Peer-to-Peer (P2P) networks have been shown to be a promising approach to provide instant voice services over the Internet for its potential high scalability. However, for one paired peers, how to efficiently transmit...
详细信息
A series of problems arises with the emergence and fast development of grid. Among all the problems, one of them is how to smoothly connect heterogeneous grid platforms. There are a number of ways to solve this proble...
详细信息
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some ineffici...
详细信息
ISBN:
(纸本)9781595937575
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some inefficiency including high control overhead and bad playback experience. This paper mainly discusses how to address these certain problems. We introduce a hybrid architecture to solve the locality problem and reduce the control overhead. We also propose a scheduling method to achieve load balance. All solutions are implemented in Anysee2.
In this paper, we propose a scalable service scheme for secure group communication in grid. In the service scheme, a series of methods and strategies are presented, such as the initialization methods for group member,...
详细信息
The bandwidth bottleneck and the high rate of losing packets are the major obstacles when extending P2P live streaming system to WLAN. To tide over them, a new wireless multicast agent mechanism (WiMA) based on the IP...
详细信息
Compliance checker is an important component for automated trust negotiation (ATN) to examine whether the credentials match the access control policies. A good design for compliance checker helps to speed up trust est...
详细信息
It is still a challenging task to provide large scale video-on-demand (VoD) streaming services based on overlay network due to its inherent dynamicity and heterogeneity. Most of previous work has focused on how to con...
详细信息
Metadata management is a key technique of data grid. This paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global Distributed Storage system (GDSS). Sto...
详细信息
Metadata management is a key technique of data grid. This paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global Distributed Storage system (GDSS). Storage Service Provider (SSP) of GDSS has dedicated buffer to cache metadata. The design, implementation and evaluation of RCMMS are discussed in this paper. RCMMS provides efficient algorithms to manage highly dynamic metadata replicas. The evaluation demonstrates that replica plus cache metadata management system outperforms existing metadata management system of GDSS.
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit i...
详细信息
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit in the open and distributed environment. While ATN brings convenience, there are still two issues unsolved successfully: 1) to protect the transmitting message; 2) to prevent the sensitive information leakage. Hidden credential can provide high security level to protect sensitive resources, policies and credentials from being attacked. Zero-knowledge is an important means to avoid leakage and can be used to protect the user's private context and sensitive information from unauthorized inferences. If hidden credentials and zero-knowledge are well-combined and redesigned, they can jointly make ATN better. Based on these, a hidden credential based oblivious automated trust negotiation model (HBOA) is proposed in this paper. In the model, the negotiation information is carried by hidden credentials, which have the same secure level with elliptic curve. Zero-knowledge protocol is provided by Pedersen commitment scheme, which ensures that no sensitive information can be attained by authorized users. A practical example is given to prove its usability.
Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM...
详细信息
Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM) to merge different P2P networks as a whole to share their data-transfer capability. The model abstracts the interlaced data links between peers as logical data channels according to their spatial-temporal relations. The channels can be subdivided based on multiplex technology and serve different applications at same time. MACM redefines P2P data-packet structure and organizes data packets into time-related groups according to cascade-packet rule to support controllable data-projection between data pools of peers. MACM-based P2P networks can be created as virtual sub-network or virtual-peer bridging strategy so as to improve the performance of P2P networks with few peers but high priorities within Internet protocol television (IPTV) and wireless sensor network (WSN) applications.
暂无评论