![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
665 Result(s)
-
Chapter and Conference Paper
Sensors Network Optimization by a Novel Genetic Algorithm
This paper describes the optimization of a sensor network by a novel Genetic Algorithm (GA) that we call King Mutation C2. For a given distribution of sensors, the goal of the system is to determine the optima...
-
Chapter and Conference Paper
Enlarge Bandwidth of Multimedia Server with Network Attached Storage System
Network attached storage system is proposed to solve the bottleneck problem of the multimedia server. It adds a network channel to the RAID and data can be transferred between the Net-RAID and clients directly...
-
Chapter and Conference Paper
The Strategy of Batch Using Dynamic Cache for Streaming Media
The batch is an important technique for delivering video over Internet or VoD. It is a key method to improve effect for video multicast. In this paper, we research the batch strategy of proxy cache for streami...
-
Chapter and Conference Paper
A Real-Time Transaction Approach for Grid Services: A Model and Algorithms
Because transactions in Grid applications often have deadlines, effectively processing real-time transactions in Grid services presents a challenging task. Although real-time transaction techniques have been w...
-
Chapter and Conference Paper
Extended DBP for (m,k)-Firm Based QoS
In this paper, an extended DBP (E_DBP) scheme is studied for (m,k)-firm constraint. The basic idea of the proposed algorithm takes into account the distance to exit a failure state, which is a symmetrical noti...
-
Chapter and Conference Paper
A Novel Intrusion Detection Method
It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a sim...
-
Chapter and Conference Paper
The Transmitted Strategy of Proxy Cache Based on Segmented Video
Using proxy cache is a key technique that may help to reduce the loads of the server, network bandwidth and startup delays. Basing on the popularity of clients’ request to segment video,we extend the length fo...
-
Chapter and Conference Paper
New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications
Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000 for network applications. In this paper, a new approach for ROI coding so-call Up-Down Bitplanes Shift (UDBShift) is p...
-
Chapter and Conference Paper
A Pervasive Sensor Node Architecture
A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...
-
Chapter and Conference Paper
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing
This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...
-
Chapter and Conference Paper
Collaborative Process Execution for Service Composition with StarWebService
This paper gives a brief introduction to a collaborative process execution mechanism for service composition implemented in StarWebService system. The main idea is to partition the global process model of comp...
-
Chapter and Conference Paper
Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture
A low-cost parallel QoS Sensitive domain, which supports load balancing network architecture, is developed in the paper. To deal with the scaling problem, a large network, thus, is structured by grou** nodes...
-
Chapter and Conference Paper
UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software
It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems ofte...
-
Chapter and Conference Paper
A Microeconomics-Based Resource Assignment Model for Grid Computing
In this paper, a microeconomics-based resource assignment model for grid computing is presented. In the proposed model, demand and supply relationship of gird resource affects its usage price and the price adj...
-
Chapter and Conference Paper
Gamelet: A Mobile Service Component for Building Multi-server Distributed Virtual Environment on Grid
A DVE system provides a computer-generated virtual world where individuals located at different places could interact with each other. In this paper, we present the design of a grid-enabled service oriented fr...
-
Chapter and Conference Paper
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
Content sharing is a popular usage of peer-to-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-peer systems to tackle a new problem: auto...
-
Chapter and Conference Paper
Hyper-Erlang Based Model for Network Traffic Approximation
The long-tailed distribution characterizes many properties of Internet traffic. The property is often modeled by Lognormal distribution, Weibull or Pareto distribution theoretically. However, it hinders us in ...
-
Chapter and Conference Paper
Optimal Genetic Query Algorithm for Information Retrieval
An efficient immune query optimization algorithm for information retrieval is proposed in this paper. The main characteristics of this algorithm are as follows: The genetic individual is a query, each gene cor...
-
Chapter and Conference Paper
Research of Survival-Time-Based Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks
Power conservation and extending survival time are critical issues in mobile ad hoc networks, as the nodes are powered by battery only. In this paper, according to the mobility of nodes, the survival-time-base...
-
Chapter and Conference Paper
Brushwood: Distributed Trees in Peer-to-Peer Systems
There is an increasing demand for locality-preserving distribution of complex data structures in peer-to-peer systems. Current systems either do not preserve object locality or suffer from imbalances in data d...