Unsegmented network coding was incorporated into opportunistic routing to improve inefficient schedule of segmented network coding due to delayed feedback. However, most unsegmented network coding schemes fail to cons...
详细信息
ISBN:
(纸本)9781467304375;9781467304368
Unsegmented network coding was incorporated into opportunistic routing to improve inefficient schedule of segmented network coding due to delayed feedback. However, most unsegmented network coding schemes fail to constrain the size of decoding window. Large decoding window not only challenges limited computational ability and decoding memory in practical environments, but also introduces large decoding delay, which is undesirable in delay sensitive applications. In this paper, we prove that the possibility of unacceptably large decoding window is innegligible, and verify the necessity of handling decoding window. To solve the issue, we argue that the number of unknown packets injected into the network must be strictly constrained at the source. Based on the idea, we improve unsegmented network coding scheme for opportunistic routing. Simulation results shows that the solution is robust to losses. In addition, to achieve optimal throughput, the redundancy factor should be selected larger than the reciprocal of end-to-end delivery ratio.
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep...
详细信息
ISBN:
(纸本)9781479904327
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keeping acceptable bandwidth utility and system scalability. In this paper, we present an architecture of dynamic bandwidth allocation and guarantee on resource fairness, to provide network performance isolation and protocol independent bandwidth guarantees. In this paper, we first discuss the business model of bandwidth guarantee for Infrastructure-as-a-Service (IaaS) cloud, and a bandwidth allocation algorithm based on redefined fairness model is proposed and realized under the novel architecture, and finally experiment shows satisfying results under various communication scenarios.
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut...
详细信息
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authority in key policy attribute-based encryption scenario,and then give a *** addition,our scheme is shown to be secure in the standard model under the modified Bilinear Decisional Diffie-Hellman (mBDDH) assumption.
In this paper, the key-frame extraction for video clips which are captured by smart phones are investigated. A weighted temporal consistent fuzzy clustering technology is used to cluster the video frames. The image-le...
详细信息
ISBN:
(纸本)9781479927456
In this paper, the key-frame extraction for video clips which are captured by smart phones are investigated. A weighted temporal consistent fuzzy clustering technology is used to cluster the video frames. The image-level feature and the orientation information are combined into the feature vector and the accelerate values are used to determine the weight. Such a method sufficiently exploits the spatio-temporal characterizes of the video clips captured by smart phones. The algorithm is implemented in a Sumsung Nexus S smart phone and we make an extensive experimental validation.
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio...
详细信息
Probabilistic relational PCA (PRPCA) can learn a projection matrix to perform dimensionality reduction for relational data. However, the results learned by PRPCA lack interpretability because each principal component ...
详细信息
Opportunistic routing emerged as a novel technique to cope with the problem of highly unpredictable and lossy wireless channels in urban wireless mesh networks. However, existing opportunistic routing protocols only c...
详细信息
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ...
详细信息
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where delegation of signing rights is common. Certificate less public key cryptography eliminates the complicated certificates in traditional public key cryptosystems without suffering from the key escrow problem in identity-based public key cryptography. In this paper, we reveal the relationship between the two important primitives of proxy signatures and certificate less signatures and present a generic conversion from the latter to the former. Following the generic transformation, we propose an efficient proxy signature scheme with a recent certificate less signature scheme.
Recent technological trends have pushed concurrency and mobile computing to the mainstream. Too many semantics have been proposed to picture the behavior of concurrent systems, and their relationship has been a hot to...
详细信息
The problem of server sprawl is common in today's data centers. Virtualization-based server consolidation is a vital mechanism to solve the server sprawl problem in modern data centers by consolidating multiple vi...
详细信息
暂无评论