Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 8 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Research and design based on path switching strategy of extended LDP protocol | |||
YU Zhiji,ZHANG Haiyang | |||
Computer Science and Technology 09 January 2019 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Label diversion protocol (LDP) is a signal controlling protocol based on the multiple protocol label exchanging system. How to perform path switching is a key issue in the extended LDP protocol(includes p2mp-ldp and mp2mp-ldp). In the case of route flapping, Path switching may cause unnecessary waste of resources. The resource loss rate can be used as an important indicator in many network protocols.Therefore, this paper firstly uses the extended LDP protocol to perform path switching scenarios on route flapping, then abstracts the path switching strategy into a generic modell, exploring the resource loss rate caused by the path switching strategy on the general model.Then,A delay switching strategy is proposed on the general model to prove the feasibility of the delay switching strategy by reducing the resource loss rate. At last, this paper compare normal switching and delayed switching strategies, prove the practicability of the technology through the application on the quagga platform. The delay switching strategy presented in this paper is not only applicable to the LDP protocol, but also to other complex network protocols. | |||
TO cite this article:YU Zhiji,ZHANG Haiyang. Research and design based on path switching strategy of extended LDP protocol[OL].[ 9 January 2019] http://en.paper.edu.cn/en_releasepaper/content/4746973 |
2. An Algorithm on Video Caching Design in Content Delivery Network | |||
Kai Wu,Chensheng Wang,Guang Yang | |||
Computer Science and Technology 10 June 2017 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In recent years, multimedia traffic such as video on demand shows explosive growth on the Internet. Network operators are considering content delivery network as the main strategy to keep up with the increasing demand for video requests with the minimum possible delay. Layered video encoding strategies such as Scalable Video Coding enable different caches to store different layers of a video content, allowing successive improvement of the video stream quality. However, the caching placement of video encoding layers that minimize the average delay is NP-hard. We reduce the complexity of this problem to pseudopolynomial time by using a connection with multiple-choice knapsack problem. Numerical results show up to 25% reduction in delay over existing video caching strategies. | |||
TO cite this article:Kai Wu,Chensheng Wang,Guang Yang. An Algorithm on Video Caching Design in Content Delivery Network[OL].[10 June 2017] http://en.paper.edu.cn/en_releasepaper/content/4735355 |
3. GSPN-based Model to Evaluatethe Performance and SecurityTradeoff in Ad-hocNetwork | |||
DENG Junyi,LIU Yanheng,ZHAO Rongcun,WANG Jian | |||
Computer Science and Technology 26 June 2016 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The performance and security tradeoff problemis always a critical issue in the research of Ad-hoc network. Researchers have presented many prioritization schemes. Because of these schemes from different aspects, we cannot compare them directly. We raise a widely used approach to evaluate the schemes which trade off between performance and security in Ad-hoc network. We first structurethe intra-node and inter-node data transmission modelsusing GSPN, then compute the performance, security and income with CMCT (continuous-time Markov chain).In this way, we put security strategies into a unifiedevaluation framework in order to achieve the optimal equilibrium solution,and the model provides the theory basis and data reliance for making efficient use of resources. | |||
TO cite this article:DENG Junyi,LIU Yanheng,ZHAO Rongcun, et al. GSPN-based Model to Evaluatethe Performance and SecurityTradeoff in Ad-hocNetwork[OL].[26 June 2016] http://en.paper.edu.cn/en_releasepaper/content/4697619 |
4. Design of Multifunction Routing Sensor Based on Zigbee | |||
FAN Qingsong,HUANG Jianming | |||
Computer Science and Technology 18 December 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In the wireless sensor network area, the sensor network can change dynamically. Environmental factors may cause the instability of the wireless communication link.If a sensor lose connection with the network, the environmental data collected by it can not be sended to the network center. Reducing the number of nodes without lower the original system performance can reduce the probability of error in the entire network. This system is based on CC2430 and TI Zigbee stack and integrates the monitor functions with router. Because of reducing the number of nodes in the network, the wireless network stability is enhanced and the construction costs is reduced too.? | |||
TO cite this article:FAN Qingsong,HUANG Jianming. Design of Multifunction Routing Sensor Based on Zigbee[OL].[18 December 2012] http://en.paper.edu.cn/en_releasepaper/content/4501024 |
5. The Opening Capability Of Convergence Services Based On Representational State Transfer (REST) | |||
Song Xuwei,E Haihong,Ma Jun | |||
Computer Science and Technology 30 December 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Mainly focused on the opening capability of convergence services, firstly, this paper introduces the key technologies to the opening capability of convergence services: Representational State Transfer (REST) and Mashup, also the origin, features and characteristic of the two key technologies. Then, this paper studies the technologies and research status of the open capability of the Internet and telecommunications. After that, the paper discusses what technologies could help open the capability of convergence services better and how to open the capability of convergence services. Finally, this paper points out some challenges we must face. | |||
TO cite this article:Song Xuwei,E Haihong,Ma Jun. The Opening Capability Of Convergence Services Based On Representational State Transfer (REST)[OL].[30 December 2011] http://en.paper.edu.cn/en_releasepaper/content/4451755 |
6. The Research about The Development of The Internet of Things and Cloud Compting | |||
XIANG Qiyao,ZHANG Yongjun | |||
Computer Science and Technology 01 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Computer Network Technology represented by the Internet is a great achievement in computer science in the twentieth century, and makes profound changes in our life. But now no matter how powerful network functions, no matter how abundant network world, it is a virtual world after all, in which it is difficult to perceive the real world. With the coming of the financial crisis, the times call for a new technology to bring rapid economic growth. Not just a simple sensor network, but it should be a technology for large amounts of data's aggregation and processing, which called cloud computing. We can foresee that, in the near future, cloud computing will bring tremendous changes to our lives once again. | |||
TO cite this article:XIANG Qiyao,ZHANG Yongjun. The Research about The Development of The Internet of Things and Cloud Compting[OL].[ 1 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4447866 |
7. Topology control Protocol in Hybrid wireless sensor networks for roadway | |||
WANG Qun,WANG Qianping,XU Qin,LAI Liangli | |||
Computer Science and Technology 23 February 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper proposes a hybrid wireless sensor networks topology control protocol for tenuous roadway. The protocol run different algorithm on different nodes respectively, it makes the network time delay reducing and energy consumption optima. Extensive simulations have been conducted and the simulation results reveal that the resultant topology after applying our topology control algorithm shows good performance in terms of network lifetime and scalability. | |||
TO cite this article:WANG Qun,WANG Qianping,XU Qin, et al. Topology control Protocol in Hybrid wireless sensor networks for roadway[OL].[23 February 2011] http://en.paper.edu.cn/en_releasepaper/content/4411653 |
8. The UPnP-based Algorithm of Resource Scheduling in Pervasive Computing Environment | |||
Tian Tian,Jian Kuang,JiaLi Bian | |||
Computer Science and Technology 04 March 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, an algorithm of resource schedule based on UPnP is proposed for pervasive computing. A user could access any resource he or she wants in anywhere at anytime without thinking about more. And the system can schedule the resources exiting in the network by this algorithm. The resource mentioned above can also be understood for service that users may need. A strategy is also presented in this algorithm, which is optimization method of choosing the best one from the devices that provide the services or resources. This research for RS algorithm is supported by Microsoft Research Asia, and by the Embedded Systems and Network Communications Laboratory at Beijing University of Posts and Telecommunications. | |||
TO cite this article:Tian Tian,Jian Kuang,JiaLi Bian. The UPnP-based Algorithm of Resource Scheduling in Pervasive Computing Environment[OL].[ 4 March 2008] http://en.paper.edu.cn/en_releasepaper/content/19008 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated