Skip to main content

previous disabled Page of 34
and
  1. Chapter and Conference Paper

    Sensors Network Optimization by a Novel Genetic Algorithm

    This paper describes the optimization of a sensor network by a novel Genetic Algorithm (GA) that we call King Mutation C2. For a given distribution of sensors, the goal of the system is to determine the optima...

    Hui Wang, Anna L. Buczak, Hong **, Hongan Wang in Network and Parallel Computing (2004)

  2. Chapter and Conference Paper

    Enlarge Bandwidth of Multimedia Server with Network Attached Storage System

    Network attached storage system is proposed to solve the bottleneck problem of the multimedia server. It adds a network channel to the RAID and data can be transferred between the Net-RAID and clients directly...

    Dan Feng, Yuhui Deng, Ke Zhou, Fang Wang in Network and Parallel Computing (2004)

  3. Chapter and Conference Paper

    The Strategy of Batch Using Dynamic Cache for Streaming Media

    The batch is an important technique for delivering video over Internet or VoD. It is a key method to improve effect for video multicast. In this paper, we research the batch strategy of proxy cache for streami...

    Zhiwen Xu, **aoxin Guo, Yunjie Pang, Zhengxuan Wang in Network and Parallel Computing (2004)

  4. Chapter and Conference Paper

    A Real-Time Transaction Approach for Grid Services: A Model and Algorithms

    Because transactions in Grid applications often have deadlines, effectively processing real-time transactions in Grid services presents a challenging task. Although real-time transaction techniques have been w...

    Feilong Tang, Minglu Li, Joshua Zhexue Huang, Lei Cao in Network and Parallel Computing (2004)

  5. Chapter and Conference Paper

    Extended DBP for (m,k)-Firm Based QoS

    In this paper, an extended DBP (E_DBP) scheme is studied for (m,k)-firm constraint. The basic idea of the proposed algorithm takes into account the distance to exit a failure state, which is a symmetrical noti...

    Jiming Chen, Zhi Wang, Yeqiong Song, Youxian Sun in Network and Parallel Computing (2004)

  6. Chapter and Conference Paper

    A Novel Intrusion Detection Method

    It is an important issue for the security of network that how to detect new intrusions attack. This paper investigates unsupervised intrusion detection method. A distance definition for mixed attributes, a sim...

    ShengYi Jiang, QingHua Li, Hui Wang in Network and Parallel Computing (2004)

  7. Chapter and Conference Paper

    The Transmitted Strategy of Proxy Cache Based on Segmented Video

    Using proxy cache is a key technique that may help to reduce the loads of the server, network bandwidth and startup delays. Basing on the popularity of clients’ request to segment video,we extend the length fo...

    Zhiwen Xu, **aoxin Guo, Yunjie Pang, Zhengxuan Wang in Network and Parallel Computing (2004)

  8. Chapter and Conference Paper

    New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications

    Regions Of Interest (ROI) image coding is one of the most significant features in JPEG2000 for network applications. In this paper, a new approach for ROI coding so-call Up-Down Bitplanes Shift (UDBShift) is p...

    Li-bao Zhang, Ke Wang in Network and Parallel Computing (2004)

  9. Chapter and Conference Paper

    A Pervasive Sensor Node Architecture

    A set of sensor nodes is the basic component of a sensor network. Many researchers are currently engaged in develo** pervasive sensor nodes due to the great promise and potential with applications shown by v...

    Li Cui, Fei Wang, Haiyong Luo, Hailing Ju, and Tianpu Li in Network and Parallel Computing (2004)

  10. Chapter and Conference Paper

    ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing

    This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...

    Yong-Meng Teo, **anbing Wang in Network and Parallel Computing (2004)

  11. Chapter and Conference Paper

    Collaborative Process Execution for Service Composition with StarWebService

    This paper gives a brief introduction to a collaborative process execution mechanism for service composition implemented in StarWebService system. The main idea is to partition the global process model of comp...

    Bixin Liu, YuFeng Wang, Bin Zhou, Yan Jia in Network and Parallel Computing (2004)

  12. Chapter and Conference Paper

    Load Balancing Routing in Low-Cost Parallel QoS Sensitive Network Architecture

    A low-cost parallel QoS Sensitive domain, which supports load balancing network architecture, is developed in the paper. To deal with the scaling problem, a large network, thus, is structured by grou** nodes...

    Furong Wang, Ye Wu in Network and Parallel Computing (2004)

  13. No Access

    Chapter and Conference Paper

    UML Based Statistical Testing Acceleration of Distributed Safety-Critical Software

    It is necessary to assess the reliability of distributed safety-critical systems to a high degree of confidence before they are deployed in the field. However, distributed safety-critical software systems ofte...

    Jiong Yan, Ji Wang, Huo-wang Chen in Parallel and Distributed Processing and Applications (2005)

  14. No Access

    Chapter and Conference Paper

    A Microeconomics-Based Resource Assignment Model for Grid Computing

    In this paper, a microeconomics-based resource assignment model for grid computing is presented. In the proposed model, demand and supply relationship of gird resource affects its usage price and the price adj...

    **ngwei Wang, Nan Jiang, Jialin Wang in Parallel and Distributed Processing and Ap… (2005)

  15. No Access

    Chapter and Conference Paper

    Gamelet: A Mobile Service Component for Building Multi-server Distributed Virtual Environment on Grid

    A DVE system provides a computer-generated virtual world where individuals located at different places could interact with each other. In this paper, we present the design of a grid-enabled service oriented fr...

    Tianqi Wang, Cho-Li Wang, Francis Lau in Parallel and Distributed Processing and Ap… (2005)

  16. No Access

    Chapter and Conference Paper

    Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting

    Content sharing is a popular usage of peer-to-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-peer systems to tackle a new problem: auto...

    Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang, Yi-Min Wang in Peer-to-Peer Systems III (2005)

  17. No Access

    Chapter and Conference Paper

    Hyper-Erlang Based Model for Network Traffic Approximation

    The long-tailed distribution characterizes many properties of Internet traffic. The property is often modeled by Lognormal distribution, Weibull or Pareto distribution theoretically. However, it hinders us in ...

    Junfeng Wang, Hongxia Zhou, Fanjiang Xu in Parallel and Distributed Processing and Ap… (2005)

  18. No Access

    Chapter and Conference Paper

    Optimal Genetic Query Algorithm for Information Retrieval

    An efficient immune query optimization algorithm for information retrieval is proposed in this paper. The main characteristics of this algorithm are as follows: The genetic individual is a query, each gene cor...

    Ziqiang Wang, Boqin Feng in Parallel and Distributed Processing and Applications (2005)

  19. Chapter and Conference Paper

    Research of Survival-Time-Based Dynamic Adaptive Replica Allocation Algorithm in Mobile Ad Hoc Networks

    Power conservation and extending survival time are critical issues in mobile ad hoc networks, as the nodes are powered by battery only. In this paper, according to the mobility of nodes, the survival-time-base...

    Yijie Wang, Kan Yang in Network and Parallel Computing (2005)

  20. No Access

    Chapter and Conference Paper

    Brushwood: Distributed Trees in Peer-to-Peer Systems

    There is an increasing demand for locality-preserving distribution of complex data structures in peer-to-peer systems. Current systems either do not preserve object locality or suffer from imbalances in data d...

    Chi Zhang, Arvind Krishnamurthy, Randolph Y. Wang in Peer-to-Peer Systems IV (2005)

previous disabled Page of 34