Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 7 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Adaptive packet scheduling algorithm for time-sensitive service | |||
ZHANG Zhenjie,Jianfeng Guan | |||
Computer Science and Technology 18 December 2020 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With the rapid development of mobile Internet and Internet of things, a series of time sensitive services such as video conferencing, cloud games, AR / VR have emerged. In order to meet the above time sensitive services, IETF proposed Deterministic Network(DetNet) architecture, which provides an ideal deterministic delay through clock synchronization, zero congestion loss and other mechanisms. At the same time, Tsinghua University proposed Deadline-aware transport protocol(DTP), hoping to specify the deadline in the application layer, and then meet the requirements in the transport layer. These strategies and ideas for time delay sensitive services are worth learning from. However, the current packet transmission mechanisms are all rule-based and relatively static strategies, which can’t meet the demand of time sensitive service in dynamic network. Therefore, based on the idea of DTP and reinforcement learning, this paper proposes an algorithm to dynamically adjust the transmission priority. More specifically, we design the reward and penalty function according to the requirements of DTP protocol, and design the algorithm of congestion control and packet scheduling in the transport layer. We consider not only the priority but also the service deadline. Comprehensive experiments show that compared to traditional packet scheduling strategies, our algorithm performs better in the transmission of time-sensitive services | |||
TO cite this article:ZHANG Zhenjie,Jianfeng Guan. Adaptive packet scheduling algorithm for time-sensitive service[OL].[18 December 2020] http://en.paper.edu.cn/en_releasepaper/content/4753219 |
2. Name Based Socket : An approach for Android Based System | |||
Ahmed M.A. Alsayadi,Xu Mingwei | |||
Computer Science and Technology 21 September 2016 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:IP address management has become more and more complex. For mobile applications, what makes IP management more complicated is the updates of IP address and the address translation of gateways. With the rapid growth of smartphones worldwide (Global sales of smartphones to end users totaled 349 million units in the first quarter of 2016, a 3.9 percent increase over the same period in 2015, according to Gartner, Inc.), this challenge has become even more urgent to be solved. In this paper, a method is introduced to solve IP management-related issues in Android based system using name based socket scheme (NBS). Android NBS relieves mobile applications from IP management and moves it down to the operation system level. Thus, the application itself is relieved from re-implementing features such as multi-homing, mobility, NAT traversal. And the complication of application developing will be reduced. In the meanwhile, the Android NBS is configurable and backward compatible, and it doesn't influence connection performance in any way, it also doesn't require any changes on the network architecture during using. | |||
TO cite this article:Ahmed M.A. Alsayadi,Xu Mingwei. Name Based Socket : An approach for Android Based System[OL].[21 September 2016] http://en.paper.edu.cn/en_releasepaper/content/4705039 |
3. An Immune-based Intrusion Detection System Framework for Cloud Computing Environment | |||
YIN Huadong,WEN Qiaoyan | |||
Computer Science and Technology 23 November 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In the current cloud computing environment, as it's not reliable between user and cloud computing service provider, the real-time data in the cloud must be proactively monitored, defensive and detected. This work tries to show intrusion detection techniques using the study of natural human immune system, and offers an immune-based intrusion detection system framework for cloud computing environment which is configurable, scalable and efficient. | |||
TO cite this article:YIN Huadong,WEN Qiaoyan. An Immune-based Intrusion Detection System Framework for Cloud Computing Environment[OL].[23 November 2011] http://en.paper.edu.cn/en_releasepaper/content/4449884 |
4. A Two-layer Hidden Markov Model for The Arrival Process of Web Traffic | |||
Xie Yi | |||
Computer Science and Technology 02 October 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A new two-layer hidden Markov model is proposed to describe the arrival rate process of Web traffic. The macro state process of the first underlying layer is used to describe the large-scale trends of network traffic. The sub-state process of the second underlying layer is used to describe the small-scale fluctuations that are happening during the duration of a given macro state. Experiments are implemented to validate the proposed model. | |||
TO cite this article:Xie Yi . A Two-layer Hidden Markov Model for The Arrival Process of Web Traffic[OL].[ 2 October 2011] http://en.paper.edu.cn/en_releasepaper/content/4444677 |
5. A New Privacy Enhanced Temporary Social Network Service for Group Dating | |||
Lu Liu | |||
Computer Science and Technology 13 January 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Current group dating is low technology with a lot of embarrassment. In this paper we propose a new privacy enhanced temporary social network service Match for group dating, which helps to avoid embarrassment before face to face. The new service ensures users' privacy secret by applying public key encryption and proper access control based on temporary relationship; meanwhile the service won't accumulate users profile as current social network service does. As a result, the Match provide better user experience and privacy protection for group dating. | |||
TO cite this article:Lu Liu. A New Privacy Enhanced Temporary Social Network Service for Group Dating[OL].[13 January 2011] http://en.paper.edu.cn/en_releasepaper/content/4406484 |
6. Secure multi-party computations of geometric intersections | |||
Cui Hui | |||
Computer Science and Technology 18 September 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Secure multi-party computation is a research focusing in international crypto graphic community. This paper focuses on geometric intersection problems. We use Cantor Encoding method to solve the secure multi-party computation geometry, and propose a new scheme to solve geometry intersection problem. In order to keep secret, we make use of convertible encryption algorithm. This paper gives the solutions to the segment intersection problem and polygon intersection problem, and then demonstrate their security through simulation example. Compared to mostly existing schemes, this scheme can solve any polygon intersection problem, and sometimes its complexity of computation maybe smaller, especially when dealing with the polygon having more vertexes and smaller area. Although it will generate some errors, but this will not affect its application. | |||
TO cite this article:Cui Hui. Secure multi-party computations of geometric intersections[OL].[18 September 2009] http://en.paper.edu.cn/en_releasepaper/content/35310 |
7. Flow Label Negotiation Mechanism in Heterogeneous Networks based on SIP | |||
GAO Cheng,Huang Xiaohong,Sun Qiong,Ma Yan | |||
Computer Science and Technology 05 February 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Flow Label is a 20-bit field in IPv6’s Base Header. This field is especially designed to solve the QoS problem in next generation network. However, the related research work is still far from enough to make it practical. In this paper, a framework to guarantee the QoS across multiple domains using Flow Label is discussed. Based on this framework, we enhance the SDP message and Precondition, a Flow Label negotiation mechanism using SIP is proposed. | |||
TO cite this article:GAO Cheng,Huang Xiaohong,Sun Qiong, et al. Flow Label Negotiation Mechanism in Heterogeneous Networks based on SIP[OL].[ 5 February 2009] http://en.paper.edu.cn/en_releasepaper/content/28474 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated