Structured P2P networks create a virtual topology on top of the physical topology. The only relation between the two layers is the hashing algorithm, which makes the node's logical ID independent of its physical l...
详细信息
Structured P2P networks create a virtual topology on top of the physical topology. The only relation between the two layers is the hashing algorithm, which makes the node's logical ID independent of its physical location. By analyzing the Hash function, some novel logical connections among the destination node, the traditional semantic routing relay node sequence, and the ID of the clustering neighboring nodes are found. In this paper, the SCSRAA (self-organizing clustering semantic routing advanced algorithm) is resented to improve the efficiency of semantic routing. Since the clustering nodes only have local views in self-organizing mode, some rules are proposed for a node to learn other nodes' physical location. The SCSRAA's routing algorithm is described completely. Simulations have verified that the method can improve the semantic routing efficiently.
Assuming a specific network service provider is in the position of natural monopolization, the pricing strategy most likely adopted by the provider is analyzed with the objective of profit maximization. The optimal pr...
详细信息
Assuming a specific network service provider is in the position of natural monopolization, the pricing strategy most likely adopted by the provider is analyzed with the objective of profit maximization. The optimal pricing problem is decomposed into two sub-problems regarding user demands and marginal cost respectively. The utility characteristics of transport control protocol are taken into account to infer a typical user's transport demands from the principle of net-utility maximization. Then the total demands function is deduced on the assumption that the user's budget constraint subjects to negative exponential distribution. With respect to marginal cost, the active queue management rationale is used for reference. Thereafter the relationship between marginal cost and network congestion cost is carefully examined, from which a piecewise marginal cost function in power form is presented. This pricing mechanism gives attention to the profit maximization objective of network service providers as well as the technical characteristics of transport control protocol. We believe that it would conduce to more efficient network resource allocation.
Nowadays the ontology in the semantic web lacks the access control mechanism, it causes the loss of privacy protection for the ontology and eventually damages the stability of semantic web. To guarantee the effective ...
详细信息
Nowadays the ontology in the semantic web lacks the access control mechanism, it causes the loss of privacy protection for the ontology and eventually damages the stability of semantic web. To guarantee the effective protection of the ontology, a new web ontology language-based (OWL-based) model for access control is proposed. In this model, the access rules and the access control attributes are defined. The relations for the access control are set up. Features of this model are discussed in details to apply to the construction of the ontology and the ontology-based reasoning systems. It is shown that this new model can definitely demonstrate the relations for the access control and can be effectively used for the protection of the ontology. Moreover, with the flexibility and extensibility it owned, this new model also meets the increasingly complex requirements of the access control in the semantic web.
In this paper, we investigate the theory of using tail-biting recursive systematic convolutional (RSC) codes in turbo codes. Tail-biting is not always possible for a given RSC code with some length. The condition of t...
详细信息
In this paper, we investigate the theory of using tail-biting recursive systematic convolutional (RSC) codes in turbo codes. Tail-biting is not always possible for a given RSC code with some length. The condition of tail-biting RSC and what length is suitable for such RSC were studied
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ...
详细信息
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption registration for content fair distribution, of the model are all provided. The scheme also provides distribution and evidence for using the copyright of digital content fairly and effectively. Finally, analysis shows the proposed model has both high security and good performance.
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an...
详细信息
ISBN:
(纸本)1424406048
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge and partition events. In the scheme, the numbers of rounds and messages are close to the lower bounds of those for dynamic group key management, and the length of messages and computation costs are less than those of the existing schemes. Furthermore, this scheme provides forward secrecy, backward secrecy and key independence
Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step, at lower computational costs and communication overheads than the tra...
详细信息
Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step, at lower computational costs and communication overheads than the traditional signature-then-encryption approach. In this paper, the authors present a new identity-based signcryption scheme using the bilinear pairings and prove its security in the random oracle model. The proposed scheme is proved to be secure assuming the bilinear Diffle-Hellman problem is hard. As compared with the most efficient Chen and Malone-Lee scheme to date, the proposed scheme decreases one pairing operation and only requires two pairing operations.
An end-to-end real-time scheduling model can be used to describe many distributed real-time systems. An EDF-based end-to-end real-time scheduling model is proposed. According to the time demand analysis technique, a s...
详细信息
An end-to-end real-time scheduling model can be used to describe many distributed real-time systems. An EDF-based end-to-end real-time scheduling model is proposed. According to the time demand analysis technique, a schedulability condition for the end-to-end real-time system is deduced. Then, a schedulability analysis algorithm is developed. The schedulability condition and schedulablity analysis algorithm are suitable not only for end-to-end real-time systems controlled by non-greedy synchronization protocols, but also for those controlled by greedy synchronization protocol. Compared with fix-priority-based end-to-end real-time scheduling model and its algorithms, the model and algorithm proposed are simpler and easier to implement. Simulation results reveal that higher performance can be achieved too.
The water quality is the most vital factor in a successfully healthy aquaculture. After investigation by 415 fish disease cases and experiments, it is found that eutrophication and the pollutants of NH3, H2S as well a...
详细信息
The water quality is the most vital factor in a successfully healthy aquaculture. After investigation by 415 fish disease cases and experiments, it is found that eutrophication and the pollutants of NH3, H2S as well as heavy metals and organic compounds are the main reasons of inducing fish disease in the north of China. Generally speaking, an early warning system for fish disease based on water management is a cheaper and alternative choice available for the fish farmers to warn the risks and to minimize disease problems. A Web-GIS-based fish disease early-warning system (FDEWS 2.0) based on water quality management has been developed by us. Building a water quality monitoring network in the aquafarm and integrating a series of simulation models with the GIS and the World-Wide-Web (WWW) are the key advantages of this system
An anonymity metrics model with three properties based on joint entropy is given in this paper. The three properties are identifiable, linkable and traceable respectively. According to randomness and fuzziness of anon...
详细信息
An anonymity metrics model with three properties based on joint entropy is given in this paper. The three properties are identifiable, linkable and traceable respectively. According to randomness and fuzziness of anonymity, a fuzzy pattern recognition model is presented based on entropy and least generalized weighted distance, which makes the membership vector of anonymity grades have a desirable dispersive property. A method is proposed for computing the balance parameter between entropy and the generalized weighted distance. It is illustrated that the presented method has advantages over Shannon entropy like models in performance. The method can determine uniquely the balance parameter defined in this paper. Therefore, joint entropy is applied to evaluate the anonymity grades.
暂无评论