Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we pu...
详细信息
OFDMA is a suitable technique for delivering high data rate services and one of the most important technologies applied in LTE and 5G wireless networks. In OFDMA systems, dynamic resource block (RB) allocation conside...
详细信息
network traffic generation is very important for testing network equipment, network services, and security products. The paper firstly introduces the significance and the classification of network traffic generation. ...
详细信息
ISBN:
(纸本)9781785610899
network traffic generation is very important for testing network equipment, network services, and security products. The paper firstly introduces the significance and the classification of network traffic generation. Then, the paper chronologically categorizes the research activities of network traffic generation into three different methods: 1) traffic generation based on network traffic model;2) traffic generation based on traffic characteristics;3) traffic generation based on application protocol. Thorough reviews of the major research achievements of each kinds are conducted. Finally, the paper identifies some open research issue and points out possible future research directions in traffic generation area.
Cloud computing is based between the service provider and service consumer agreements and cloud data center is under a cloud computing environment that consists of hardware and software components. This paper studies ...
详细信息
Cloud computing is based between the service provider and service consumer agreements and cloud data center is under a cloud computing environment that consists of hardware and software components. This paper studies how to minimize the bandwidth cost for uploading deferral big data to a cloud computing platform, based on the MapReduce Framework. We first analysis the shortcoming of bandwidth of data centers, and we provide an optimization algorithm -- Dynamic Self-adaption Algorithm, it will reduce the cost of bandwidth of data centers. Dynamic Self-adaption Algorithm optimize the total cost of network bandwidth. Compared to a random selection algorithm, Dynamic Self-adaption Algorithm efficiently in this paper used of network peak to transfer data, and reduces the probability of spare channels appear to improve bandwidth utilization, so it reduces bandwidth costs.
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo...
详细信息
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invoice,we explore a new method of load balanced pipeline based on multiple producers,using parallelism model of mixed data and task provided by TPL(the Task Parallel Library).Finally,it shows this load balanced pipeline program can almost get a linear speedup,which can reach 7.2x in a 8 cores system.
With the prompt evolution of Internet,network identity management is getting more and more *** electronic identities in cyberspace associated in reality have been one significant and urgent task as online life becomes...
详细信息
With the prompt evolution of Internet,network identity management is getting more and more *** electronic identities in cyberspace associated in reality have been one significant and urgent task as online life becomes *** this paper presents a network identity management platform architecture based on electronic identity(eID).Identity verification and attribute verification services are introduced as the most typical services with security and privacy to be used by personal users,enterprises,websites and foreign *** architecture and related technology could be widely applied to all kinds of real identity verification for personal security and privacy protection in cyberspace.
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this pap...
详细信息
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this paper gives a new network identity management systems model based on the present model,including a two-party identity management model,a three-party identity management model,and a user-centric five-party identity management *** new model made by new five parties can realize the network identity management under huge amounts of data and for all kinds of network identities,such as personal,organization,software,service,etc.,and the new network identity management model helps to identity management in cyberspace.
When a VM migrates among hosts residing in two IP subnets, the network attachment point of VM changed, which causes the IP mobility problem. It was meaningful to design and evaluate VM migration performance under the ...
详细信息
In this paper, we present a novel coding scheme called separate coding (SC) for collecting all data continuously in wireless sensor networks with a mobile base station (mBS). By separately encoding a certain number of...
详细信息
暂无评论