The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SSL protocol realize identity authentication through verifying both sides' certificate, but there are still some drawbacks. Through applying attribute certificate and improving SSL handshake process, we can improve the function of the SSL identity authentication, let SSL apply more widely.
Push-to-Talk over Cellular (PoC) system is ideal for group communication in many cooperative work environments because of its wider coverage and more flexibility than traditional trunk communication systems. The long session-setup-delay is an important problem that must be solved before the commercial application of PoC system. Many research works have been done to solve it in some mobile networks,...
With the development of Internet and Multimedia Technology, to meet the demand of call center distributed deployment and the multimedia information integrated access and unified service and the need to reduce the manpower cost, the softswitch-based Panorama Call center technology has already become the hotspot in the call center industry. This article elaborates the design of softswitch-based Panorama...
It has been proven that the batch renewal process is the least biased choice of traffic process given the infinite sets of measures of the traffic correlation, (i.e. indices of dispersion, covariances or correlation functions) in the discrete time domain. The same conclusion is expected to hold in the continuous time domain. That motivates the study and comparison of similar queues, fed by batch renewal...
Query privacy protection is an important part of the privacy protection in LBS. Currently, query privacy protection mainly consider the two typical attack models: query sampling attack and query homogeneity attack. The two attack model can be prevented by ensuring that cloaking regions satisfy ksharing property or l-diversity property, however, when the overall POI (point of interests)distribution...
Virtualization is a common strategy to improve the existing computing resources, particularly in cloud computing field. Hadoop, one of Apache projects, is designed to scale up from single servers to thousands of machines, and each offer local computation and storage. However, how to guarantee stability and reliability have become great study topics. In this article, we use current open-source based...
This paper analyses the queueing systems with batch Poisson arrivals and Generalised exponential (GE)service and gives closed form expressions for performance distributions, such as steady state queue length distribution (q.l.d.), blocking probability and waiting time distribution. The analytical performance expressions provide network engineers and researchers a tool to analysis the queues with batch...
This paper shows some experiences and observations on distance education in teaching a Computer Networks course for Computer Science masters students in an US institution. Some lessons and effective strategies to better engage students are presented. Data has been collected to show the effectiveness of distance education in teaching the course. Students' performances for both on-campus and online...
Taking spatial information technology application in Xinjiang Production and Construction Corps (XPCC) as background, and considering special management features of XPCC, we propose a spatial information management and service model based on Web services and SOA architecture. We design the architecture and logical structure of XPCC-oriented distributed spatial information management and service platform,...
In this paper, a usage model is proposed to simulate users' behaviors realistically in load testing of web applications, and another relevant workload model is proposed to help generate realistic load for load testing. It also demonstrates an eclipse-based load testing tool “Load Testing Automation Framework (LTAF)” which is based on these two models and can perform load testing of web applications...
Compared with the digital production of nautical chart (i.e., chart), nowadays we almost compile Notice to Mariners by hand. It is apparent that how to quickly produce Notice to Mariners by digital technique is very necessary and urgent now. Consequently, the key techniques of quickly producing Notice to Mariners based on SQL Server, such as creating database of Notice to Mariners, designing electronic...
Queueing models with finite capacity and batch arrival or batch service processes are widely recognised as powerful tools for representing transportation networks, flexible manufacturing systems and predicting their performance. Although a considerable progress has been made in the field of analysis of a queue with single server and batch service in the literature, more work is needed to study more...
With the rapid development of computer science and communication technologies, doctors will employ electronic communication to facilitate patient care more and more. We have developed a multimedia telemedicine system which is much more flexible, robust and easier to use. In this paper we compare our system with the traditional telemedicine systems, present the architecture of our system and analyze...
We have undertaken a thorough measurement and modeling study of IPTV CDN traffic. We have collected and analyzed network-layer IPTV CDN traffic measurements and, based on the characteristics of IPTV CDN traffic, a traffic model has been developed and verified with NS-2 simulation. Our simulation results indicate that the proposed traffic model complies well with the real IPTV CDN traffic. We detail...
Userspsila character analysis and control are important for enterprise network management and security. In this paper, we propose a novel method to classify the userspsila behaviors into different security levels and control their behaviors with corresponding strategies. Firstly, Dflow model and several traffic features, including the number of packets, number of flows, flow durations, etc., are proposed...
According to the limitation of resources in wireless sensor network (WSN), this paper presents a new key pre-distribution scheme based on plane grid. It helps not only to economize the space of storage and keep low consumption, but also ensure that all neighborspsila nodes can establish pair-wise keys directly, however, has a poor safety performance. Then we extend the scheme to three-dimensional...
In this paper, we presented an approach for semantic query based on context approximation of ontology. We also propose a ranking strategy based on ontology context approximation. We exploited the implementation technologies related to the approach. Furthermore, a distributed semantic query system called DSQ was developed for successfully performing tasks of semantic queries across multiple ontologies...
In this paper, we presented an approach for semantic information query based on semantic approximation, where a ranking strategy for answering results is also proposed. We also exploited the implementation technologies related to the approach. Furthermore, a distributed semantic query system called DSQ and experimental results are developed.
Over-encryption is a technique for managing evolving access control requirements in outsourced databases. In over-encryption, a data owner and outsourcing server collectively encrypt resources in such a way that users' accesses can be effectively controlled without the need for shipping the resources back to the owner. One potential limitation of the original over-encryption scheme is that it requires...
This paper proposed an intrusion detection system framework adapt to load characteristic under IPv6/4 environment; it uses decision-tree-based classification method, under guidance of a certain flow, creates dynamically rule matching tree adapt to load characteristic, reduces greatly the rule set that per packet or event need to be detected, improves the detection efficiency, can be utilized to solve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.