The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a novel wavelength assignment scheme called the WASDT (Wavelength Assignment Scheme for Data-intensive Transmission) is proposed in GMPLS based WDM Network. The WASDT is designed for the data-intensive transmission with the Optical Virtual Concatenation (OVC) technology. The novel scheme takes the data-intensive connection as a high priority connection and sends messages to all nodes...
Taking into account ultra-fast carrier dynamics, we model 640 Gbit/s wavelength conversion based on nonlinear polarization rotation (NPR) in a single semiconductor optical amplifier (SOA) and investigate the performance of three kinds of wavelength conversion schemes: one only based on NPR and the other two based on NPR assisted with sideband filtering. Simulated results show that the three kinds...
Nowadays, many application layer multicast protocols (ALM) in which multiple description coding (MDC) is introduced have been proved to be more scalable and stable than traditional multicast protocols in practical environment. In this paper, we propose an ALM system called SMSD based on synchronized MDC for streaming media to address the synchronization of available descriptions. SMSD focuses on the...
This paper presents a face-tracking algorithm based on particle filter framework. Firstly, a target state is obtained using conventional color histograms. Secondly, a tracking method is proposed on the basis of seven moment invariants, and another state vector is also computed using this approach. Furthermore, the weights of the two state vectors are computed according to Euclidean distance between...
In the distributed video coding, side information is involved not only in the decoding of the quantized source, but also in the reconstruction of the images. So the quality of side information takes an important role in the distributed video codec. In this paper, a refined approach to SI extraction is proposed. Based on the high correlation between the motion vectors of adjacent blocks, the motion...
The following topics are dealt with: broadband network; multimedia; network management; network measurement; optical network; optical system; security; communication theory; protocols; peer to peer; wireless communications; mobile communications; computer system and computer services.
Using frequency weighted mining algorithm with real-time data processing capability to calculate each system call's frequency value for existed audit records, and we got a vector set of progress. The vector set was linearly scanned and its progresses were labeled as ??normal?? or ??attack?? according to their distance relations. Then we got a SVM training set without man-made supervision. Finally,...
Production and maintenance of interactive digital television (iTV) services can be a hard task due to the diversity of deployed digital television (DTV) platforms and the differences in terms of capabilities and functionalities between the receiver devices. The digital video broadcasting (DVB) portable content format (PCF) is a standard platform-independent service description which specifies the...
Although the frequency of Internet worm's outbreak is decreased, the impact of worm on people's wealth security and society's stabilization is still an unnegligible problem, especially the emergence of botnet. With the growth of variable network structure and applications, such as P2P network, Internet worms can explore more fast and covert ways to propagate. Hence, an accurate worm propagation model...
Single Sign on (SSO) is a method for accessing resources within multiple systems. However, some security vulnerabilities exist in current SSO systems, and user's experience is not convenient. This paper proposes an extension of SSO, named multi-level authentication-based SSO (MLA-SSO). In MLA-SSO, SPs are divided into several levels based on security intensity. This allows the model to benefit from...
The search engine based P2P give a new solution for Internet information search. The best advantage of P2P search engine at using the advanced peer search idea that completely search the Internet without through center server and don't limit for information document format and host equipment. The paper introduces the current technology development of P2P search, analyzes the mainstream P2P search...
A large number of works have been made to apply P2P techniques into services discovery. However, most of them only focus on matching the functional properties and ignore the non-functional properties. With a wide variety of services are offered that can satisfy the functional requirements, a policy is needed to support users to obtain the rank of the located services according to their nonfunctional...
The deep study of anomaly feature based on the particular server was made in this paper. By continuously monitoring on the honeypot deployed in Internet Data Center for more than two months, the experimental results were summarized and some initial exploratory models were built. The models show that the number of attackers for the main attack types and ports can be described by normal distribution;...
The fast development of communication technologies brings a heterogeneous network environment, which makes it more complicated to guarantee end to end quality of service (QoS). As a result, an open QoS control and management framework is crucial for the service providers. In this paper, we propose a novel pricing-based end to end QoS control and management architecture, with some key functional blocks...
Tasks' smallest completion time is a fundamental goal of the grid scheduling, however, the completion time of tasks and cost are often anti-correlated. In this paper, A budget constrained optimal time scheduling on the grid computing platforms is discussed, where resources have different speeds of computation and prices. The task scheduling problem is converted into a linear programming problem. Each...
In this paper, an easy solution to the upper and lower bound of the outage probability in ad hoc networks is presented. First we calculate the characteristic function of a model under power control. Then, we introduce some existing results under a special model which we call it the system model. By comparing the characteristic functions of the normalized interference under two models, we find that...
Layering techniques effectively cope with network heterogeneity encountered in media distribution. Recent work on network coding shows that the multicast throughput can be greatly improved by allowing coding operation at the intermediate nodes in the network. In this paper, we study the problem of lexicographically fair bandwidth allocation to make the receivers of different sessions share network...
Presently, It is paid much attention to network performance, as a main criterion, delay is becoming more and more important. A network model for a certain network is built by simulation software. It analyses the relations among delay, throughput, user number and bandwidth. Then it points out the direction to decrease the network delay by simulation and it can optimize the network performance with...
Ad hoc is a kind of self organized network which is different from traditional communication system. In recent years, ad hoc network has been well developed. AODV (ad hoc on-demand distance vector) is an important protocol of ad hoc network which is recommended by IETF by its simple operation and outstanding performance. However, AODV protocol is not perfect so far, which still has some issues needed...
With the rapid development of wireless technologies and increasing communication need of people in ubiquitous environment, some handoff schemes and improvements were proposed by IETF in order to support mobility effectively. In addition, mobile Stream Control Transmission Protocol (mSCTP) proposed by IETF is a new transport protocol supporting mobility and with a built-in feature called Multi-homing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.