It is a significant challenge to discover knowledge from noise data. Most of previous works have focused on the data cleansing and the correction for the benefit of the subsequent mining process. When the training dat...
详细信息
Opportunistic routing with network coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multihop networks. By combining the multi-user diversity advantage of the broadcast links and the...
详细信息
Opportunistic routing with network coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multihop networks. By combining the multi-user diversity advantage of the broadcast links and the erasure-codes property of random network coding, it raises an interesting question on the broadcast channel access control algorithm, since the reliability is guaranteed by upper-layer coding and thus it is not necessary to wait for all the receivers to be ready. In this paper, we formalize it as the opportunistic broadcast channel access control problem. By appealing to the theory of optimal stopping, we develop a strategy which can balance between the access delay and instantaneous delivery ability of the broadcast link. This strategy turns out to be a threshold-based policy, which allowing fully distributed implementation. Simulation results show that the proposed strategy outperforms existing schemes significantly in terms of end to end throughput under various traffic loads.
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ...
详细信息
ISBN:
(纸本)9781467307215
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path divided by the monitor node. This method can estimate the packet loss ration of each segment and infer loss ratios based on IP headers identification field, TCP headers sequence number and packets interval. The segment estimation packet loss method can be useful to evaluate the performance of core network or internet work if the monitor is put in the border of a network. The algorithm is evaluated to use a test bed simulation measurement, and is analyzed reordering ratios and loss ratios based on the traces collected from the CERNET backbone links.
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-p...
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-problem and a timetabling one. A partial delay timetabling method is constructed by combining the "as early as possible" strategy with the "as late as possible" rule. By integratiiig the variable neighborhood structure, a new Local Search method CLMVN (Complete Local Search with Memory and Variable Neighborhood structure) is presented for the sequencing problem. Experimental results show that CLMVN outperforms CLLM (the best algorithm for the considered problem so far) on average with less computation time.
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling networ...
详细信息
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling network traffic function. The number of original flow is an important metrics to many network applications such as congestion control and network security. In this paper, we present a EUF algorithm that can accurately infer the number of original flow from the sampled packet traffic. Using the EUF algorithm, the number of unsampled flows can be estimated by an iteration method based on random sampling, and then the number of original flows can be precisely estimated according to both the number of the sampled flows and the unsampled flow. The EUF algorithm is also compared with the EM algorithm using multiple traffic traces collected from a Tier-1 ISP backbone networks. The result shows that the EUF algorithm is superior to EM and can provide highly accurate estimation on the number of the original flow.
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model and analyze a new electronic *** are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security *** improved protocol is proven to be robust and secure.
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends...
详细信息
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a...
详细信息
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit...
详细信息
暂无评论