The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-Peer (P2P) technologies are considered as one of the fundamental technologies for the next generation Internet. P2P systems are classified into unstructured P2P systems or structured P2P systems depending on their topological structure of network. Most structured P2P systems are based on Chord protocol that is designed by using Distributed Hash Tables (DHTs). However, some issues have not...
Due to their dynamic topologies, providing quality of service (QoS) in wireless ad hoc networks introduces major new challenges to the research community. Now, the commercially available ad-hoc network products are those based on the IEEE802.11 Distributed Coordination Function (DCF). Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby...
This paper proposed an improved video-based texture synthesis approach for simulating realistic natural phenomena. The algorithm measures similarity of every two frames to determine a preliminary playing sequence and then divide the preliminary playing sequence into several subsequences with different frame-to-frame delay so as to remove visual discontinuities. For removing the abrupt change from...
Most CMPs use on-chip networks to connect cores and tend to integrate more cores on a single die. As the number of cores increases, on-chip networks will play an important role in the performance of future CMPs. Due to its low area cost, triplet-based network is a good choice for the designers of CMPs. In this paper, we analyze the traffic in the terms of latency and link load. Our models for 9-node...
As CMOS technology enters sub-micron era, a large number of intelligent properties (IPs) are integrated on a single chip (SoC). The communication patterns become difficult to model. At the same time, as transistors become small and wires become narrow, delays are becoming more and more unpredictable. The factors greatly challenge traditional on-chip buses and point-to-point interconnects because of...
In IEEE 802.16e system, mobile station (MS) is usually powered by battery. To save the limited power, IEEE 802.16e standard specifies sleep mode operation for power management.There are two significant performance factors in sleep mode operation, one is energy consumption, and the other is response delay. When MS wakes up by outgoing data frame from itself, only energy consumption is considered because...
It becomes a rapidly growing software developing pattern to create new Web services by composition of existing Web services. Since there are lots of Web services that perform similar or identical function but have different quality of service (QoS), it is essential to choose the proper services to compose the composite Web services that meet userspsila requirements. Because manual composition is inefficient,...
As Web services are the hotspot technology in heterogeneous application, Web services distributed management (WSDM) specification is being the focus one in the management domain. With its well-defined and extensible manageability capabilities applied for various network resources, we improved our originally proposed TcpSocket-based Topology Management System (TMS) in distributed WAN. Under the Ethernet...
In mobile ad hoc networks (MANETs), a single certificate authority (CA) node could be a security bottleneck. Multiple replica of CA is fault tolerant, but the network is as vulnerable as single CA or even worse since breaking one of the CAs means breaking all of them. Many distributed CA models based on the secret sharing scheme are proposed. In this paper, the suitable construction of the distributed...
The composed service for the complicated business appeared with the boom of electronic commerce. Previous routing algorithms designed for the linear and parallel service composition are not feasible since there are multiple interactive messages between service components. The feasible composed-service scheme selection algorithms are present, which regards delay as a prior consideration while finding...
The explosive demands of multimedia services have been grown up to support delay-sensitive applications, e.g., VoIP and streaming using codec. When a mobile node (MN) moves across different types of networks, the codec should be effectively adapted according to the significant change of network condition, i.e., throughput and delay. Therefore, in this paper, we propose a codec adaptation for vertical...
At present, Web applications and HTTP requests on the Internet are so explosively increasing that a large number of hot Web sites frequently confront with problems of server overloading. And how to provide various web services with high-level quality and satisfactory performance for Web clients has become one of the most urgent points we concern. In order to smoothly solve these problems, we proposed...
This paper focuses on the avionics task partition scheduling under the FP-EDF scheduling strategy in which the operation system adopts fixed priority strategy and each individual partition adopts dynamic priority scheduling strategy. For the partition task worst-case response time, a more exact analysis algorithm was addressed through checking each release of tasks during the partition busy period...
The context transfer can improve handover performance effectively through avoid performing the entire protocol exchange with the mobile nodes from scratch, so it have received a lot of attention recently. This paper introduced the present research situation of context transfer, and proposed a security context transfer method for integrated space network, that enables authorized security context transfers...
This paper introduces the continuous chaotic frequency modulation signals (CCFMS), which have good autocorrelations and flat frequency spectra. We show that the CCFMS have excellent delay and velocity detection performance. Moreover, the CCFMS require far lower realization costs and can provide flexible parameters adjustment. Simulation results show that the delay resolution of the CCFMS can be improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.