The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of analytical models of the TCP behavior have been presented recently. Most of the studies on TCP assume a fixed number of persistent TCP connections. A few of the recent studies look at non-persistent TCP connections but with many limiting assumptions. Moreover, nearly all non-persistent studies are macroscopic and not scalable. This paper introduces a scalable stochastic reward Petri nets...
Signcryption is a public key cryptographic primitive that combines the functionalities of encryption and digital signatures in a single logical step at low computational and communications costs. This paper presents a new efficient multi-recipient identity-based signcryption scheme. The scheme provides public verifiability of ciphertext origin which is an essential requirement in firewall authentication...
This paper introduces a novel architecture for mobile communication networks with guaranteed quality of service. For comparison purposes, performance upperbounds of the whole system are derived subsequently. Their numerical evaluation in real-life simulation scenarios shows that our proposal significantly outperforms the state-of-the-art IEEE 802.11 technology in random topologies with varying traffic...
The most important issue in ad hoc wireless networks is the energy. So there are a lot of research points go to the direction of energy constrained routing protocols in ad hoc wireless network. Where it is very important to examine the routing protocol to make sure it is increase the network life time. This paper introduces a brief overview about the work in this area. Also it proposes a new protocol...
Mobile ad hoc network (MANET) suffers from temporary link failures and route changes. Moreover, TCP performs poorly when most packet losses are due to congestion. Most of research performed for improving TCP performance over MANET requires feedback from lower layers. Several attempts have been proposed for a layered TCP improvement. Yet, their percentage enhancements are not satisfactory. In this...
The nature of playing video streams over a network in a real time requires that the transmitted frames are sent in a bounded delay. Also, video frames need to be displayed at a certain rate; therefore, sending and receiving encrypted packets must be sent in a certain amount of time in order to utilize the admissible delay. There are two main components for securing multimedia transmissions. Key management...
Dynamic defect models are used to estimate the number of defects in a software project, predict the release date and required effort of maintenance, and measure the progress and quality of development. The literature suggests that defects projection over time follows a Rayleigh distribution. In this paper, data concerning defects are collected from several software projects and products. Data projection...
Document clustering is a subset of the data clustering field which categorizes large set of documents into similar and related groups. In the traditional vector space model (VSM) researchers have considered the unique word which occurs in the document set as the candidate feature. Recently a new trend which considered the phrase to be a more informative feature has taken place; the matter which contributes...
With the virtually unlimited amount of information sources, search engines cannot find or index a large part of these information because they are located behind HTML forms. That part of Web are usually known as hidden Web or deep Web and because the traditional crawlers lack the suitable technique to past HTML forms, many hidden Web crawlers try to beat the problem of retrieving data behind forms...
The following topics are dealt with: mobile and ubiquitous computing, computer networks and security, software and Web engineering, multimedia and E-learning, signal processing and systems-on-chip.
Delivering learning and education is the most invaluable building block in today's knowledge-based society. The emergence of learning objects in learning technology has had a big impact on the learning environment and its community. Teachers and students have more facilities for using the e-learning system, which has made the learning process more effective. This paper presents development of learning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.