The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we develop an interactive screen video streaming-based system to enable the ubiquitous mobile workstyle, which is referred to as personal computer to pervasive computing (PC2PC). The desktop screens of virtualized systems are compressed in the PC2PC servers and delivered to remote end users for stream decoding, rendering, and interactions. We have implemented a system from the scratch,...
Aiming at providing united control of multi-domain optical networks orchestration, we design the Federated Platform based on Open Network Operating System (ONOS). Our implementation includes adding and extending modules in ONOS to provide the global view of multi-domain networks and support cross-domain end-to-end services by communicating with the individual domain controllers through RESTCONF protocol...
Digital electronics is electronics that transfer of receive digital signals. The signals handled by digital electronics are discrete bands of analog levels -- not the continuous ranges. Levels within a band of values represent the same value in digital electronics system. In many cases, the number of these states is two, or binary code which means states are separated by two kinds of voltage bands:...
Heterogeneous wireless technologies are widely used in the Mobile Internet and Internet of Things (IoT). When data traverse heterogeneous wireless network, packet loss is mainly caused by error rate of the unstable channel. However, TCP is unable to distinguish the true reason. It would still reduce the congestion window that will lead to severe communication performance degradation. This paper proposed...
In this paper, we propose a novel re-restoration mechanism based on fuzzy fault set under multi-faults in optical transport networks. This new scheme inherits from our already proposed FFS (fuzzy fault set) based restoration mechanism which is a reasonable trade-off between the recovery success rate and the remaining network risk resources. We mainly consider the link faults in the simulation because...
A stateful PCE-based multi-link failure localization mechanism using fuzzy fault set is implemented in multi-domain large capacity optical networks. The novel localization mechanism has high scalability, speed and success rate compared with extended LVM protocol.
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramatically strengthens the notion of a strong extractor. A strong extractor takes two inputs, a weakly-random and a uniformly random seed $y$, and outputs a string which appears uniform, even given $y$. For a non-malleable...
The digital baseband part is the core of UHF RFID reader, its functions and features make direct impact on the reader's performance. So this paper presents the design and FPGA Verification of digital baseband system for UHF RFID reader based on ISO 18000–6b protocol. The digital baseband system consists of two parts: transmitter and receiver, which including frame header processing module, Manchester...
This paper introduces the IP Multimedia Subsystem (IMS) and its terminal application. It develops a software system of the IMS intelligent terminal based on Windows Mobile. The paper also introduces the development environment and the overall structure of the IMS terminal and describes the main thread. It presents the complete process of the Internet Protocol Television (IPTV) in detail through elaborating...
Small unmanned aerial vehicles (UAVs) have found wide use in civilian and military applications. One of the important applications is to relay information in an obstructed line-of-sight environment so as to maintain reliable wireless communication links between users which are difficult to directly communicate to each other. The use of multiple networked UAVs as relay nodes can further enhance spectral...
It has been shown that, in multi-source multi-relay networks, the use of network coding that utilizes cooperation among intra-cluster nodes can improve the outage performance. When each node is equipped with a single antenna, the relay-destination link will become the bottleneck that limits the overall network diversity gain. In this paper, we propose the use of multiple antennas at the destination...
In this paper, we develop effective multi-source relay schemes which, by exploiting cooperative network coding, are designed to achieve a high diversity gain and coding efficiency. Key to the proposed schemes lies in two ingredients: (1) Utilization of the high-capacity channels between closely spaced intra-cluster nodes to enable efficient information exchange among these nodes; (2) Proper distributed...
Based on single photons with random polarization angle, a deterministic secure bidirectional quantum communication scheme, which is similar to traditional communication mode, is proposed. In this scheme both checking messages and secret messages are encoded in the single photons rotated random polarization angle by performing a series of independent operations in three-way quantum channel. Security...
With the development of Mobile IPv6 and multicast technology, mobile multicast becomes a research hotspot. Based on two basic mobile multicast methods, the Bi-directional Tunnel (BT) method and the Remote Subscription (RS) method, some mobile multicast schemes have been proposed. However, most of them evaluate the performance by means of analysis and simulation, but lack of testing the performance...
We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is the existence of an efficiently computable permutation f1, such that for any source X ?? {0, 1}n with linear min-entropy, any circuit of size poly(n) cannot invert f(X) with non-negligible probability. Under the stronger assumption...
Route flap caused by link flap in OSPF always lead to network instability and unreliability. Most of the prevailing solutions are network-wide and require all routers to participate in the route flap suppressing process, which not only lack flexibility and scalability but also occupy additional computation resources across the network. In this paper, a localized approach is proposed to suppress the...
We design efficient protocols for processors to extract private randomness over a network with Byzantine faults, when each processor has access to an independent weakly-random n-bit source of sufficient min-entropy.We give several such network extractor protocols in both the information theoretic and computational settings.For a computationally unbounded adversary, we construct protocols in both the...
Nowadays, most firewalls which are deployed in networks are not compatible with mobile IPv6. And to modify the configuration of firewall by using NSIS signaling is one of signaling solutions. In this paper, the purpose is to resolve the problems which are in mobile IPv6 network environment during the traversal process by using NSIS signaling. We introduce a new method that can reduce the complexity...
Disparity estimation has been widely studied in the literature of stereo matching and coding. However, how to shift disparity estimation from encoder to decoder to support distributed coding applications poses a new challenge. In this paper, we present a symmetric distributed coding protocol in which interlaced representations of stereo pair are finely and coarsely quantized as primary and secondary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.