首页 > 最新文献

18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.最新文献

英文 中文
Automating detection of faults in TCP implementations 自动检测TCP实现中的错误
H. Inamura, O. Takahashi, Taro Ishikawa, H. Shigeno, Ken-ichi Okada
We propose a new environment for testing the behavior of TCP. We analyze existing test methodologies and show that there is still a need to reduce the loads imposed on both the worker and the expert. The Auto Detector is extensible and so well supports both the automation of predefined tasks and the communication tools needed to ensure gradual refinement by the participants. To show the effectiveness of our proposal, actual software flaws found in HP/UX and the Windows operating system are taken as examples of how to realize the automation of reproduction and detection tasks; it is flexible enough to resolve real-world issues.
我们提出了一个测试TCP行为的新环境。我们分析了现有的测试方法,并表明仍然需要减少对工作人员和专家施加的负载。Auto Detector是可扩展的,因此很好地支持预定义任务的自动化和确保参与者逐步改进所需的通信工具。以HP/UX和Windows操作系统中发现的实际软件缺陷为例,说明如何实现再现和检测任务的自动化;它足够灵活,可以解决现实世界的问题。
{"title":"Automating detection of faults in TCP implementations","authors":"H. Inamura, O. Takahashi, Taro Ishikawa, H. Shigeno, Ken-ichi Okada","doi":"10.1109/AINA.2004.1283930","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283930","url":null,"abstract":"We propose a new environment for testing the behavior of TCP. We analyze existing test methodologies and show that there is still a need to reduce the loads imposed on both the worker and the expert. The Auto Detector is extensible and so well supports both the automation of predefined tasks and the communication tools needed to ensure gradual refinement by the participants. To show the effectiveness of our proposal, actual software flaws found in HP/UX and the Windows operating system are taken as examples of how to realize the automation of reproduction and detection tasks; it is flexible enough to resolve real-world issues.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhanced Gnutella P2P protocol: a search perspective 增强的Gnutella P2P协议:搜索透视图
S. Kwok, K. Chan
Although Gnutella is the most popular peer-to-peer protocol for file sharing, drawbacks are often found in searching and locating files. They include that (1) a limited number of hosts being searched leads to a limited number of hits; (2) the search result is not accurate due to the search by filename; and (3) an inefficient use of computer resource - spending too much resource on handling other peers' queries. In order to rectify these drawbacks, this paper proposes N-phase search and passive search mechanisms. Compared with the traditional search mechanism, N-phase search increases the number of received query hits by 55.41% and increases the host coverage by 41.23%. For the passive search, the average search time is reduced by 15.33%.
尽管Gnutella是用于文件共享的最流行的点对点协议,但在搜索和定位文件时经常发现缺点。它们包括:(1)被搜索的有限数量的主机导致有限数量的点击;(2)因按文件名搜索而导致搜索结果不准确;(3)计算机资源使用效率低下——在处理其他对等节点的查询上花费了太多的资源。为了纠正这些缺陷,本文提出了n相搜索和被动搜索机制。与传统的搜索机制相比,n阶段搜索使接收到的查询命中数提高了55.41%,主机覆盖率提高了41.23%。对于被动搜索,平均搜索时间减少了15.33%。
{"title":"An enhanced Gnutella P2P protocol: a search perspective","authors":"S. Kwok, K. Chan","doi":"10.1142/S0219265904001167","DOIUrl":"https://doi.org/10.1142/S0219265904001167","url":null,"abstract":"Although Gnutella is the most popular peer-to-peer protocol for file sharing, drawbacks are often found in searching and locating files. They include that (1) a limited number of hosts being searched leads to a limited number of hits; (2) the search result is not accurate due to the search by filename; and (3) an inefficient use of computer resource - spending too much resource on handling other peers' queries. In order to rectify these drawbacks, this paper proposes N-phase search and passive search mechanisms. Compared with the traditional search mechanism, N-phase search increases the number of received query hits by 55.41% and increases the host coverage by 41.23%. For the passive search, the average search time is reduced by 15.33%.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"53 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Implementation and evaluation of a tradition search engine using sensitivity searching method 基于灵敏度搜索方法的传统搜索引擎的实现与评价
A. Miyakawa, Kaoru Sugita, Tomoyuki Ishida, Y. Shibata
In Japan , there are traditional Japanese crafting such as fittings, furniture, textile, etc., which are closely related to Japanese culture and life. The design of Japanese houses and their rooms is very important problem to attract people. However, this design is not easy because people have different feelings. In order to deal with this problem, we have developed a digital traditional Japanese crafting system (DTJCS) which provides a presentation space for traditional Japanese crafting. In this paper, we analyze the effect of room change of fittings to people's feelings using the presentation system.
在日本,有配件、家具、纺织品等与日本文化和生活密切相关的日本传统工艺品。日本房屋及其房间的设计是吸引人们的一个非常重要的问题。然而,这种设计并不容易,因为人们有不同的感受。为了解决这个问题,我们开发了一个数字日本传统工艺系统(DTJCS),为日本传统工艺提供了一个展示空间。本文运用展示系统分析了室内装修变化对人的感受的影响。
{"title":"Implementation and evaluation of a tradition search engine using sensitivity searching method","authors":"A. Miyakawa, Kaoru Sugita, Tomoyuki Ishida, Y. Shibata","doi":"10.1109/AINA.2004.1283980","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283980","url":null,"abstract":"In Japan , there are traditional Japanese crafting such as fittings, furniture, textile, etc., which are closely related to Japanese culture and life. The design of Japanese houses and their rooms is very important problem to attract people. However, this design is not easy because people have different feelings. In order to deal with this problem, we have developed a digital traditional Japanese crafting system (DTJCS) which provides a presentation space for traditional Japanese crafting. In this paper, we analyze the effect of room change of fittings to people's feelings using the presentation system.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127932174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimal control of humanoid robot in long distance 仿人机器人长距离最优控制
G. Capi, Y. Nasu
In emergency and hazardous environments, autonomous humanoid robots must make decisions based on the environment conditions. In addition, they must send information to human operator and receive high-level commands. In this paper, we apply intelligent algorithms in order to create an autonomous humanoid robot. In addition, a teleoperation system is developed to communicate with the humanoid robot in a long distance through Internet. The experiments using the 21 degree of freedom "Bonten-Maru" humanoid robot show a good performance of the proposed algorithm.
在紧急和危险环境中,自主类人机器人必须根据环境条件做出决策。此外,他们还必须向人类操作员发送信息并接受高级命令。在本文中,我们应用智能算法来创建一个自主的类人机器人。此外,还开发了一种远程操作系统,通过互联网与仿人机器人进行远程通信。以21自由度的仿人机器人“Bonten-Maru”为实验对象,验证了该算法的良好性能。
{"title":"Optimal control of humanoid robot in long distance","authors":"G. Capi, Y. Nasu","doi":"10.1109/AINA.2004.1283867","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283867","url":null,"abstract":"In emergency and hazardous environments, autonomous humanoid robots must make decisions based on the environment conditions. In addition, they must send information to human operator and receive high-level commands. In this paper, we apply intelligent algorithms in order to create an autonomous humanoid robot. In addition, a teleoperation system is developed to communicate with the humanoid robot in a long distance through Internet. The experiments using the 21 degree of freedom \"Bonten-Maru\" humanoid robot show a good performance of the proposed algorithm.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133788767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Securing XML document sources and their distribution 保护XML文档源及其分发
Junqi Zhang, V. Varadharajan, Y. Mu
XML has been becoming popular for data store, document representation and exchange over the Web. Security mechanisms for the protection of XML document sources and their distribution are essential. Author-X is a Java based system specifically conceived for the protection of XML documents. It supports a range of protection granularity levels and subject credentials, but also supports push distribution for documents broadcast. However, the proposed system has certain disadvantages in terms of both security and dynamic key management. For example, a sender has to distribute the secret keys to all correspondent users for different XML documents. Also, if one of the users leave or a credential is changed, then the sender has to re-encrypt all related documents and redistribute the secret keys to all correspondent users. In this paper, we present a scheme for securing XML documents and their distribution. Our scheme has several advantages over Author-X such as: (a) one user needs only one private key; (b) even when the user leaves or a credential is changed, all the other users will be unaffected; (c) there is no need to establish a secure channel for key distribution; and (d) there is no need for checking the XML documents for access control policies applied. These make the security model more efficient and robust as well as simplifying the programming and the generation of the encrypted document base.
XML在Web上的数据存储、文档表示和交换方面变得越来越流行。保护XML文档源及其分发的安全机制是必不可少的。Author-X是一个基于Java的系统,专门为保护XML文档而设计。它支持一系列保护粒度级别和主题凭据,还支持广播文档的推送分发。然而,该系统在安全性和动态密钥管理方面都存在一定的不足。例如,发送方必须将密钥分发给不同XML文档的所有对应用户。此外,如果其中一个用户离开或凭证更改,则发送方必须重新加密所有相关文档,并将密钥重新分发给所有通信用户。在本文中,我们提出了一种保护XML文档及其分发的方案。我们的方案比Author-X有几个优点,例如:(a)一个用户只需要一个私钥;(b)即使用户离开或凭证变更,所有其他用户也不受影响;(c)无须建立安全的密码匙分发渠道;(d)不需要检查XML文档是否应用了访问控制策略。这使得安全模型更加高效和健壮,并且简化了编程和加密文档库的生成。
{"title":"Securing XML document sources and their distribution","authors":"Junqi Zhang, V. Varadharajan, Y. Mu","doi":"10.1109/AINA.2004.1283969","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283969","url":null,"abstract":"XML has been becoming popular for data store, document representation and exchange over the Web. Security mechanisms for the protection of XML document sources and their distribution are essential. Author-X is a Java based system specifically conceived for the protection of XML documents. It supports a range of protection granularity levels and subject credentials, but also supports push distribution for documents broadcast. However, the proposed system has certain disadvantages in terms of both security and dynamic key management. For example, a sender has to distribute the secret keys to all correspondent users for different XML documents. Also, if one of the users leave or a credential is changed, then the sender has to re-encrypt all related documents and redistribute the secret keys to all correspondent users. In this paper, we present a scheme for securing XML documents and their distribution. Our scheme has several advantages over Author-X such as: (a) one user needs only one private key; (b) even when the user leaves or a credential is changed, all the other users will be unaffected; (c) there is no need to establish a secure channel for key distribution; and (d) there is no need for checking the XML documents for access control policies applied. These make the security model more efficient and robust as well as simplifying the programming and the generation of the encrypted document base.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131257563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A packet scheduling scheme for broadband wireless networks with heterogeneous services 一种面向异构业务宽带无线网络的分组调度方案
Haw-Yun Shin, Jean-Lien C. Wu, Yi-Hsien Wu
A frame-based packet scheduling scheme, the pinwheel scheduling (PWS) scheme, is proposed and investigated at the medium access control (MAC) layer in broadband wireless networks. The objective of the proposed scheduling scheme is to provide, respectively, low delay and low jitter for real-time traffic and short queue length for nonreal-time traffic. We have demonstrated in this paper that the proposed PWS scheme not only satisfies the packet-level QoS requirements but also has low implementation cost. As the number of constant bit rate (CBR) connections increases, variable bit rate (VBR) traffic would suffer a larger jitter, the PWS with modular strategy (PWS/MS) scheme is proposed to further enhance the PWS scheme. We also introduce two different slot-reuse strategies named real-time traffic first (RTF) and longest queue first (LQF), respectively, to improve the resource utilization. In order to demonstrate the performance of the PWS and PWS/MS schemes, comparisons are made with existing schemes such as the round-robin (RR) and weighted-round-robin (WRR) by using the OPNET software. Simulation results show that the proposed schemes are capable of maintaining the lowest delay and jitter for VBR and CBR traffic while not sacrificing the available bit rate (ABR) traffic.
提出并研究了宽带无线网络介质访问控制(MAC)层一种基于帧的分组调度方案——风车调度(PWS)方案。所提出的调度方案的目标是分别为实时流量提供低延迟和低抖动,为非实时流量提供短队列长度。本文的研究表明,所提出的PWS方案不仅满足分组级QoS要求,而且具有较低的实现成本。随着恒比特率(CBR)连接数量的增加,可变比特率(VBR)流量将遭受更大的抖动,提出了PWS模块化策略(PWS/MS)方案来进一步改进PWS方案。我们还引入了两种不同的插槽重用策略,分别称为实时流量优先(RTF)和最长队列优先(LQF),以提高资源利用率。为了验证PWS和PWS/MS方案的性能,利用OPNET软件与现有的轮询(RR)和加权轮询(WRR)方案进行了比较。仿真结果表明,该方案能够在不牺牲可用比特率(ABR)的情况下,保持VBR和CBR业务的最低延迟和抖动。
{"title":"A packet scheduling scheme for broadband wireless networks with heterogeneous services","authors":"Haw-Yun Shin, Jean-Lien C. Wu, Yi-Hsien Wu","doi":"10.1109/AINA.2004.1283821","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283821","url":null,"abstract":"A frame-based packet scheduling scheme, the pinwheel scheduling (PWS) scheme, is proposed and investigated at the medium access control (MAC) layer in broadband wireless networks. The objective of the proposed scheduling scheme is to provide, respectively, low delay and low jitter for real-time traffic and short queue length for nonreal-time traffic. We have demonstrated in this paper that the proposed PWS scheme not only satisfies the packet-level QoS requirements but also has low implementation cost. As the number of constant bit rate (CBR) connections increases, variable bit rate (VBR) traffic would suffer a larger jitter, the PWS with modular strategy (PWS/MS) scheme is proposed to further enhance the PWS scheme. We also introduce two different slot-reuse strategies named real-time traffic first (RTF) and longest queue first (LQF), respectively, to improve the resource utilization. In order to demonstrate the performance of the PWS and PWS/MS schemes, comparisons are made with existing schemes such as the round-robin (RR) and weighted-round-robin (WRR) by using the OPNET software. Simulation results show that the proposed schemes are capable of maintaining the lowest delay and jitter for VBR and CBR traffic while not sacrificing the available bit rate (ABR) traffic.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Combining Markovian chains and real time agreement protocols to allocate resources in wireless systems 结合马尔可夫链和实时协议的无线系统资源分配
S. Rejeb, Z. Choukair, S. Tabbane
The increase in the number of users and the development of their needs towards multimedia services with quality of service expectations set challenges to mobile radio network operators whose spectral resources are limited. A judicious resource allocation policy will limit call dropping due to handovers and improve bandwidth allocation between users, taking into account factors related to QoS expectations. QoS acceptance is defined by the SLA contract specifying the parameters of the different levels of acceptance. At global level, new call or handover call acceptance is based on a collective and consensual decision between the different participating networks. Such a consensus aims to take a consistent decision to reserve resources according to one of the levels of service predefined by the caller SLA and then to allow the caller to renegotiate the level of service QoS according to traffic load fluctuation, or to negotiate new resources for new applications requested during the session. The consensus algorithm is parametrized in accordance with the network configuration and take account of QoS constraints such as: new call blocking probability, handovers dropping probability, channels utilization rate...These parameters are deduced by applying Markovian chain with two dimensions. It is adopted to model the different service classes which negotiate the network.
随着用户数量的增加和用户对多媒体服务需求的发展以及对服务质量的期望,对频谱资源有限的移动无线网络运营商提出了挑战。考虑到与QoS期望相关的因素,明智的资源分配策略将限制由于切换而导致的掉线,并改善用户之间的带宽分配。QoS接受度由SLA契约定义,该契约指定了不同级别接受度的参数。在全球层面上,新呼叫或切换呼叫的接受是基于不同参与网络之间的集体和共识决策。这种共识旨在采取一致的决策,根据调用方SLA预定义的服务级别之一保留资源,然后允许调用方根据流量负载波动重新协商服务QoS级别,或者为会话期间请求的新应用程序协商新资源。一致性算法根据网络配置参数化,并考虑了QoS约束,如:新呼叫阻塞概率、切换丢失概率、信道利用率等。利用二维马尔可夫链推导了这些参数。采用该模型对协商网络的不同服务类进行建模。
{"title":"Combining Markovian chains and real time agreement protocols to allocate resources in wireless systems","authors":"S. Rejeb, Z. Choukair, S. Tabbane","doi":"10.1109/AINA.2004.1283811","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283811","url":null,"abstract":"The increase in the number of users and the development of their needs towards multimedia services with quality of service expectations set challenges to mobile radio network operators whose spectral resources are limited. A judicious resource allocation policy will limit call dropping due to handovers and improve bandwidth allocation between users, taking into account factors related to QoS expectations. QoS acceptance is defined by the SLA contract specifying the parameters of the different levels of acceptance. At global level, new call or handover call acceptance is based on a collective and consensual decision between the different participating networks. Such a consensus aims to take a consistent decision to reserve resources according to one of the levels of service predefined by the caller SLA and then to allow the caller to renegotiate the level of service QoS according to traffic load fluctuation, or to negotiate new resources for new applications requested during the session. The consensus algorithm is parametrized in accordance with the network configuration and take account of QoS constraints such as: new call blocking probability, handovers dropping probability, channels utilization rate...These parameters are deduced by applying Markovian chain with two dimensions. It is adopted to model the different service classes which negotiate the network.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"26 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114011818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptable access strategies provide a high usefulness of the objects in an open distributed environment 自适应访问策略提供了开放分布式环境中对象的高可用性
R. Samarasinghe, Y. Yasutake, Takeshi Kato, Takaichi Yoshida
New applications are being introduced for different areas such as commercial, education, and medical etc. A significant effort has been made in developing some of these applications considering the adaptability to the dynamically changing network and hosts' environments. In client-server applications, this adaptability is very important to enhance the reliability of the system and maintain the consistency of the objects. We describe a framework that can detect the changes in performance of the execution environment, and provide strategies in order to adapt such changes. Using these access strategies the client objects can access the server objects efficiently in a dynamically changing environment. We do not only consider the dynamic changes of the network characteristics but also consider the end-hosts performances before changing to the optimal strategy. Therefore the client objects can achieve the maximum usefulness of the environment. Here, we introduce three access strategies, namely client migration, direct access, and lazy access to impart an adaptive behavior to the client objects in the distributed environment. Advancing from the conventional static access models we propose algorithms to select the best-suited access strategy for the dynamic environment. Moreover the proposed model is to be implemented to the "juice" distributed object-oriented environment.
新的应用正在被引入不同的领域,如商业、教育和医疗等。考虑到对动态变化的网络和主机环境的适应性,在开发这些应用程序方面已经做出了重大努力。在客户机-服务器应用程序中,这种适应性对于增强系统的可靠性和保持对象的一致性非常重要。我们描述了一个框架,它可以检测执行环境的性能变化,并提供适应这些变化的策略。使用这些访问策略,客户机对象可以在动态变化的环境中有效地访问服务器对象。在选择最优策略之前,我们不仅考虑了网络特性的动态变化,还考虑了终端主机的性能。因此,客户端对象可以实现环境的最大效用。在这里,我们将介绍三种访问策略,即客户端迁移、直接访问和延迟访问,以向分布式环境中的客户端对象提供自适应行为。在传统静态访问模型的基础上,提出了针对动态环境选择最适合的访问策略的算法。此外,所提出的模型将在“果汁”分布式面向对象环境中实现。
{"title":"Adaptable access strategies provide a high usefulness of the objects in an open distributed environment","authors":"R. Samarasinghe, Y. Yasutake, Takeshi Kato, Takaichi Yoshida","doi":"10.1109/AINA.2004.1283834","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283834","url":null,"abstract":"New applications are being introduced for different areas such as commercial, education, and medical etc. A significant effort has been made in developing some of these applications considering the adaptability to the dynamically changing network and hosts' environments. In client-server applications, this adaptability is very important to enhance the reliability of the system and maintain the consistency of the objects. We describe a framework that can detect the changes in performance of the execution environment, and provide strategies in order to adapt such changes. Using these access strategies the client objects can access the server objects efficiently in a dynamically changing environment. We do not only consider the dynamic changes of the network characteristics but also consider the end-hosts performances before changing to the optimal strategy. Therefore the client objects can achieve the maximum usefulness of the environment. Here, we introduce three access strategies, namely client migration, direct access, and lazy access to impart an adaptive behavior to the client objects in the distributed environment. Advancing from the conventional static access models we propose algorithms to select the best-suited access strategy for the dynamic environment. Moreover the proposed model is to be implemented to the \"juice\" distributed object-oriented environment.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116909279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A scheduling method of distance learning classes including remote experiments 一种包括远程实验在内的远程学习课程调度方法
Hiroyasu Mitsui, H. Sugihara, H. Koizumi
Web-based distance education has attracted attention as what can replace partially, even extensively, conventional methods in university education. When distance education in engineering includes remote experiments, it can provide opportunities to study engineering anywhere and at any time. Scheduling the remote classes that feature remote experiments should solve students' preferences for taking classes, contentions such as experiment equipment and teaching staff resources, and prerequisite conditions of various subjects and lessons. This paper describes a scheduling method of distance learning classes including remote experiment, which can coordinate those conditions mentioned above.
基于网络的远程教育因其可以部分甚至广泛地取代传统的大学教育方式而备受关注。当工程远程教育包括远程实验时,它可以提供随时随地学习工程的机会。以远程实验为特色的远程课堂安排,应解决学生的上课偏好、实验设备、师资资源等方面的争议以及各学科、各课程的前提条件。本文提出了一种包含远程实验的远程教学课程调度方法,可以协调上述情况。
{"title":"A scheduling method of distance learning classes including remote experiments","authors":"Hiroyasu Mitsui, H. Sugihara, H. Koizumi","doi":"10.1109/AINA.2004.1283949","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283949","url":null,"abstract":"Web-based distance education has attracted attention as what can replace partially, even extensively, conventional methods in university education. When distance education in engineering includes remote experiments, it can provide opportunities to study engineering anywhere and at any time. Scheduling the remote classes that feature remote experiments should solve students' preferences for taking classes, contentions such as experiment equipment and teaching staff resources, and prerequisite conditions of various subjects and lessons. This paper describes a scheduling method of distance learning classes including remote experiment, which can coordinate those conditions mentioned above.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116991818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High-speed stream cipher 高速流密码
Hong-Sain Ooi
We propose a new stream cipher suitable for high-speed network applications, called HSSC (high-speed stream cipher). HSSC uses simple structure to allow detailed analysis and high software performance. The software implementation using C is about 2.07 cycles per byte on a Pentium II 450MHz platform. HSSC uses twelve 32-bit variables as internal states, four predefined constants, four key-derived constants and a set of rules to combine the internal states into 128-bit output per round.
本文提出了一种适用于高速网络应用的新型流密码,称为HSSC(高速流密码)。HSSC采用简单的结构,允许详细的分析和高的软件性能。使用C的软件实现在Pentium II 450MHz平台上每字节约2.07个周期。HSSC使用12个32位变量作为内部状态,4个预定义常量,4个密钥派生常量和一组规则将内部状态组合为每轮128位输出。
{"title":"High-speed stream cipher","authors":"Hong-Sain Ooi","doi":"10.1109/AINA.2004.1283752","DOIUrl":"https://doi.org/10.1109/AINA.2004.1283752","url":null,"abstract":"We propose a new stream cipher suitable for high-speed network applications, called HSSC (high-speed stream cipher). HSSC uses simple structure to allow detailed analysis and high software performance. The software implementation using C is about 2.07 cycles per byte on a Pentium II 450MHz platform. HSSC uses twelve 32-bit variables as internal states, four predefined constants, four key-derived constants and a set of rules to combine the internal states into 128-bit output per round.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1