Extended 2 dimensional MMr Code is a kind of facsimile signal source *** relativity is utilized when MMr Code is *** addition,there is no line synchronized code in MMr *** when an error occurs,the bitstream cannot be ...
详细信息
ISBN:
(纸本)0780397371
Extended 2 dimensional MMr Code is a kind of facsimile signal source *** relativity is utilized when MMr Code is *** addition,there is no line synchronized code in MMr *** when an error occurs,the bitstream cannot be decoded after the error *** prevent errordiffusion in MMr codingjhis paper introduces a method:moving window error-correcting arithmetic which can partly correct some random and outburst errors.
Aceess control is a fundamental concern in any system that manages resource. In particular, the dynamical distributed access control problem is very difficult anddoes not have easy solutions. In this paper, we provid...
详细信息
ISBN:
(纸本)1424406838
Aceess control is a fundamental concern in any system that manages resource. In particular, the dynamical distributed access control problem is very difficult anddoes not have easy solutions. In this paper, we provide solutions by limiting the problem's domain and propose a simple, yet efficient dynamic hierarchical access control schemes: a Chinese remainder Theorem based hierarchical access scheme for secure group communications. We also propose an improved scheme forrecent attacks.
EPIC (Explicitly Parallel Instruction Computing) architectures, such as the Intel IA-64 (Itanium), support novel features such as explicit instruction-level parallelism and predicated instructions. While these feature...
详细信息
This paper presents an effective approach to semantic abstraction of IA-64 multimedia instructions, which is important to binary translation. In particular, the authors take example for multimedia instructions used in...
详细信息
Currently, a fundamental issue is to evaluate the impact of having users act in a selfish manner in various networks. It is found that oblivious control schemes can't cope with uncooperative selfish users [4]. We ...
详细信息
ISBN:
(纸本)1424408016
Currently, a fundamental issue is to evaluate the impact of having users act in a selfish manner in various networks. It is found that oblivious control schemes can't cope with uncooperative selfish users [4]. We approach this problem in satellite networks from first principle: a satellite router packet-dropping scheme is a mechanism that sets up a game between the senders, who are in turn competing for link capacity. This paper proposes an algorithm called SrABF (Satellite router Allocates Bandwidth Fairly), which bases its dropping decisions on the recent history of packet arrivals and new sampling method. The performance of SrABF is aided by the fact that the vast majority of flows in satellite networks are slow but the fast flows send the bulk of the bits. This allows a small sample of recent history to provide accurate rate estimation of the fast flows. Simulation results, which we describe here, suggest that the design provides a reasonable degree of fairness in satellite networks.
Implementing IP security in broadbandrouter without sacrificing the performance is main work we focused on. To meet the need of protecting wire speed forwarding data passing through fast path of the router, security ...
详细信息
<正>Shape is a very important visual and semantic feature used to describe image,and it can be revealed by image pixels’ regional *** binary image,this paper proposes a region-based shape representation,a new "...
<正>Shape is a very important visual and semantic feature used to describe image,and it can be revealed by image pixels’ regional *** binary image,this paper proposes a region-based shape representation,a new "density distribution feature(ddF)",which uses a two-dimensional matrix to express the dimensional distribution information of the object’s pixels within binary *** matching the similarity,we first use the Gaussian model to normalize the two dimensional feature vectors,then integrate them to calculate similarity *** experiments results show that this shape feature can depict image well and is invariant to translation,scale and *** paper also evaluates the effectiveness of the proposeddescriptor with respect to Moment Invariants.
The shape feature of stereo bare footprints,with the ability to reflect human physical and behavior features with uniqueness,has been applied successfully in forensic *** paper proposes a me
The shape feature of stereo bare footprints,with the ability to reflect human physical and behavior features with uniqueness,has been applied successfully in forensic *** paper proposes a me
At present, buffer sizing forrouters is generally based on the model of transmission control protocol (TCP) on the transmission layer, ignoring the interaction of the network elements and having its connate limitatio...
详细信息
ISBN:
(纸本)0863416446
At present, buffer sizing forrouters is generally based on the model of transmission control protocol (TCP) on the transmission layer, ignoring the interaction of the network elements and having its connate limitation as for analyzing the performance for the routers on the network layer. How the routers interact in the network and how can we design the routers practically? From the perspective of the network layer, a new model, introducing the effects brought by each router, is proposed for a TCP link. By comparing the impact of access routers with the impact of core routers on link performance and analyzing the part of core routers with the separate method, a lower bound of required buffer size for an interface of a core router is deduced under given constraints on the maximum loss rate and minimum effective utilization. The simulation results validate the conclusion and also indicate this lower bound for buffer size is much looser than the actual lower bound. Our conclusion is a valuable instruction for practically designing buffer size for core routers.
Queuing mechanisms and scheduling policies play significant roles in guaranteeing performances of core routers and assured QoS (Quality of Service) fordifferent traffic in today's internet. Based on current buffe...
详细信息
ISBN:
(纸本)1424408016
Queuing mechanisms and scheduling policies play significant roles in guaranteeing performances of core routers and assured QoS (Quality of Service) fordifferent traffic in today's internet. Based on current buffered crossbarswitching fabric, by employing system level design method and objective orientedtechnology, we design and implement a simulation platform for queuing mechanisms and scheduling policies' development. Inheritability and extensibility attributes are obtained by designing traffic sources, queuing mechanisms and management policies separately. Besides, it can carry out end to end performances' evaluation with little modification. Finally in this article, we present some simulation results for existing scheduling policies, displaying the good performances of our platform.
暂无评论