The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The audio acquisition system implemented on the TMS320C5402 platform is introduced in detail, the interface design between TMS320C5402 and TLV320AIC23 is discussed from control interface and data transfer interface two aspects, and the software implementation process is described in briefly.
We consider the problem of minimizing the cost of cooperative data exchange between a group of wireless clients. In this problem, a group of clients needs to exchange a set of packets over a shared lossless broadcast channel. Each client initially holds a subset of packets and needs to obtain the packets held by other clients. At each round, one of the clients can broadcast its packets or a combination...
In this paper, we seek to provide reliable and fast content discovery in peer-to-peer (P2P) video-on-demand (VoD) system to enable user interactivity under peer dynamics. We first identify two characteristics of content discovery in P2P-VoD: real-time constraints and limited local cache. Tapping on these properties, we propose a hybrid content discovery mechanism: SUpeRchunk- based eFficient search...
Unlike traditional routing schemes that route all traffic along a single path, multipath routing strategies split the traffic among several paths in order to ease congestion. It has been widely recognized that multipath routing can be fundamentally more efficient than the traditional approach of routing along single paths. aiming at the increasing network traffic and the deficity that the former Ant...
In this paper we consider the problem of cycle matching for homogeneous symmetric publish/subscribe system. In this kind of applications, besides one-to-one swap, exchange can occur between more than two subscriptions, which is called cycle matching. The cycle matching provides more exchange candidates for users to choose, therefore improves the number of successful exchanges. As far as we know, there...
Analysis on the basis of the protocol Gnutella0.6, the use P4P technologies for sensing conveniently network topology information, proposes a P4P-based Gnutella routing algorithm, in which nodes join algorithm to consider the network topology and as far as possible to join super-nodes that close to itself. When routing algorithm forwards query packet, it give priority to select the physical proximity...
This paper introduces a mechanism - UDT-Authentication Option (AO) to secure UDT -a new UDP-based data transport protocol. We describe this mechanism through the introduction of UDT extension to achieve security. We evaluate UDT-AO through the use of existing message authenticity for other protocols such as TCP. We review existing message protection that can act like a signature for UDT segment incorporating...
XML is becoming the de facto standard for exchanging and querying documents over the Web. Many XML query languages such as XQuery and XPath use label paths to traverse the irregularly structured XML data. Several labeling schemes have been proposed to identify the structural relationships in the tree, as well as to support the incremental updates at a low cost. In this paper, we conduct a comprehensive...
Nowadays, many researchers focus on twig query pattern of XML data. The main representatives are the Holistic Twig Joins method, the use of XR-Tree Index based on it, or the algorithm of identifying directly XML nodes satisfying consecutive parent-children edge-path. All of these efforts don't improve the efficiency of twig query at all. In this paper, several common twig query algorithms of XML data...
The design of streaming applications (e.g. multimedia or network packet processing) must consider several optimizations such as the minimization of the whole surface of the memory needed on a Chip. The problem tackled in this paper is the minimization of the whole surface of the memory needed to reach a minimum fixed throughput. The application is modelled using a Marked Timed Weighted Event Graphs...
Duplicate detection, which is an important subtask of data cleaning, is the task of identifying multiple representations of a same real-world object and necessary to improve data quality. Numerous approaches both for relational and XML data exist. As XML becomes increasingly popular for data exchange and data publishing on the Web, algorithms to detect duplicates in XML documents are required. Previous...
Since modern software systems are enormous and complicated, proper abstractions of their structure are essential for better understanding, maintaining and updating these system. In order to create and support such features through generating the architecture levels in the system structure, it is effective to conduct software clustering techniques from the source code. In recent years, mobile systems...
World is shrinking each day through the use of Internet and people are communicating better than before in this widely distributed network. There is a great need to manage this communication over various networks supporting different specifications. One of the widely used techniques for this type of data management is XML data interchange format. Google developers recently introduced Protocol Buffer...
Security being the major concern during data transfers; we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypted. Considering small size of data the requirements change from the existing security encryption techniques. One of the major issues to be considered is the computational speed of the encryption model. Though there are many...
Traditional Peer-to-Peer (P2P) overlay networks are based on distributed peers' query system, which incurs heavy control overhead on P2P overlay networks. In this paper, we present a Transmission Topology Map (TTM) construction algorithm for content owner-oriented P2P content sharing, which can also be considered as 'push-based P2P'. The main feature of the algorithm is that when a content owner disseminates...
The accuracy and completeness of data exchange largely depend on the semantics of the data exchange problem and are best verified by answering queries over target instances in such a way that is semantically consistent with the source data. The concept of certain answers is used in the definition of the semantics of answering queries. But as certain answers are defined as a relation without null values,...
Digital video is one of the popular multimedia data exchanged in the internet. Due to their perfectly replicable nature many illegal copies of the original video can be made. Methods are needed to protect copyrights of the owner and prevent illegal copying. A video can also undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and unintentional attacks like...
As a novel semi-structured language, XML has become the de facto standard of data exchange over the Internet, due to that XML is characterized by self-described, scalable and convenient for exchange. In order to filter the XML publishing events, a novel filtering method is presented with the optimized rewriting method and then, the proposed algorithm is proved by the algorithm analysis.
Web data is currently mainly in the form of HTML pages, expressed by the HTML language of Web pages through the browser after analysis is only suitable for people to browse, not suitable for data exchange as a way to deal with by a computer. This article will make web page decompound a DOM tree, then from the DOM tree body root node to start, in accordance with the breadth-first traversal order DOM...
There are many research make use of grid computing to solve large-scale problems and produced at a tremendous velocity and volume from scientific experiments in the fields of high energy physics, molecular docking, computer micro-tomography and many others. Distribute fairly available resources is one of the problem in grid computing and economy model is a way to solve those problems about distribute...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.