学科分类
/ 1
7 个结果
  • 简介:在无线传感器节点的动态电源管理(DPM)是为减少闲散精力消费的一种著名技术。DPM由动态地基于事件出现的预言翻转它的单位的开/关地位控制一个节点操作模式。然而,后来,每个模式变化在它的自己的权利导致一些开销,保证DPM效率不是在展出有未知统计的非宿命论和无常的环境的吝啬的功绩。我们在这份报纸的解决方案套房,一起指了同样认知的电源管理(CPM),是向在统计上未知的设置的创新DPM的一次原则性的尝试并且给二不同分析保证。我们的第一个图案在面临非静止的事件过程时基于学习自动机和保证better-than-pure-chanceDPM。我们的第二个解决方案迎合事件出现可以在雇用一个对手的人物的甚至更一般的设置。在这种情况中,我们以节点在依靠一个no-external-regret过程以一种联机方式学习它的得最高分的战略策略的一场重复零和的比赛与它的环境提出单个尘埃的相互作用。我们进行数字实验以网络一生和事件损失百分比测量我们的计划的表演。

  • 标签: 无线传感器网络 功率管理 动态电源管理 传感器节点 学习自动机 偶然事件
  • 简介:Engineeringapplicationdomainsneeddatabasemanagementsystemstosupplythemwithagoodmeansofmodeling,ahighdataaccessefficiencyandalanguageinterfacewithstrongfunctionality.Thispaperpresentsasemantichypergraphmodelbasedonrelations,inordertoexpressmany-to-manyrelationsamongobjectsbelongingtodifferentsemanticclassesinengineeringapplications.Amanagementmechanismexpressedbythemodelandthebasicdataofengineeringdatabasesaremanagedinmainmemory.Especially,differentobjectsarelinkedbydifferentkindsofsemanticsdefinedbyusers,thereforethetableswap,therecordswapandsomeunnecessaryexaminationsarreducedandtheaccessefficiencyoftheengineeringdataisincreased.Clanguageinterfacethatincludessomegenericandspecialfunctionalityisproposedforcloserconnectionwithapplicationprograms.

  • 标签: 工程数据库 存储管理 语言接口
  • 简介:Inthispaper,aquantitativeQoSmanagementimplementmechanisminIP-DiffServispresented.Theapproachhasthreemerits:(1)itoptimizesboththerouteselectedforserviceclassbytrafficengineeringinnetworklayerandtheserviceclassselectedfortheuserservicesbynetworkplaninservicelayer,(2)itensuresquantitativeQoSfortheuserserviceinDiffServ,(3)itachieveshighresourceutilization,andachievesbetterperformancewithlesscostfortheuserserviceandselectedroute.Simulationhasverifiedthesemerits.

  • 标签: 网络技术 IP协议 QOS 服务质量 网络层
  • 简介:Multicastcapability,includingmulticastaddressandmulticastroutingmechanisms,atthenetworklayerisnecessaryinordertoreducethebandwidthrequirementsofmultiparty,multicastapplications.Basedonhierarchicalautonomousstructureinaccordancewiththeself-organizationtopologiesofInternet,thepaperputsforwardamulticastaddressmanagementschemethatisshowntoberobustandscalable.Connectioncontrolhierarchy(CCH)basedonmaster/slaverelationshipandasimpleefficientbuildingalgorithmofmulti-pointconnectionisalsobuilt.Thepaperalsodescribesthenormaloperationsofmulticastaddressmanagementandmulti-pointconnectioncontroller.Throughsimulationexperiment,HAMCMandDDMofMulticastAddressAllocationarecompared.HAMintegratesthemeritsofCMandDDM,whichisefficientasawhole,robustandscalable.CCHraisestheefficiencyofconnectioncontrol,andishighlyrobust,flexibleandscalable.

  • 标签: 通信 分级独立结构 连接控制
  • 简介:ManageabilityisanimportantfeatureofnextgenerationInternet;managementandmonitoringofIPv6-basednetworksareprovingabigchallenge.WhileleveragingcurrentIPv4-basedSNMPmanagementschemetoIPv6networks'managementneedisnecessary,itismoreurgenttocoinanewnetworkmanagementarchitecturetoaccommodatethescalabilityandextensibilityrequirementsofnextgenerationInternetmanagement.Thepaperproposesanovelnetworkmanagementarchitecture,IMN(InternetManagementNetwork),whichcreatesanoverlaynetworkofmanagementnodes.Whileeachmanagementnodecanperformmanagementtasksautonomouslyandindependently,itcanfinishmoresophisticatedmanagementtasksbycollaborativelyinvokingmanagementoperationsorsharinginformationprovidedbyothermanagementnodes.P2P-basedcommunicationservicesareintroducedinIMNtoenablesuchcollaboration.ThepaperpresentsaprototypingimplementationbasedontheWebservicerelatedtechnology,aswellassomeofthekeytechnologies,especiallysolutionstothoseissuesarisingfromthemanagementpracticeofCERNET2.ExperiencesofdeploymentofCERNET2operationandlessonslearnedfromthemanagementpracticearediscussed.

  • 标签: CERNET2 互联网管理 CNGI 网络管理体系结构 IPV6网络 工程
  • 简介:Workflowmanagementaimsatthecontrolling,monitoring,optimizingandsupportingofbusinessprocesses.Welldesignedformalmodelswillfacilitatesuchmanagementsincetheyprovideexplicitrepresentationsofbusinessprocessesasthebasisforcomputerizedanalysis,verificationandexecution.PetriNetshavebeenrecognizedasthemostsuitablecandidateforworkflowmodeling,andassuch,formalmodelsbasedonPetriNetshavebeenproposed,amongthemWF-netbyAalstisthemostpopularone.ButWF-nethasturnedouttobeconceptuallychaoticaswillbeillustratedinthispaperwithanexamplefromAalst'sbook.Thispaperproposesaseriesofmodelsforthedescriptionandanalysisofbusinessprocessesatconceptuallydifferenthierarchicallayers.Analyticgoalsandmethodsat.theselayersarealsodiscussed.Theunderlyingstructure,sharedbyallthesemodels,isSYNCHRONIZER,whichisdesignedwiththeguidanceofsynchronytheoryofGNT(GeneralNet.Theory)andservesastheconceptualfoundationofworkflowformalmodels.Structurally,synchronizersconnecttaskstoformawholewhiledynamicallysynchronizerscontroltaskstoachievesynchronization.

  • 标签: 业务流程 三层模型 过程逻辑 语格语义学 工作流管理
  • 简介:Cloudcomputingisatechnologythatprovidesuserswithalargestoragespaceandanenormouscomputingpower.However,theoutsourceddataareoftensensitiveandconfidential,andhencemustbeencryptedbeforebeingoutsourced.Consequently,classicalsearchapproacheshavebecomeobsoleteandnewapproachesthatarecompatiblewithencrypteddatahavebecomeanecessity.Forprivacyreasons,mostoftheseapproachesarebasedonthevectormodelwhichisatimeconsumingprocesssincetheentireindexmustbeloadedandexploitedduringthesearchprocessgiventhatthequeryvectormustbecomparedwitheachdocumentvector.Tosolvethisproblem,weproposeanewmethodforconstructingasecureinvertedindexusingtwokeytechniques,homomorphicencryptionandthedummydocumentstechnique.However,1)homomorphicencryptiongeneratesverylargeciphertextswhicharethousandsoftimeslargerthantheircorrespondingplaintexts,and2)thedummydocumentstechniquethatenhancestheindexsecurityproduceslotsoffalsepositivesinthesearchresults.Theproposedapproachexploitstheadvantagesofthesetwotechniquesbyproposingtwomethodscalledthecompressedtableofencryptedscoresandthedoublescoreformula.Moreover,weexploitasecondsecureinvertedindexinordertomanagetheusers'accessrightstothedata.Finally,inordertovalidateourapproach,weperformedanexperimentalstudyusingadatacollectionofonemilliondocuments.Theexperimentsshowthatourapproachismanytimesfasterthananyotherapproachbasedonthevectormodel.

  • 标签: searchable ENCRYPTION CLOUD COMPUTING homomorphic ENCRYPTION