The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent advances in wireless communication techniques have made possible for vehicles to download from the roadside communications infrastructure, namely drive-thru Internet. However, due to the fast-motions, harsh and intermittent wireless channels, the download volume of individual vehicles per drive-thru is quite limited as observed in real-world tests. This severely restricts the service quality...
With the rapid development of the Internet, steganography on Voice over IP (VoIP) has been attracted a lot of research efforts. To date, existing VoIP steganography research commonly focus on information hiding in the LSB bits of Network Audio Streams, yet, we found this approach may raise serious security threat, where the hidden information may be easily removed, detected and attacked. Towards this...
This paper is concerned with the problem of data-driven predictive control for networked control systems (NCSs), which is designed from the subspace matrices, obtained directly from the input/output data transferred from networks. The networked predictive control consists of the control prediction generator and network delay compensator. The control prediction generator provides a set of future control...
Abstract-Mobile terminals provide an increasingly important communication channel in facilitating social connections. Mobile social networking has an enormous potential for us to tap and there is an urgent need to explore new service modes in this area. We have developed a system of social interaction, called Mobile Hunter System, for people to expand their scope of interpersonal relationships not...
RealVideo is one of the most popular digital video files on Internet. In this paper, the algorithm complexity and data parallelism of decoding process are analyzed and the RealVideo decoder is optimized with the Godson-2's SIMD multimedia expanded instructions and its architecture features. The results show that these optimizations have improved the performance and efficiency of RealVideo decoding...
In this paper, we utilized the ActiveX component and XML technology, developed a small and simple component of Web GIS at the bottom level which has been applied in the e-government system. The advantages of this study include three aspects, adopted XML files to store the GIS information which make the information be more suitable for network transmission; developed a applicable and powerful system...
Low-rate denial-of-service attack is a novel category of attacks that are based on exploiting the adaptive behavior exhibited by several network and system protocols. This attack through periodically non-suspicious low-rate attack pulsing, to reduce the performance of the victims. Based on the simulation of low-rate denial-of-service on NS2 platform, we analyze the defense performance of queue management...
Peer-to-peer (P2P) traffic is arguably the biggest contributor to today's Internet traffic. So far, very limited effort has been paid to theoretically analyze the effect of bringing locality-awareness into P2P applications. In this paper, we analyze three locality-awareness policies for BitTorrent-like system: tracker locality(neighbor selection), choker locality(choking and unchoking) and picker...
Bandwidth-delay-constrained multicast routing problem is an NP-complete problem. In this paper, we propose a QoS multicast routing algorithm based on artificial fish swarm optimization. Meeting with the bandwidth-delay-constrained, the proposed algorithm can search the least-cost multicast routing tree quickly. Simulation results show that this algorithm has high reliability and good performance of...
With the more emphasis paid on network security and privacy, the research on anonymous communication system has developed quickly. In the past, researchers mainly focused on how to improve the anonymity, but few focused on the usability. This paper presents an anonymity-level selected hierarchical anonymous communication framework (ALHACF). In this framework, firstly the anonymity-level is selected...
This paper presents a measurement study of AS-aware P2P streaming solution over real-world Internet topology. By using the accesses of nodes of PlanetLab testbed, we create a detailed AS-level map including the end-to-end path of all nodes, as well as the relationship of all involved ASes. Based on this map, we evaluate AS-aware P2P streaming solutions with different goals, i.e., minimizing AS hops...
The increasing diversity of Internet application requirements has spurred recent interest in transport protocol for high speed delay product connectivity. Addressing the deficiency of previous protocols, this paper presents a spectrum of time based odd function congestion control protocols for deployment in high speed and long distance networks. Through extensive analysis we focus on SQUARE, one of...
With the development of Internet, p2p is increasingly receiving attention in research. Recently, a class of p2p applications with time constraints appear. These applications require a short time to locate the resource and(or) a low transit delay between the resource user and the resource holder, such as Skype, MSN. In this paper we propose a scalable p2p overlay for applications with time constraints...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.