In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without ...
详细信息
ISBN:
(纸本)9781457720529
In this paper, we consider a power-aware multimedia communications over internet of things (IoT). Specifically, we consider a generic IoT scenario where a multimedia server provides heterogeneous applications without knowing the application's quality of experience (QoE) model and playout period. Our objective aims at dynamically adjusting the power allocation for each application over a uncertain period to maximize the system overall mean opinion score (MOS). Note that the practical QoE model can be observed over time, but the underlying functional relationship between the power and MOS is unknown. The highlight of this paper is to develop a dynamic powering algorithm, in which one learns the satisfaction function and optimizes power-aware user satisfaction with on-line operation. More precisely, the proposed algorithm performance is measured in terms of loss which denotes the MOS loss compared to the optimal one. Numerical simulation results validate the efficiency of the proposed algorithm.
Standard TCP perform poorly in satellite networks since the long delay, high bit error ratio and other characters. A new TCP variant, called BIPR for satellite networks is presented in this paper. Using the binary inc...
详细信息
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti...
详细信息
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe...
详细信息
This paper proposes a novel genetic clustering algorithm, called a real-valued quantum genetic niching clustering algorithm (RQGN), which is based on the concept and principles of quantum computing, such as the qubits...
详细信息
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of spacetime. Most researchers are only concerned about the learner's cognitive and construct a great amoun...
详细信息
Nearest-Neighbor (NN) search is an increasingly important problem in many computer applications, in which high dimensional massive datasets are involved. In this paper, we propose a P2P distributed indexing scheme to ...
详细信息
Nearest-Neighbor (NN) search is an increasingly important problem in many computer applications, in which high dimensional massive datasets are involved. In this paper, we propose a P2P distributed indexing scheme to perform NN search in massive datasets. We consider the locality sensitive hashing (LSH) scheme under lp-metric to support similarity search in high dimensional space and we put forward a novel mapping from the multi-dimensional LSH bucket space to the one dimension DHT key space using nun-uniform Hilbert Curve. We consider the requirements of both similarity search and the maintenance of P2P network. Our indexing scheme preserves the locality sensitive property of LSH indexes and guarantees load balance in DHT networks. We also show how to leverage the LSH indexing scheme to efficiently process NN search in P2P network. Experiments on real world data confirm the effectiveness and efficiency of our approach and show the scalability gains compared to state-of-the-art schemes.
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is propo...
详细信息
An authentication multiple key agreement protocol allows the users to compute more than one session keys in an authentication way. In the paper,an identity-based authentication multiple key agreement protocol is proposed. Its authentication part is proven secure against existential forgery on adaptively chosen message and ID attacks under the random oracle model upon the CDH assumptions. The session keys are proven secure in a formal CK security model under the random oracle model upon the CBDH assumptions. Compared with the previous multiple key agreement protocols,it requires less communication cost.
In distributed systems, the server placement problem in which a new server has to compete with existing servers for user requests is important in planning of constructing new business service sites. In addition to min...
详细信息
暂无评论