The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traffic metrics at application level are critical for protocol research, abnormity detection, accounting and network operation. There are great challenges to identify packets at application level since dynamic protocol ports and packet encryption are deployed popularly. There are several different methods of traffic identification being proposed in recently research for corresponding applications...
The traditional file service is no longer sufficient for providing reliable and smart service to users as roaming in ubiquitous computing environments. In this paper, we propose a smart push file service model, called PushFS, which employs a push-oriented file service for ubiquitous storage. The design of PushFS introduces user-profiles to identify the environmental-context and file-semantics for...
As ubiquitous computing pursues naturalness and harmony, the need for context-ware ability in software middleware is growing to respond to highly dynamic computing environments. In order to facilitate the realization of such ability, the middleware infrastructure is required to acquisition, representation, fusion, and inference context information correctly and reliably. This paper is concerned with...
Ubiquitous computing enables dense sensing of the environment, offering unprecedented opportunities for observing the physical world. In many scientific applications in dense sensor arrays, efficient support for multi-resolution storage and drill-down queries is essential. We argue that technology trends in embedded platforms and flash memories call for rethinking multi-resolution storage designing...
Quality of Context (QoC) is critical in context reasoning, context refining, security policy configuring, etc. Many researches have been presented to model context and its quality by quantifying QoC-parameters. However, these quality models emphasis on the information-inherent QoC, while the influence of context-aware applications and environment situation on QoC is not well considered. In this paper,...
In this paper, we propose an internally adaptive LDPC coded ultra wideband-impulse radio (IALC-UWB-IR) system which is able to adaptively select the code rate of the LDPC code and the number of pulse repetitions. Performance of the proposed system is evaluated under the UWB multipart channel proposed in the IEEE 802.15.3a standard, and the selective-RAKE receiver with maximal radio combining is used...
Complexity and diversity of Internet traffic are constantly growing. Networking researchers become aware of the need to constantly monitor and reevaluate their assumptions in order to ensure that the conceptual models correctly represent reality. Using the dataset collected by NetTurbo from three different bidirectional OC-48 links in metro area networks at the two biggest ISPs of China, this paper...
Flow metrics are critical for protocol research, anomaly detection, network operation and application deployment. There are great challenges to match every packet into millions of flows in high speed network link. A 3-phase measurement method for IP traffic flow is proposed in this paper. The packets are captured and classified into the flows through hash table, search tree and linear table with this...
The mobile agent technology plays an important role in electronic commerce. However, security issues need to be tackled. Some schemes have been proposed to protect the private key of the agent's owner, but seldom pay attention to the abuse of the information in the agent. Threshold proxy signature scheme can be applied for avoiding the abuse of the information in the agent. However, most existing...
In this paper, we present a new iterative phase noise mitigation method for Turbo coded OFDM system and analyze the influence of phase noise on system performance. The soft output of turbo decoder is used to estimate the phase noise in the frequency domain iteratively, and then cyclic convolution is adopted to correct the phase noise. Simulation result shows the proposed method can significantly improve...
In this paper, we present an architecture of ontology-based distributed simulation on grid (ODSG) which facilitates life-cycle management of large-scale distributed interactive simulation on the grid computing environment. The architecture aims at some further solved key technologies for M&S (model and simulation) and new simulation pattern on open, complex, large-scale distributed grid environment...
Silicon-based MEMS techniques are very popular for the manufacture of micro parts. Only a limited number of materials can be processed by these techniques. As the rapid development of Selective Laser Sintering(SLS) in laser rapid prototyping field almost any material can be used. Laser Micro Sintering(LMS) was recently introduced in the fabrication of 3D MEMS parts. The main difference between SLS...
For the control of the district heating system with nonlinear, coupling and time-delay characteristics, a strategy of PID neural networks control to realize even distribution heating in district heating system is presented in this paper. And a nonlinear prediction model is introduced to improve the control effect. We apply it to laboratory-scale system and the experimental results provide an excellent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.