Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 27 papers published in subject: > since this site started. |
Results per page: | 27 Total, 3 Pages | << First < Previous 1 2 3 |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Research on Comparative Analysis of BPEL and XPDL | |||
Zhang Chaolin,Song Quanwang | |||
Computer Science and Technology 31 July 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:BPEL and XPDL are both XML-based process language. BPEL is committed to Web Services orchestration, and XPDL is committed to distributed workflow. Every company dedicates to the integration of the two functions. Therefore, this article made a comparative analysis for BPEL and XPDL in functions, structures, implementation details to provide the basis for their respective scope of use. | |||
TO cite this article:Zhang Chaolin,Song Quanwang. Research on Comparative Analysis of BPEL and XPDL[OL].[31 July 2010] http://en.paper.edu.cn/en_releasepaper/content/4380395 |
2. Modeling Contacts and Mobility for Wireless Mobile Networks | |||
Tian Ye,Li Jiang | |||
Computer Science and Technology 18 July 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The inter-contact time between mobile human-carried devices is one of the key metrics in studying the mobility-assisted routing paradigms for wireless mobile networks. Recent studies on this topic are focused on the aggregated distribution integrating all the device pairs’ inter-contact times and there are limitations in their observations. In this work, we investigate the inter-contact time distribution using a number of real-world datasets, in particular, we divide the device pairs from the datasets in groups based on their contacting frequencies and investigate the group-wise inter-contact time distribution. We find that for the frequently contacting pairs, there are three segments on their distribution curve. We use superposition of three contact processes, which are caused by the devices‘ independent movements and intentions of the humans carrying the devices, to explain the three segments. Furthermore, a mobility model is presented. In our model, each node uses a priority queue to schedule its movement, and we theoretically prove that the priority queue results in a power-law inter-contact time and show that the model integrates the three contact processes. Finally, simulation study demonstrates that our mobility model could reproduce the contacts with their inter-contact times very similar to the empirical ones, therefore is accurate in characterizing the complexity of the device contacts in wireless mobile networks. | |||
TO cite this article:Tian Ye,Li Jiang. Modeling Contacts and Mobility for Wireless Mobile Networks[OL].[18 July 2010] http://en.paper.edu.cn/en_releasepaper/content/4379306 |
3. The Implementation and Analysis of the Translation from Subtree Filtering to XPath | |||
Yonghao Shen,Bin Zhang,Guohui Li,Jun Guo | |||
Computer Science and Technology 04 December 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:NETCONF is a new protocol for network management provided by the IETF NETCONF working group, which uses an Extensible Markup Language (XML) based data encoding for the configuration data and the protocol messages. The subtree filtering is a filtering mechanism recommended by NETCONF. This paper presents a translation method to convert subtree filtering to XML Path (XPath). With this method, we realize the authorization for subtree filter using XPath based access control mechanism. | |||
TO cite this article:Yonghao Shen,Bin Zhang,Guohui Li, et al. The Implementation and Analysis of the Translation from Subtree Filtering to XPath[OL].[ 4 December 2009] http://en.paper.edu.cn/en_releasepaper/content/37254 |
4. Security Issues and Practical Extensions of Kademlia Protocol | |||
Zhang Hao,Yuan Tian | |||
Computer Science and Technology 14 September 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Kademlia is the most popular deployed structured peer-to-peer protocol, which has a number of desirable advantages that other previous protocols do not offer. However, Kademlia is also vulnerable to the common attacks on the peer-to-peer overlay, although it has some subtle properties that can mitigate the harmfulness of certain attacks. In this paper, we discuss security issues of Kademlia and present some practical extensions of the protocol: a verifiable way of generating node IDs, verifiable routing table updating, and secure message forwarding. | |||
TO cite this article:Zhang Hao,Yuan Tian. Security Issues and Practical Extensions of Kademlia Protocol[OL].[14 September 2009] http://en.paper.edu.cn/en_releasepaper/content/35154 |
5. Messenger Nodes Based Routing Protocol for Sparse MANET and Performance Analysis | |||
Yibo Zhu,Xiaojun Wu,Sheng Yuan,Ming Zeng | |||
Computer Science and Technology 20 March 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Recently, the routing issue in sparse Mobile Ad hoc NETwork (MANET) has drawn many researchers’ attention. However, almost all routing protocols resort to either Global Position System (GPS) or trajectory-control, which increase the cost of entire network. In this paper, the Messenger nodes based Routing (MR) protocol, a novel opportunistic routing protocol, is proposed to serve sparse MANET without either GPS or trajectory-control. With the assistance of the MR protocol, sparse MANET can accordingly be deployed much more conveniently. The simulation results in this paper demonstrate that the MR protocol is able to provide a high rate of packets reception. Moreover, the theoretical models for both the average delivery delay and the average number of hops of the MR protocol are constructed in this paper. Finally, the comparison between simulation and theoretical analysis indicates the coincidence of the analytical models with the simulation results. | |||
TO cite this article:Yibo Zhu,Xiaojun Wu,Sheng Yuan, et al. Messenger Nodes Based Routing Protocol for Sparse MANET and Performance Analysis[OL].[20 March 2009] http://en.paper.edu.cn/en_releasepaper/content/30549 |
6. A novel energy-efficient clustering protocol for WSN | |||
Li Zhuangzhi ,Xie Ruijun ,Li Tengjie | |||
Computer Science and Technology 16 February 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Wireless sensor networks have become more and more popular due to their good application in automotive safety, medical monitoring and so on. However, sensor nodes have some limitations such as low computing capabilities, low battery life and low transmission power, among which, energy efficiency is usually considered as the most crucial problem. Many cluster-based protocols have been proposed to solve this problem, LEACH is a famous one which contributes to evening the energy used in every sensor node so as to prolong the life of the entire network, but LEACH chooses the cluster heads randomly and the number of nodes each cluster head manages is arbitrary. In this paper, we propose a novel energy-efficient clustering protocol which a modified version of LEACH, here, we choose the cluster heads according to the worth of each node and specify the number of member nodes that each cluster head should manage so as to properly use the energy of every cluster head. | |||
TO cite this article:Li Zhuangzhi ,Xie Ruijun ,Li Tengjie . A novel energy-efficient clustering protocol for WSN[OL].[16 February 2009] http://en.paper.edu.cn/en_releasepaper/content/29047 |
7. Using Flow Label to Provide Higher QoS | |||
Zhang Shengliang | |||
Computer Science and Technology 03 February 2008 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Now, the Internet of IPv4 only provides “best-effort” service. But the real-time applications have developed widely such as voice over IP(VoIP) and video-on-demand(VoD), and they need higher QoS(Quality of Service). The core of any QoS scheme will be how to monitor and manage traffic flows that have guaranteed QoS. The two QoS approaches used in the literature are Int-Serv(Integrated service) and Diff-Serv(Differentiated service). Int-Serv uses the resource reservation protocol(RSVP)for signaling the path. Decisions on QoS requests are taken by each router independently. Diff-Serv uses bandwidth brokers as a QoS Management model to negotiate request, communicate with edge nodes and track reservations. To support QoS, Flow Label field has been proposed in the IPv6 header, which can be used to specify the QoS requirements. In this paper, we propose a QoS scheme using a modified Flow Label. We discuss how to process the Flow Label field in the Int-Serv and Diff-Serv models respectively and we give a detail specification of the 20 bits of the Flow Label field. | |||
TO cite this article:Zhang Shengliang. Using Flow Label to Provide Higher QoS[OL].[ 3 February 2008] http://en.paper.edu.cn/en_releasepaper/content/18586 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: | 27 Total, 3 Pages | << First < Previous 1 2 3 |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated