The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of a larger chain of accountability. PeerReview [1] is designed as a practical system that provides accountability for distributed systems. A key assumption in PeerReview is that a message sent from one correct node to another will be eventually received. In the real...
The existing cognitive network (CN) nodes do not support Differentiate-Serve (Diffserv) Quality of Service (QoS), and the existing Diffserv QoS scheme has not considered the link capacities between UDP subscribers and TCP subscribers of CN nodes. To solve these problems, a Diffserv CN node and Controlled-UDP (C-UDP) based fluid model are proposed for hybrid traffics' CN. The proposed C-UDP and CN...
Today's computer and network systems were not originally designed for accountability which plays a crucial role in information assurance systems. To assure accountability, each entity in the system should be held responsible for its own behaviors so that the entity is part of larger chains of the system's accountability. In this paper, we propose designs of a multiresolution flow-net scheme to achieve...
With the information technology and the communication rapid development, information resource digitization has become the reality. The Personalized information service is important tendency of the development of digital library, which is the key that it can attract user to participate in the build of digital library. This article carries thorough in-depth analysis to the construction of My Library...
Combining with the radio frequency identification (RFID) technology and Internet technology, for tracking and trace technology provides an effective solution: in computer to the Internet, and on the basis of using RFID, wireless communication technology, constructing a cover everything in the world of information network. RFID tag contains standardized and interoperability coding information, through...
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
Marketing Mix (4Ps) is a traditional marketing theory which stresses the mixing of a variety of factors in marketing strategies. Today, with online purchasing gaining its popularity, some factors in 4Ps strategies should be changed to meet the demand of this new business style. This article, based on research results from China's undergraduates, explores 4Ps strategies that company may adopt when...
Most ISPs rely on their upstream providers in achieving global reachability, thus they tend to make backup upstream links for the purpose of improving their own resilience. Yet, the Internet AS topology does not entail as much redundancy as it is widely thought, e.g., in our observation, 23.6% of all ASes only have single provider. Moreover, even though an AS has multiple upstream links, if all its...
In this paper, we propose an implementation scheme of flow-net which is designed to record events and their relations. Different implementation schemes of the flow-net are introduced and compared. Under the collaboration of the nodes in a network, all of the events in the network are recorded and the relations of the events can be clearly described by flow-net. Because of the clear description of...
Classical network fluid model and RED algorithm are based on TCP flows in internet network, and they have not considered the UDP flows' effects in network. However, in real work of the network, the network link capacity is shared by the hybrid traffics: TCP flows and UDP flows, and UDP flows can occupy the original link capacity of TCP flow. Since there is no feedback control for UDP flows, the classical...
In this paper, we explore a quantitative approach to accountable networked systems. We propose P-Accountability, a novel concept and general metric, to assess the degree of system accountability. As a preliminary case study, we apply P-Accountability to PeerReview, an accountable distributed system. A quantitative relation between P-Accountability and message loss probability is given. We re-evaluate...
Classical network fluid model and RED algorithm are based on TCP flows in Internet network, and it has not considered the UDP flows' effects in network. However, in real work of the network, the network link capacity is shared by TCP flows and UDP flows, UDP flows can occupy the original link capacity of TCP flow. Since there is no feedback control for UDP flows, the classical network fluid model...
Several geographic (or position-based) routing protocols have been proposed for data dissemination in wireless sensor networks. In these protocols, routing is based on the positions of neighboring nodes. In particular, the next-hop node is selected according to either a distance-based strategy, which favors a neighbor with the largest distance progress toward the sink, or a direction-based strategy,...
Because of easy accessible medium in wireless networks, use of these wireless networks in military applications poses several security issues. Likewise, in the business field, despite the emerging static wireless Internet access, the same security issues remains. On example is the passive attack in which attackers attempt to overhear network communications from the outside. Confidentiality can be...
The staged event-driven architecture (SEDA) is a new software framework, which is used to construct extreme concurrency Internet services systems. When the system is overloaded maintaining the quality of the requests processing is a difficult problem because both the processing costs and requests arrival rate are highly unpredicted. This paper presents a feedback control quality adaptation framework...
This paper presents a Web based distributed marine education system. This system allow more users pursue training from anywhere and at anytime, via a PC and Web browser. It integrates the simulation to effectively makes up the limitation of traditional e-Learning, in which students tend to be restricted to a predetermined learning path through reading, listening and observation. We present the concept...
An improved window control scheme is proposed, which focus on stability and efficiency of dynamic high-speed networks in present of feedback. Foreseen problems introduced by such instability are inefficiency due to dramatic oscillation. We analyze the continue-time model of improved fast TCP and the bound of gain parameter is derived which satisfy the stability of system. The results demonstrate that...
Online games usually require the delivery of realtime multimedia contents over networks. While online games have become increasingly popular over the Internet, it is still challenging to build online games over wireless networks, where link quality changes from time to time and link capacity is usually much smaller compared to wired networks. Packet losses and large delay of wireless networks may...
From the viewpoint of control theory, TCP congestion control system can be regarded as a feedback regulating system. In this paper, a novel active queue management (AQM) scheme, called WTCP, is proposed for TCP congestion control in high speed wired/wireless Internet. The design principles of WTCP are presented in details. Simulation results demonstrate that the WTCP AQM outperforms FAST TCP in items...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.