The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Speech recognition result is always evaluated by dynamic programming algorithm which can find the best match between recognized results and references. And the match unit could be word, syllable, phone and so on. However, in mandarin speech recognition, this traditional algorithm is not accurate because of the unique characteristics of Chinese word-formation. In order to improve evaluation performance...
In order to solve the problem of user trust in distributed environment. Reliability-based four levels access control model (RBFLAC) has been presented. Firstly, this paper describes RBFLAC in detail, then, it mainly discusses the trust authorization algorithm of RBFLAC.By the trust authorization algorithm. it can realize the security authorization and assure the security of information system.
Different dynamic routing and wavelength assignment algorithms for WDM optical networks are described in this paper. A new dynamic algorithm based on the layered graph model and called Multi-object Optimal Algorithm (MOA) is proposed. A distinguished feature of MOA algorithm is that it employs more accurate network information than the existing algorithms on the availability of both the number of...
Admission control and routing are two key mechanisms for advanced Quality of Service (QoS) and Traffic engineering (TE) support in the data networks. However, traditional QoS and TE solutions usually focus exclusively on routing to achieve network resource usage optimization, while often neglect to give adequate attention to admission control. To provide a more comprehensive solution, a novel approach...
Generalized Multi-Protocol Label Switching (GMPLS) based optical networks are viewed as a promising network infrastructure for the next generation network (NGN) development. By pre-configuring the resources of dynamic optical networks, we can reconstruct the physical topology, thus increase the number of direct routes between potentially heavily loaded physical node pairs and optimize the performance...
In this paper, we investigate the problem of resource allocation with fairness constraints for OFDMA distributed antenna system (DAS). We formulate this problem as a binary integer programming problem, and transform it into a generated directed graph with the linear optimal distributed method to solve. Some simulation results compare the proposed algorithm with a given heuristic algorithm for purpose...
Recently there have been many research topics in wireless sensor networks (WSN) for efficiently monitoring the environments, and localizing, detecting, and classifying targets of interest. Most of these researches assume that the environment to be stable. On the other hand, if the sensor nodes are deployed randomly, the establishing connection between the sensor nodes is critical importance. In this...
In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class...
It is a challenge to thwart both the passive attacks and active attacks in mobile ad hoc networks for their unique characteristics. The improvement of security often sacrifices the delivery rate or other QoS. We propose secure multipath routing scheme based on modified secret sharing as an effective mechanism to protect data confidentiality and simultaneously enhance data delivery rate in mobile ad...
Multiple pattern matching algorithms are essential engines of network intrusion detection systems (NIDSs) to inspect packets for occurrences of malicious patterns. For a set of patterns, the multiple pattern matching algorithms usually build a trie data structure. In this paper, we propose efficient implementations of the multiple pattern matching algorithms widely used in NIDSs by using a linearized...
In this paper we indicate the concept of dynamic data flow graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.