Scientific Research and Essays

  • Abbreviation: Sci. Res. Essays
  • Language: English
  • ISSN: 1992-2248
  • DOI: 10.5897/SRE
  • Start Year: 2006
  • Published Articles: 2768

Table of Content: 1 September; 6(18)

September 2011

Research on P2P flow identification model based on communicating network topology

    This paper presents a new P2P (Peer-to-Peer)-CNTIM model for identifying P2P traffic based on the special characteristics of P2P communication network topology. P2P-CNTIM model identifies P2P flow by combining the characteristic of multi-hosts with the characteristic of the type of the other communicating peer so as to improve the identification accuracy and efficiency. It...

Author(s):   Sun Zhixin, Yan Xiaojuan and Chen Songle

September 2011

Robust super-resolution using kernel regression with outliers-reduction scheme

    In the process of recording a digital image, super-resolution (SR) is a feasible soft method for solving the limitation of device and effect of environment. During the last two decades, many researchers proposed various SR algorithms for image reconstruction. Among these algorithms, kernel regression is a helpful tool which considers not only spatial distance between center...

Author(s):   Feng Xu, Lizhong Xu,, Fengchen Huang, Chenrong Huang and Aiye Shi,

September 2011

P2PETrust: A novel distributed transaction history vector-based trust appraisal model for peer-to-peer e-commerce networks

    Peer-to-peer (P2P) E-commerce systems are more and more popular in recent years with opportunities and threats both existing. A lot of malicious nodes threaten the system’s security via cheating, selfish and attacking or else. Trust mechanisms can help estimating the trustworthiness. This paper presents a distributed trust model named P2PETrust (peer-to-peer E-commerce...

Author(s):   Zhenhua Tan, Wei Cheng, Yi Ma, Zhiliang Zhu and Guiran Chang

September 2011

Anomaly detection of domain name system (DNS) query traffic at top level domain servers

    Major network events can be reflected on domain name system (DNS) traffic at the top level server on the DNS hierarchical structure. This paper pursues a novel approach to detect the DNS traffic anomaly of 5.19 events in China at CN top level domain server using covariance analysis. We normalize, expand and average the covariance changes for different length of time slice to...

Author(s):   Zheng Wang and Shian-Shyong Tseng

September 2011

A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)

    Voice over internet protocol (VoIP) service has been a very popular and important application over the internet. Wireless VoIP also becomes more and more popular due to its features of low cost and convenience. Wireless mesh networks (WMNs) have emerged as a key technology for the next-generation wireless networks and have been considered as a good solution for VoIP services...

Author(s):   Hui Lin, Li Xu, Jianliang Gao and Kai Yang

September 2011

Completed research on cross-organization workflow of Agile telecom

    In order to promote the core competitive power for telecom operating enterprises to face market fine operation, this article will analyze and compare six kinds of mode of cross-organization workflow in details. Extension case transmission mode (ECTM) and loosen couple mode (LCM) have become the major workflow modes in coordinating commerce application for their better...

Author(s):   Wang Qi, Liu Dan, Lv Furong and Li Yao

September 2011

Further observations on certificate-base encryption and its generic construction from certificateless public key encryption

    Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKE). It combines PKE and identity-based encryption (IBE) while preserving some of their most attractive features. CBE provides an efficient implicit certificate mechanism which eliminates the...

Author(s):     Yang Lu

September 2011

Load balancing parallelizing XML query processing based on shared cache chip multi-processor (CMP)

    Chip multi-processor (CMP) could support more than two threads to execute simultaneously, and some executing units are owned by each core. Based on CMP, this paper proposes a novel and complete optimization framework on parallelism for XML database multithreaded query processing that strives for maximum resource utilization. Firstly, a set of algorithms for constructing the...

Author(s):   Wanli Zuo, Yongheng Chen, Fengling He, and Kerui Chen,