information. In this paper, we show how to address these problems with a decentralized resource management approach. Based on social models, the approach appears to have the potential to provide prompt and accurate allocation of resources.
The spreading of Ethernet TCP/IP protocol suite based communication in automation systems has raised new questions concerning data consistency and security. We introduce temporal-logic RBAC as a method to formalise th...
详细信息
The spreading of Ethernet TCP/IP protocol suite based communication in automation systems has raised new questions concerning data consistency and security. We introduce temporal-logic RBAC as a method to formalise the security relevant access constraints for an agent based control system. We also offer some examples of such formalised constraints generated from constraints that were originally written down in human language. The authors point out that temporal-logic RBAC might thus be helpful to cope with the new problems of information security in plant automation.
暂无评论