Existing algorithms in conic curves cryptosystem are all sequential ones. It is important to have fast parallel algorithms to both encrypt and decrypt data for cryptosystem on conic curves. This paper proposes our own...
详细信息
Existing algorithms in conic curves cryptosystem are all sequential ones. It is important to have fast parallel algorithms to both encrypt and decrypt data for cryptosystem on conic curves. This paper proposes our own parallel algorithms for conic curves cryptosystem over finite field Fp. Our main works are paralleling the basic multiple-precision integer algorithms and the point-addition operation on conic curves over finite field Fp. We also calculate the speedup ratio based on computing the runtime of sequential arithmetic and parallel arithmetic in this cryptosystem. The performance evaluation demonstrates that our methodology could reduce time complexity and improve efficiency for conic curves cryptosystem over finite field Fp.
TCP migration is an important and complex aspect of process migration, which is the foundation of dynamic load balancing. Single IP Address cluster offers a transparent view of a cluster of machines as if they were a ...
详细信息
TCP migration is an important and complex aspect of process migration, which is the foundation of dynamic load balancing. Single IP Address cluster offers a transparent view of a cluster of machines as if they were a single computer on the network. In such an environment, TCP migration can play a significant role for providing services seamlessly. In this paper, we propose a live migration mechanism using Netfilter framework in which no modification to Linux kemel is required. The proposed plug-in module approach has the following advantages: flexibility-TCP migration functions may be loaded and unloaded dynamically, without node function interruption;TCP connections are kept alive while migration is taking place.
Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more fu...
详细信息
In order to take full account of the actual back-end servers' processing power, a load balancing algorithm based on least load for Web cluster was proposed. It depends on the actual states of the back-end servers,...
详细信息
In order to take full account of the actual back-end servers' processing power, a load balancing algorithm based on least load for Web cluster was proposed. It depends on the actual states of the back-end servers, including CPU usages, memory usages, network utilization and disk performance periodically, to derive the comprehensive server loads and server weights. The balancing algorithm based on least load feedback dynamicly with self-adaptive features. Compared with IPVS built-in weighted round-robin scheduling algorithm, proposed scheduling algorithm based on least load has higher number of successful requests and lower number of failed request.
To further improve the efficiency and resource utilization and reduce the research costs, we proposed a cluster system simulation model entirely implemented by software. The model focuses on features cluster shown at ...
详细信息
To further improve the efficiency and resource utilization and reduce the research costs, we proposed a cluster system simulation model entirely implemented by software. The model focuses on features cluster shown at the system level, using network simulation software OPNET as the modeling tool which can be run in a personal computer. A series of characters of the cluster system are depicted, such as the number of nodes, numbers of processors belong to each node, inter-node communication bandwidth and data volume, user's job queue, conventional job scheduling algorithm, and scalable model interface. By working with a real small-scale cluster system, we show that the model has good simulation results and effectively reduces the hardware cost.
Distributing real-time video stream in large scale group communication over Interuet poses several challenging problems due to the complex network dynamics, stringent requirement of delay and loss. This paper proposes...
详细信息
Distributing real-time video stream in large scale group communication over Interuet poses several challenging problems due to the complex network dynamics, stringent requirement of delay and loss. This paper proposes a novel peer-to-peer scheme, named TeamCast, to combat with these issues. Constructing multiple diverse application layer multicast (ALM) trees to transmit multiple independent complementary descriptions produced by multiple description coding (MDC) simultaneously, TeamCast improves error resilient ability in the presence of various levels of packet loss caused by unpredictable congestion of Internet and node failure, as well as enlarges system capacity. The results of extensive simulations indicate that TeamCast achieves low latency, scalability, and fault tolerance for the delivery of live media stream.
In order to solve the question of identify of H.323 video conferencing system, this paper presents an authentication mechanism based on signaling token piggybacking. The mechanism is an authentication scheme based on ...
详细信息
Mean-variance relationship (MVR), nowadays agreed in power law form, is an important function. It is currently used by traffic matrix estimation as a basic statistical assumption. Because all the existing papers obt...
详细信息
Mean-variance relationship (MVR), nowadays agreed in power law form, is an important function. It is currently used by traffic matrix estimation as a basic statistical assumption. Because all the existing papers obtain MVR only through empirical ways, they cannot provide theoretical support to power law MVR or the definition of its power exponent. Furthermore, because of the lack of theoretical model, all traffic matrix estimation methods based on MVR have not been theoretically supported yet. By observing both our laboratory and campus network for more than one year, we find that such an empirical MVR is not sufficient to describe actual network traffic. In this paper, we derive a theoretical MVR from ON/OFF model. Then we prove that current empirical power law MVR is generally reasonable by the fact that it is an approximate form of theoretical MVR under specific precondition, which can theoretically support those traffic matrix estimation algorithms of using MVR. Through verifying our MVR by actual observation and public DECPKT traces, we verify that our theoretical MVR is valid and more capable of describing actual network traffic than power law MVR.
In order to solve the question of identify of H.323 video conferencing system, this paper presents an authentication mechanism based on signaling token piggybacking. The mechanism is an authentication scheme based on ...
详细信息
In order to solve the question of identify of H.323 video conferencing system, this paper presents an authentication mechanism based on signaling token piggybacking. The mechanism is an authentication scheme based on public key, and can divide into two parts: public key registration and check of the identity which happens in the establishment of conference. This paper expatiates the authentication mechanism based on signaling token piggybacking, analyzes in theory and in experimental comparison, and verifies the conclusion that the authentication based on signaling token piggybacking performs rapidly and costs little time to achieve authentication and ensure the system safe.
In this paper, we propose a multimodal query suggestion method for video search engine which can leverage multimodal processing to improve the quality of search results. When users type general or ambiguous textual qu...
详细信息
In this paper, we propose a multimodal query suggestion method for video search engine which can leverage multimodal processing to improve the quality of search results. When users type general or ambiguous textual queries, our system provides keyword suggestions and representative image examples in an easy-to-use dropdown manner which can help users specify their search intent more precisely and effortlessly. It is a powerful complement to initial queries. After the queries are formulated as multimodal query (i.e., text, image), the new queries are input to individual search models, such as text-based, concept-based and visual example-based search model. Then we apply multimodal fusion method to aggregate the above-mentioned several search results. The effectiveness of our system is evaluated by evaluations over a Web video data set.
暂无评论