![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
664 Result(s)
-
Chapter and Conference Paper
A secure intelligent trade agent system
In this paper, a secure intelligent trade agent system is developed. In this system, an intelligent trade agent can be authenticated and supplied certain authorized agent execution environment for it to run by...
-
Chapter and Conference Paper
On Finding Feasible Solutions to the Group Multicast Routing Problem
Group multicast routing problem (GMRP) is a generalization of multicasting whereby every member of the group is allowed to multicast messages to other members from the same group. The routing problem in this c...
-
Chapter and Conference Paper
Priority Based Multiple Access for Service Differentiation in Wireless Ad-Hoc Networks
This article describes the Priority Based Multiple Access (PriMA) protocol, a new medium access control (MAC) protocol for single-channel ad-hoc networks. Unlike previously proposed protocols, PriMA takes into...
-
Chapter and Conference Paper
QoS with an Edge-Based Call Admission Control in IP Networks
Central to the viability of providing traditional services over IP networks is the capability to deliver some level of end-to-end Quality of Service (QoS) to the applications and users. IP networks continue to...
-
Chapter and Conference Paper
Semantic Structure Matching for Assessing Web-Service Similarity
The web-services stack of standards is designed to support the reuse and interoperation of software components on the web. A critical step in the process of develo** applications based on web services is ser...
-
Chapter and Conference Paper
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
A password-authenticated key exchange scheme allows two entities, who only share a memorable password, to authenticate each other and to agree on a cryptographic session key. Instead of considering it in the c...
-
Chapter and Conference Paper
Sensors Network Optimization by a Novel Genetic Algorithm
This paper describes the optimization of a sensor network by a novel Genetic Algorithm (GA) that we call King Mutation C2. For a given distribution of sensors, the goal of the system is to determine the optima...
-
Chapter and Conference Paper
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System
Network attached storage system is proposed to solve the bottleneck problem of the multimedia server. It adds a network channel to the RAID and data can be transferred between the Net-RAID and clients directly...
-
Chapter and Conference Paper
The Strategy of Batch Using Dynamic Cache for Streaming Media
The batch is an important technique for delivering video over Internet or VoD. It is a key method to improve effect for video multicast. In this paper, we research the batch strategy of proxy cache for streami...
-
Chapter and Conference Paper
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms
Because transactions in Grid applications often have deadlines, effectively processing real-time transactions in Grid services presents a challenging task. Although real-time transaction techniques have been w...
-
Chapter and Conference Paper
Cooperative Caching with Optimal Radius in Hybrid Wireless Networks
In this paper, we propose a novel caching scheme, called energy efficient cooperative caching with optimal radius (ECOR), to overcome the limitations of hybrid wireless networks such as high energy consumption, l...
-
Chapter and Conference Paper
Extended DBP for (m,k)-Firm Based QoS
In this paper, an extended DBP (E_DBP) scheme is studied for (m,k)-firm constraint. The basic idea of the proposed algorithm takes into account the distance to exit a failure state, which is a symmetrical noti...
-
Chapter and Conference Paper
A Novel Intrusion Detection Method
It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a sim...
-
Chapter and Conference Paper
The Transmitted Strategy of Proxy Cache Based on Segmented Video
Using proxy cache is a key technique that may help to reduce the loads of the server, network bandwidth and startup delays. Basing on the popularity of clients’ request to segment video,we extend the length fo...
-
Chapter and Conference Paper
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications
Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000 for network applications. In this paper, a new approach for ROI coding so-call Up-Down Bitplanes Shift (UDBShift) is p...
-
Chapter and Conference Paper
Bandwidth Constrained IP Multicast Traffic Engineering Without MPLS Overlay
Existing multicast traffic engineering (TE) solutions tend to use explicit routing through MPLS tunnels. In this paper we shift away from this overlay approach and address the bandwidth constrained IP multicas...
-
Chapter and Conference Paper
A Pervasive Sensor Node Architecture
A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...
-
Chapter and Conference Paper
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing
This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...
-
Chapter and Conference Paper
Collaborative Process Execution for Service Composition with StarWebService
This paper gives a brief introduction to a collaborative process execution mechanism for service composition implemented in StarWebService system. The main idea is to partition the global process model of comp...
-
Chapter and Conference Paper
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture
A low-cost parallel QoS Sensitive domain, which supports load balancing network architecture, is developed in the paper. To deal with the scaling problem, a large network, thus, is structured by grou** nodes...