September 2011
Research on P2P flow identification model based on communicating network topology
This paper presents a new P2P (Peer-to-Peer)-CNTIM model for identifying P2P traffic based on the special characteristics of P2P communication network topology. P2P-CNTIM model identifies P2P flow by combining the characteristic of multi-hosts with the characteristic of the type of the other communicating peer so as to improve the identification accuracy and efficiency. It...
September 2011
Robust super-resolution using kernel regression with outliers-reduction scheme
In the process of recording a digital image, super-resolution (SR) is a feasible soft method for solving the limitation of device and effect of environment. During the last two decades, many researchers proposed various SR algorithms for image reconstruction. Among these algorithms, kernel regression is a helpful tool which considers not only spatial distance between center...
September 2011
P2PETrust: A novel distributed transaction history vector-based trust appraisal model for peer-to-peer e-commerce networks
Peer-to-peer (P2P) E-commerce systems are more and more popular in recent years with opportunities and threats both existing. A lot of malicious nodes threaten the system’s security via cheating, selfish and attacking or else. Trust mechanisms can help estimating the trustworthiness. This paper presents a distributed trust model named P2PETrust (peer-to-peer E-commerce...
September 2011
Anomaly detection of domain name system (DNS) query traffic at top level domain servers
Major network events can be reflected on domain name system (DNS) traffic at the top level server on the DNS hierarchical structure. This paper pursues a novel approach to detect the DNS traffic anomaly of 5.19 events in China at CN top level domain server using covariance analysis. We normalize, expand and average the covariance changes for different length of time slice to...
September 2011
A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)
Voice over internet protocol (VoIP) service has been a very popular and important application over the internet. Wireless VoIP also becomes more and more popular due to its features of low cost and convenience. Wireless mesh networks (WMNs) have emerged as a key technology for the next-generation wireless networks and have been considered as a good solution for VoIP services...
September 2011
Completed research on cross-organization workflow of Agile telecom
In order to promote the core competitive power for telecom operating enterprises to face market fine operation, this article will analyze and compare six kinds of mode of cross-organization workflow in details. Extension case transmission mode (ECTM) and loosen couple mode (LCM) have become the major workflow modes in coordinating commerce application for their better...
September 2011
Further observations on certificate-base encryption and its generic construction from certificateless public key encryption
Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKE). It combines PKE and identity-based encryption (IBE) while preserving some of their most attractive features. CBE provides an efficient implicit certificate mechanism which eliminates the...
September 2011
Load balancing parallelizing XML query processing based on shared cache chip multi-processor (CMP)
Chip multi-processor (CMP) could support more than two threads to execute simultaneously, and some executing units are owned by each core. Based on CMP, this paper proposes a novel and complete optimization framework on parallelism for XML database multithreaded query processing that strives for maximum resource utilization. Firstly, a set of algorithms for constructing the...
Advertisement
Advertisement