In recent years, several new TCP congestion control algorithms have been proposed to improve TCP performance for networks of high bandwidth delay products. Satellite-HAP networks providing high-speed data transmission...
详细信息
Virtual reality(VR) games have been popular in recent years, developed in the form of the games by capturing the body's various physiological activities, including the surrounding environmental factors to achieve ...
详细信息
DTN is developed as an emerging networktechnology which is mainly used in network with long waiting time, intermittent connectivity, and other extreme environments network. It has be favored in the military, transpor...
详细信息
We investigate the average Level Crossing Rate (LCR) and Average Fading Duration (AFD) of multiuser single relay co- operation wireless uplinks over independent and non-identically distributed (***.d) Ray- leigh...
详细信息
We investigate the average Level Crossing Rate (LCR) and Average Fading Duration (AFD) of multiuser single relay co- operation wireless uplinks over independent and non-identically distributed (***.d) Ray- leigh fading channels. We first present the statistical analyses of the first-hop equivalent envelope. Then, we investigate the LCR and AFD of an equivalent end-to-end envelope, and present the closed-form solutions to LCR and AFD, which are given with integral forms. Finally, we derive the Laplace approximations of LCR and AFD as well as the upper and lower bounds. The numerical results of LCR show that the upper bound is tight. For multi user systems with different number of mobile users, the analyses indicate that the LCRs are approximately the same at the low level of the envelope. envelope However, there are at the high level of the reasonable differences among the curves of LCRs. Due to that fact that AFD is the inverse function of LCR, the results for AFD are the opposite.
In this paper, we propose a robust object tracking algorithm based on SURF. First, we adopt a two-stage matching method to improve the accuracy of SURF matching points. Then a template update method is used to deal wi...
详细信息
In this paper, we propose a robust object tracking algorithm based on SURF. First, we adopt a two-stage matching method to improve the accuracy of SURF matching points. Then a template update method is used to deal with the problem of object appearance change. Next we use matching points between new template and candidate region to locate the initial position of object. As template update and object occlusion will cause the accumulation of tracking errors, therefore, at last fixed template is used to correct object's position. For those frames which have little matching points, we use Meanshift instead of SURF to track object. The experiments demonstrate that our work is robust and can track object accurately in complex environments.
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature ...
详细信息
Proxy re-signature is proposed by Blaze, Blemmer and Strauss (BBS), in which a semi-trusted proxy acts as a translator converts a signature from Alice into a signature from Bob on the same message. Proxy re-signature is a very useful tool for the interoperable DRM architecture and the proof of passed path in cloud computing. However, cloud users usually are mobile devices which are constrained with processing and power limitations. When a mobile user obtain the converted signature from the proxy (cloud server), it still can not verify it due to the heavy computation cost. We propose a new definition of server-aided verification proxy re-signature which consist of a proxy re-signature scheme and a server-aided verification protocol. With the server-aided verification protocol, some computational tasks for a proxy re-signature verification are carried out by the proxy (cloud server), which is generally untrusted, therefore, it is very useful for mobile devices. We present, on the basis of Ateniese and Hohenberger's unidirectional proxy re-signature scheme, two novel existential unforgeability server-aided verification proxy re-signature schemes.
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m...
详细信息
Stream data is a very common data type in big data and in many data streams applications,users tend to pay more attention to the mode information of the data *** mining frequent patterns in data streams is a significa...
详细信息
ISBN:
(纸本)9781479900763
Stream data is a very common data type in big data and in many data streams applications,users tend to pay more attention to the mode information of the data *** mining frequent patterns in data streams is a significative ***,finding frequent itemests in a data set with predefined fixed support threshold could be seen as an optimization *** this paper,the problem of frequent itemsets mining is derived as a non-linear optimization problem,then genetic algorithm is adopted to solve *** the formal and bitmap representation of frequent itemsets,the non-linear optimization problem is transformed to 0-1 programming.A set of experimental results show that unlike typical Apriori algorithm,the complexity of time and memory space grows exponentially as the support decrease,our proposed algorithm has a high time and space efficiency even with a very low support.
network virtualization,as a fundamental technology of Future Internet Architecture,has been used to overcome the ossification of the current *** paper focuses on virtual nodes splitting for aggregating the diverse phy...
详细信息
network virtualization,as a fundamental technology of Future Internet Architecture,has been used to overcome the ossification of the current *** paper focuses on virtual nodes splitting for aggregating the diverse physical resources in the issue of virtual network embedding(VNE),which is used for the resource allocation in network virtualization.A mixed integer programming(MIP) problem has been proposed by taking both path-splitting and node-splitting into *** feasibility of virtual node splitting is analyzed and a corresponding formal expression is *** VNE performance is evaluated using by a generic MIP solver over a NSFNET *** numerical evaluations in this paper show that,comparing with the approaches for VNE without node-splitting,the proposed algorithm is beneficial to reduce VNE cost,as well as to increase VN acceptance ratio.
暂无评论