With the growth of network technologies, abundance of network resources, and increase of various services, mobile devices have gained much functionality and intelligence. At the same time, mobile devices are becoming ...
详细信息
With the growth of network technologies, abundance of network resources, and increase of various services, mobile devices have gained much functionality and intelligence. At the same time, mobile devices are becoming complicated and many software related problems appear. The traditional remote repair method needs the software providers to supply fault information with corresponding repair strategy. It is inconvenient for users when the sold mobile devices have software faults. However, it is impossible for the manufacturers to supply all the fault information and repair-strategy before selling them. So far, no method has been given to collect repair-strategy from the sold mobile device and optimize the self-repair strategy. In this paper, we propose a self-optimization method to learn the software repair strategy from the sold mobile devices and to optimize self-repair strategy based on the Open Mobile Alliance (OMA) Device Management (DM) standard. The managed objects (MOs) are defined for collecting the strategy data and the self-optimization algorithm is proposed and implemented at the central server.
Considering sensor nodes deployed densely and uniformly in the sensing field, we focus on a scenario that a mobile sink moving through the sensing field queries a specific area or a point of interest for data collecti...
详细信息
ISBN:
(纸本)9781605585697
Considering sensor nodes deployed densely and uniformly in the sensing field, we focus on a scenario that a mobile sink moving through the sensing field queries a specific area or a point of interest for data collection. A Query packet is injected by the mobile sink and routed to the specific area, then the corresponding Response packet is returned to the mobile sink via multi-hop communication. Due to the mobility of the sink, the Query and Response should have different routes. We analyze such a network model to address the problem of efficient data collection in wireless sensor networks and propose an efficient Query-Based Data Collection Scheme (QBDCS). In order to minimize the energy consumption and packet delivery latency, QBDCS chooses the optimal time to send the Query packet and tailors the routing mechanism for partial sensor nodes forwarding packets. Simulation results demonstrate that QBDCS completes a query-based data collection cycle with minimum energy consumption and delivery latency. Copyright 2009 ACM.
A fast rerouting scheme is proposed to guarantee the QoS performance of rerouted path when handling link and node failures. The new scheme is based on deflection routing mechanism and improves on two aspects: first, i...
详细信息
A fast rerouting scheme is proposed to guarantee the QoS performance of rerouted path when handling link and node failures. The new scheme is based on deflection routing mechanism and improves on two aspects: first, it can promptly handle single node failure as well as single link failure, second, QoS metric is taken into accounted when calculating recovery routes. Simulation results show that the proposed scheme could achieve as optimal performance as constrained Bellman-Ford algorithm.
Feature selection has been studied widely in literatures in supervised learning scenarios. Feature selection methods are categorized into two classes: ¿wrapper¿ and ¿filter¿ approaches. In this pap...
详细信息
Feature selection has been studied widely in literatures in supervised learning scenarios. Feature selection methods are categorized into two classes: ¿wrapper¿ and ¿filter¿ approaches. In this paper, we propose a filter method called cloud score based on membership cloud model in fuzzy field. We determine the discrimination power of a certain feature by cloud score to evaluate the feature's importance. This method is compared with variance and Fisher score methods on UCI iris dataset. The results of the experiments demonstrate the feasibility of our algorithm.
Presence is a feature that is used widely in lots of system, especially in IMS. The presence system in IMS also provides application developer and end user with a chance to new style applications. But the presence sys...
详细信息
Location based service can easily locate mobile station's position, which becomes a tool for connecting the virtual world and real environment. But current location service can notify user only bases on the locati...
详细信息
This paper analyzes Wf-XML based interoperation mechanism between workflow management systems and the characteristics of Web Services based description methods for network management services. Making use of the descri...
详细信息
This paper analyzes Wf-XML based interoperation mechanism between workflow management systems and the characteristics of Web Services based description methods for network management services. Making use of the description methods for network management services given by MUWS, the deficiencies of Wf-XML are improved and interoperation interfaces between network management business process management systems are defined. The implementation and application scenarios of the interoperation interfaces are also illustrated. The functionalities of the interoperation interfaces are clearly defined with good extensibilities.
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, Signed Integer Exponential-Golomb Coded (SE) Encryption Algorithm and Context-A...
详细信息
Route flap caused by link flap in OSPF always leads to network instability and unreliability. Most of the prevailing solutions are network-wide and require all routers to participate in the route flap suppressing proc...
详细信息
Route flap caused by link flap in OSPF always leads to network instability and unreliability. Most of the prevailing solutions are network-wide and require all routers to participate in the route flap suppressing process, which not only lack flexibility and scalability but also occupy additional computation resources across the network. In this paper, a localized approach is proposed to suppress the routing flap through dynamically tuning the hello interval of OSPF. To support the real-time adjustment of the hello timer, an analytical model is also established to investigate the relationship between link flap and route flap. Simulation results show that our approach can achieve better performance in eliminating routing flap and at the same time consume much less computation resources than the network-wide method.
Protecting the confidentiality and integrity of video information is one of the crucial security elements for many wireless video applications. Taking limited power,processor resource and bandwidth of mobile device in...
详细信息
Protecting the confidentiality and integrity of video information is one of the crucial security elements for many wireless video applications. Taking limited power,processor resource and bandwidth of mobile device into account,a lightweight luminance transform coefficients encryption (LTCE) algorithm,is proposed based on the special feature of the H.264 video coding standard. In LTCE algorithm,the luminance transform coefficients of residual data before entropy coding are adjustably partially encrypted by stream cipher,and it is discussed when ciphertext value are equal to zero in detail. Experimental results demonstrate the proposed algorithm that encrypts much less important data can achieve good security and high efficiency,as well as obtain low complexity and time cost. LTCE algorithm is suitable for security multimedia services for wireless application.
暂无评论