Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 11 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Research and design based on path switching strategy of extended LDP protocol | |||
YU Zhiji,ZHANG Haiyang | |||
Computer Science and Technology 09 January 2019 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Label diversion protocol (LDP) is a signal controlling protocol based on the multiple protocol label exchanging system. How to perform path switching is a key issue in the extended LDP protocol(includes p2mp-ldp and mp2mp-ldp). In the case of route flapping, Path switching may cause unnecessary waste of resources. The resource loss rate can be used as an important indicator in many network protocols.Therefore, this paper firstly uses the extended LDP protocol to perform path switching scenarios on route flapping, then abstracts the path switching strategy into a generic modell, exploring the resource loss rate caused by the path switching strategy on the general model.Then,A delay switching strategy is proposed on the general model to prove the feasibility of the delay switching strategy by reducing the resource loss rate. At last, this paper compare normal switching and delayed switching strategies, prove the practicability of the technology through the application on the quagga platform. The delay switching strategy presented in this paper is not only applicable to the LDP protocol, but also to other complex network protocols. | |||
TO cite this article:YU Zhiji,ZHANG Haiyang. Research and design based on path switching strategy of extended LDP protocol[OL].[ 9 January 2019] http://en.paper.edu.cn/en_releasepaper/content/4746973 |
2. An Algorithm on Video Caching Design in Content Delivery Network | |||
Kai Wu,Chensheng Wang,Guang Yang | |||
Computer Science and Technology 10 June 2017 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In recent years, multimedia traffic such as video on demand shows explosive growth on the Internet. Network operators are considering content delivery network as the main strategy to keep up with the increasing demand for video requests with the minimum possible delay. Layered video encoding strategies such as Scalable Video Coding enable different caches to store different layers of a video content, allowing successive improvement of the video stream quality. However, the caching placement of video encoding layers that minimize the average delay is NP-hard. We reduce the complexity of this problem to pseudopolynomial time by using a connection with multiple-choice knapsack problem. Numerical results show up to 25% reduction in delay over existing video caching strategies. | |||
TO cite this article:Kai Wu,Chensheng Wang,Guang Yang. An Algorithm on Video Caching Design in Content Delivery Network[OL].[10 June 2017] http://en.paper.edu.cn/en_releasepaper/content/4735355 |
3. GSPN-based Model to Evaluatethe Performance and SecurityTradeoff in Ad-hocNetwork | |||
DENG Junyi,LIU Yanheng,ZHAO Rongcun,WANG Jian | |||
Computer Science and Technology 26 June 2016 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The performance and security tradeoff problemis always a critical issue in the research of Ad-hoc network. Researchers have presented many prioritization schemes. Because of these schemes from different aspects, we cannot compare them directly. We raise a widely used approach to evaluate the schemes which trade off between performance and security in Ad-hoc network. We first structurethe intra-node and inter-node data transmission modelsusing GSPN, then compute the performance, security and income with CMCT (continuous-time Markov chain).In this way, we put security strategies into a unifiedevaluation framework in order to achieve the optimal equilibrium solution,and the model provides the theory basis and data reliance for making efficient use of resources. | |||
TO cite this article:DENG Junyi,LIU Yanheng,ZHAO Rongcun, et al. GSPN-based Model to Evaluatethe Performance and SecurityTradeoff in Ad-hocNetwork[OL].[26 June 2016] http://en.paper.edu.cn/en_releasepaper/content/4697619 |
4. Rough Set based K-Modes Clustering Algorithm with Hadoop Cloud Platform | |||
ZHANG Lisheng,ZHANG Jiong,LEI Dajiang | |||
Computer Science and Technology 21 April 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, in order to solve the problems that the traditional K-Modes clustering algorithm cannot efficiently handle massive amounts of data and cannot accurately calculating the dissimilarity between data objects attributes. Based on rough sets and cloud computing, proposed K-Modes clustering algorithm based MapReduce programming model and rough sets. Firstly, using rough set model to recalculate dissimilarity between data object attributes for improving the accuracy of the calculation of distances, then combine the advantages of Hadoop platform and MapReduce programming model, will be parallelized to achieve K-Modes algorithm based on rough sets. Through the experiment, when clustering high dimensional massive data, the improved algorithm reduces the computer time and get an effective clustering results. Experiments show that the proposed algorithm has better stability and scalability. | |||
TO cite this article:ZHANG Lisheng,ZHANG Jiong,LEI Dajiang. Rough Set based K-Modes Clustering Algorithm with Hadoop Cloud Platform[OL].[21 April 2015] http://en.paper.edu.cn/en_releasepaper/content/4639491 |
5. A GPU-based Native Bayesian algorithm for document classification | |||
Yang Chengpeng,Gao Zhanchun,Jiang Yanjun | |||
Computer Science and Technology 19 November 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Document classifying is one of the most important tasks in text mining. In classifying algorithms, high-dimensional vector is usually used to represent all features or all features' weight information which causes that the algorithms are often computationally expensive. This paper implements a GPU-based Bayesian algorithm with NVIDIA's Compute Unified Device Architecture (CUDA) and uses it for document classifying. In this experiment, the GPU-based program can acquire a maximum 50 times speedup in contrast with CPU-based program. | |||
TO cite this article:Yang Chengpeng,Gao Zhanchun,Jiang Yanjun. A GPU-based Native Bayesian algorithm for document classification[OL].[19 November 2013] http://en.paper.edu.cn/en_releasepaper/content/4570429 |
6. Design of Multifunction Routing Sensor Based on Zigbee | |||
FAN Qingsong,HUANG Jianming | |||
Computer Science and Technology 18 December 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In the wireless sensor network area, the sensor network can change dynamically. Environmental factors may cause the instability of the wireless communication link.If a sensor lose connection with the network, the environmental data collected by it can not be sended to the network center. Reducing the number of nodes without lower the original system performance can reduce the probability of error in the entire network. This system is based on CC2430 and TI Zigbee stack and integrates the monitor functions with router. Because of reducing the number of nodes in the network, the wireless network stability is enhanced and the construction costs is reduced too.? | |||
TO cite this article:FAN Qingsong,HUANG Jianming. Design of Multifunction Routing Sensor Based on Zigbee[OL].[18 December 2012] http://en.paper.edu.cn/en_releasepaper/content/4501024 |
7. The Opening Capability Of Convergence Services Based On Representational State Transfer (REST) | |||
Song Xuwei,E Haihong,Ma Jun | |||
Computer Science and Technology 30 December 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Mainly focused on the opening capability of convergence services, firstly, this paper introduces the key technologies to the opening capability of convergence services: Representational State Transfer (REST) and Mashup, also the origin, features and characteristic of the two key technologies. Then, this paper studies the technologies and research status of the open capability of the Internet and telecommunications. After that, the paper discusses what technologies could help open the capability of convergence services better and how to open the capability of convergence services. Finally, this paper points out some challenges we must face. | |||
TO cite this article:Song Xuwei,E Haihong,Ma Jun. The Opening Capability Of Convergence Services Based On Representational State Transfer (REST)[OL].[30 December 2011] http://en.paper.edu.cn/en_releasepaper/content/4451755 |
8. K-means Clustering Distributed Data Mining Based on Hadoop | |||
XIAO Shan,YU Yanhua,YANG Zhifang,E Xinhua | |||
Computer Science and Technology 04 December 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract: In the face of massive data on the Internet, a single host has been unable to meet their storage and computing requirements, distributed storage and distributed computing applications is an inevitable trend. Hadoop is the application of which more distributed storage and computing frameworks. Various features of the Hadoop is ideal for data mining, this paper presents a Hadoop-based framework for distributed data mining model, and give the corresponding Map / Reduce process of design ideas and examples for distributed data mining. | |||
TO cite this article:XIAO Shan,YU Yanhua,YANG Zhifang, et al. K-means Clustering Distributed Data Mining Based on Hadoop[OL].[ 4 December 2011] http://en.paper.edu.cn/en_releasepaper/content/4453607 |
9. The Research about The Development of The Internet of Things and Cloud Compting | |||
XIANG Qiyao,ZHANG Yongjun | |||
Computer Science and Technology 01 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Computer Network Technology represented by the Internet is a great achievement in computer science in the twentieth century, and makes profound changes in our life. But now no matter how powerful network functions, no matter how abundant network world, it is a virtual world after all, in which it is difficult to perceive the real world. With the coming of the financial crisis, the times call for a new technology to bring rapid economic growth. Not just a simple sensor network, but it should be a technology for large amounts of data's aggregation and processing, which called cloud computing. We can foresee that, in the near future, cloud computing will bring tremendous changes to our lives once again. | |||
TO cite this article:XIANG Qiyao,ZHANG Yongjun. The Research about The Development of The Internet of Things and Cloud Compting[OL].[ 1 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4447866 |
10. Topology control Protocol in Hybrid wireless sensor networks for roadway | |||
WANG Qun,WANG Qianping,XU Qin,LAI Liangli | |||
Computer Science and Technology 23 February 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper proposes a hybrid wireless sensor networks topology control protocol for tenuous roadway. The protocol run different algorithm on different nodes respectively, it makes the network time delay reducing and energy consumption optima. Extensive simulations have been conducted and the simulation results reveal that the resultant topology after applying our topology control algorithm shows good performance in terms of network lifetime and scalability. | |||
TO cite this article:WANG Qun,WANG Qianping,XU Qin, et al. Topology control Protocol in Hybrid wireless sensor networks for roadway[OL].[23 February 2011] http://en.paper.edu.cn/en_releasepaper/content/4411653 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated