Heterogeneity among users is the main concern in building the unstructured P2P topology. However, the related algorithms either only pay attention to the weight heterogeneity in hitting the queries to improve the sear...
详细信息
Heterogeneity among users is the main concern in building the unstructured P2P topology. However, the related algorithms either only pay attention to the weight heterogeneity in hitting the queries to improve the search success rate, or think much of the capability heterogeneity in data transmission to achieve load-balancing or high throughput. Because the search and transmission are two inseparable stages in an application, they perhaps do not work well in the real applications. The peers with high weight are easily overloaded, and the outstanding peers in data transmission may suffer from the deficiency in requests. Therefore, the optimization only in success rate does not simultaneously mean the optimization in throughput, and vice versa. In this paper an optimization solution of overlay network, ABAO (Adaptive Bandwidth-Aware Overlay), is proposed. In ABAO, the factors of weight heterogeneity in hitting requests and the capability heterogeneity in data transmission are both considered. The connections are adaptively adjusted with low cost according to the availab.e bandwidth and the availab.e requests. Accordingly the throughput can be improved to serve more customers. Our simulations show that our method can improve the system throughput as much as 22%.
The capacity of multiple input multiple output (MIMO) system over wireless channels has been investigated analytically and by simulation over different types of wireless fading channels, such as Rayleigh, Ricain and N...
详细信息
In order to support mobile service of long-distance monitoring and controlling UPS based on Web, a kind of design and implementation solution of embedded UPS (EUPS) system is brought forward in this paper. The design ...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved p...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.
With the rapid advance of computer and network technology, more and more applications are deployed in the customer-side network. These applications require different quality of service (QoS), but have to share a few b...
详细信息
This paper describes attribute extraction, attribute classification and data cleaning process in tourism emergency, builds a widely applicable decision table, and uses the attribute reduction algorithm based on the im...
详细信息
Based on geographical and semantic features of remote sensing image, the paper presents a universal remote sensing image data model, and analyzes the logical structure and storage methods of this model. Based on the m...
详细信息
We present a particle swarm optimization algorithm OT-PSO using orthogonal test technique. Based on the classical PSO, OT-PSO searches for local optimum in the neighbor area of the global best solution by using the me...
详细信息
The challenges for building the component-based software architecture are how to estimate the assembly of reusable software components and make the properties forecast to the associated architecture. To address these ...
详细信息
Border access control, network security mechanism and system access control are three separately access control procedures when user accessing the resource on network. Network access control mechanism, which adding th...
详细信息
暂无评论