In this paper, no-wait flow shop scheduling problem with flowtime minimization is considered. Objective increment properties are analyzed and proved for fundamental operations of heuristics. With these properties, whe...
详细信息
Agent technology has played an important role in distributed network application and agent communication model is an inevitable problem in multi-agent system. We propose a "Shaikh-Guide" based agent communic...
详细信息
With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-...
详细信息
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti...
详细信息
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e...
详细信息
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number etc, VANET is vulnerable to be affected by a variety of security threats. In this paper, we firstly introduce the system architecture, applications and categories of attacks in VANET. Then we summarize several types of anonymous authentication techniques which aim at protecting the privacy of vehicular nodes, then discuss and compare the typical anonymous authentication schemes of each type. Finally, we present the problems which should be considered in the next step of research.
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence r...
详细信息
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence relationships intra- and inter- hatches, the problem is decomposed into two embedded sub-problems, each of which can be formulated as a 2-machine flow shop scheduling problem. A composite heuristic is introduced for stacks scheduling in a hatch by integrating the Johnson rule with a developed gap-shifting strategy. A better model is constructed for inter-hatches than existing ones, in which overlapped processing time is shorten and effectiveness can be improved by a reconstructive Johnson rule. Experimental results show that the proposed composite algorithm outperforms the existing hybrid heuristic.
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi...
详细信息
作者:
Guang ChengSong WangSchool of Computer Science & Engineering
Key Laboratory of Computer Network and Information Integration Ministry of Education Key Laboratory of Computer Network Technology of Jiangsu South-East University Nanjing China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ...
详细信息
ISBN:
(纸本)9781424497621
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications emerging, is generating the rapid growth traffic. Connection pattern approach is to observe and identify connection patterns of host behavior at the transport layer. This method has no access to packet payload, no knowledge of port numbers and no additional information other than what current flow collectors provide. But traffic classification method based on host connection pattern can't distinguish some similar applications provided by one server. This paper analyzes the connection pattern between servers for SMTP, POP3, Web, BT traffic, and the distribution of simultaneous connections for each server port, and then propose a new traffic classified approach based on port connection pattern and the simultaneous connection number. The classified method can distinguish WEB, SMTP, POP3, and BT traffic each port in a server without any knowledge of port. The experimental result shows that this method is effective.
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative wa...
详细信息
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative way. For an agent, the approaches first find its similar agents, and then base the similar agents' qualitative preferences to complement this agent's missing preferences. We analyze and compare these approaches and provide experimental results to justify our arguments. We also compare our approach with the classic collaborative filtering and show the competitive advantages of our approach in service selection. Our work thus serves as an important step towards effective service selection.
暂无评论