The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The client-server architecture widely adopted on the Internet is not adequate to meet the ever-increasing user loads and bandwidth demands in live streaming systems especially for multimedia content delivery. Peer-to-peer (P2P) overlay networks provide excellent system scalability and high resource utilization, which make it an attractive solution to this problem. We consider a hybrid hierarchical...
Application Layer Multicast (ALM) has become a popular form of content distribution. It shows some favourable properties like inherent scalability and the overcoming of the traditional client-server bottleneck. In the future, a large fraction of the participants in ALM systems will be mobile (eg. smart-phones or netbooks) and demand for a proper inclusion and mobility handling. After analyzing current...
With the dramatic increase of network bandwidth and decrease of network latency and because of development of new network programming technologies, the dynamic websites provide dynamic interaction to the end user and at the same time implement asynchronous client-server communication in the background. Many applications are being deployed through the computer and are becoming more popular and are...
In collaborative plant design, the traditional modelling methods have the shortcomings such as large amount graphic description information, modifying difficulty and large amount data transfer between server and client. A modeling method based on graphic description file is proposed, which is a combining graphic representation of geometry and topology template with its data transfer under C/S mode...
Latency problems are characterized by their focus on minimizing total waiting time for all clients. We consider periodic latency problems: an extension of standard latency problems. In a periodic latency problem each client has to be visited regularly. More precisely, given is a server traveling at unit speed, and a set of clients with their positions. To each client a periodicity is associated that...
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol is the most important part of the malicious botnet's evolution and evasion techniques. The initial malicious botnet was using the IRC protocol for communication between the command and contorl server and the zombie system. After that they use the HTTP protocol on the firewall-friendly...
In this paper, we propose and study how to provide multipath cross-layer service discovery (MCSD) for mobile ad hoc networks (MANETs). Cross-layer service discovery integrates service discovery into route discovery by taking advantage of network-layer topology information and routing message exchange. Multipath service discovery differs from multipath routing in that multipath service discovery can...
Network management is one of the important areas in todaypsilas computing world. A basic requirement for the management of a complex network is the definition of high-level and flexible models to coordinate the accesses to the resources data and services provided by the network nodes. Most of the network management platforms are based on polling-based centralized SNMP management model which has the...
Identifying and inferring performances of a network topology is a well known problem. Achieving this by using only end-to-end measurements at the application level is a method known as network tomography. When the topology produced reflects capacities of sets of links with respect to a metric, the topology is called a Metric-Induced Network Topology (MINT). Tomography producing MINT has been widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.