The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The features of P2P networking architecture can contribute to robustness and scalability, however, it also introduces network-oblivious traffic, which brings big pressure to the ISPs. Meanwhile, since traffic of P2P applications occupies much of bandwidth in bottleneck links, non-p2p applications may be severely harmed due to lack of bandwidth. To conquer this problem, previous works mainly focused...
A new numerically efficient global optimization algorithm utilizing grid computing technique and surrogate objective function (SOF) is developed. The algorithm combines particles swarm optimization (PSO) with a SOF constructed by using Multi-quadric radial basis function. For the computation of the objective function values for sampling points, grid computing technique is adopted employing the same...
Cognitive radio (CR) is a promising technology that can be a solution for the frequency scarcity problem of the wireless mesh network operating on multiple channels. In this paper, we investigate the joint channel assignment and routing in CR-based wireless mesh networks (CRWMNs) for better coexistence with primary users and other CR networks. We formulate an optimization problem with the objective...
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive - but potentially crude - method of processing the ACL rules in sequential order. Although such an approach leads to variable processing times for each packet matched against the ACL, it also offers the opportunity to reduce this time by reordering its rules in response to...
Because of anonymity and flexibility of C2C online transaction, trust plays a critical role. On successful E-business, so it is very important to evaluate this trust degree. However there are much fuzzy and uncertainty in this evaluation process, so an evaluation approach based on Fuzzy Neural Network (FNN) is pointed out and applied to solve this problem. FNN has such advantages as multiple rule...
The following topics are dealt with: data security; pattern classification; mobile computing; text-to-speech synthesis; user interfaces; Web services; medical computing; customer relationship management; optimisation; genetic algorithms; learning; data mining; computer aided instruction; software engineering; watermarking schemes; wireless sensor networks; educational administration; evolutionary...
While a variety of routing algorithms have been invented for overlay networks, only a few studies focus on the placement problem of overlay nodes. However, the performance of overlay routing always depends on the routing policy of the underlying Internet, such as BGP routing. According to the BGP routing policy, the result routing path heavily depends on the locations of the two end nodes. By placing...
Network performance monitor has now become a central issue in network application and operation optimization. This article describes an integrated network performance monitor system using a combination of active and passive measurement techniques. Active probing technique is used for overall network performance monitor, and passive monitoring technique is used for local network performance information...
We present an optimization technique for model-based generation of test cases for firewalls. Starting from a formal model for firewall policies in higher-order logic, we derive a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage. The correctness of the rules and the algorithm...
A new remote server based gaming approach, where the responsibility of executing the gaming engines is put on remote servers instead of the mobile devices, has the potential for enabling mobile users to play the same rich Internet games available to PC users. However, the mobile gaming user experience may be limited by risks of unacceptably high response time, and low gaming video quality, as gaming...
The demand for Internet connectivity has grown exponentially in the past few years. Moreover, the advent of new services such as Voice over IP (VoIP), Video on Demand (VOD) and Videoconferencing applications have caused a sever increase in traffic, which makes it extremely hard to ensure an acceptable level of quality. This is mainly attributed to current routing strategies, such as Link State (LS)...
The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respect, such content resides outside web pages, and is only accessible through interaction with the web site typically via HTML forms. It is believed that the size of the Deep Web is several orders of magnitude larger than that of the so-called...
Considering the growing development of information at World Wide Web, the users find it difficult to have access to the documents s/he requires. The purpose of this paper is to present a method for making the search by user more systematic and limited using some statistical techniques. For this purpose, we will present a formula by multiple linear regression models in order to model the relation between...
Complex networks consisting of humans and software services, such as Web-based social and collaborative environments, typically require flexible and context-based interaction models. Due to the dynamics in such systems, networks are in a state of constant flux and change. Several fundamental concepts, including discovery, interactions, task delegations and executions are no longer based on static...
XML is a self- describing and platform- free language, which has become a powerful tool when exchanging and sharing information among different heterogeneous system on internet. The data Consolidation method based XML Schema is put forward in this paper, by the combination of model method based XML and schema mapping method, schema Consolidation is realized, thus, public schema is produced, lastly,...
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring results but also minimum communication cost for efficiency and scalability. Most existing work adopts an instantaneous state monitoring approach, which triggers state alerts whenever a constraint is violated. Such an approach, however,...
Cloud Computing in general and Virtualized Infrastructure Provisioning in particular, are significant trends with the potential to increase agility and lower costs of IT. An emerging cloud service is a virtual server shop, that allows cloud customers to order virtual appliances to be delivered virtually on the cloud. Like physical shops, customers want to customize the ordered products, e.g., have...
Wireless mesh networks are popular as a cost- effective means to provide broadband connectivity to large user populations. A mesh network placement provides coverage, such that each target client location has a link to a deployed mesh node, and connectivity, such that each mesh node wirelessly connects directly to a gateway or via intermediate mesh nodes. Prior work on placement assumes wireless propagation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.