Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleAugust 2007
A Resource Allocation Control for Wireless Ad Hoc Networks
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 508–511Quality of Service (QoS) of ad hoc network has become a very important research issue in the wireless networks. The ability to adjust the allocated bandwidth of ongoing flows is becoming increasingly significant. In this paper, we describe a fuzzy price-...
- ArticleAugust 2007
Varying the Sample Number for Monte Carlo Localization in Mobile Sensor Networks
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 490–495https://doi.org/10.1109/IMSCCS.2007.96Monte Carlo method has been widely used in many fields in the past few years. Currently, for mobile object localizing and tracking, Monte Carlo method has been practically proved a successful solution to solve these non-Gaussian, non-nonlinear and multi-...
- ArticleAugust 2007
Testing Approach of Component Security Based on Dynamic Monitoring
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 381–386https://doi.org/10.1109/IMSCCS.2007.91The reliability and security of software components inhibits the further development of component technology. Enhancing the testing ability of components is very important in components-based software engineering. This paper proposes a testing approach ...
- ArticleAugust 2007
SkipMard: A Multi-attribute Peer-to-Peer Resource Discovery Approach
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 266–273https://doi.org/10.1109/IMSCCS.2007.87Resource discovery technologies for Grids and Peer-to-Peer (P2P) systems share some characteristics. However, some P2P systems such as Skip Graph cannot simply be applied to Grid resource discovery because complex grid resources need to be searched by ...
- ArticleAugust 2007
Performance Study of a DHT based Grid Information Service with Data Caching
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 258–265https://doi.org/10.1109/IMSCCS.2007.71Grid Information Service (GIS) provides data about distributed resources within a Grid. A comprehensive performance investigation of a GIS can aid in detecting potential bottlenecks, advice in deployment, and help improve future system development. ...
- ArticleAugust 2007
On Metrics-Driven Software Process
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 543–549https://doi.org/10.1109/IMSCCS.2007.65Metrics can drive software processing, because they found the base of its quantizing management. There are two fundamental requirements in engineering: formal modeling and quantitative modeling. We must emphasize that metrics for software engineering is ...
- ArticleAugust 2007
Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 352–359https://doi.org/10.1109/IMSCCS.2007.60Network Security Situation Awareness (NSSA) is a hot research realm in the area of network security, which helps security analysts to solve the challenges they encounter. This paper mainly focuses on a NSSA which is based on heterogeneous multi-sensor ...
- ArticleAugust 2007
Model-Based Testing and Validation on Artificial Intelligence Systems
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 445–449https://doi.org/10.1109/IMSCCS.2007.56In this paper, we discuss how viewing an Artificial Intelligence (AI) System as a model leads to certain criteria for testing methodologies. This includes a discussion of how certain mathematical techniques for testing AI systems can be used as criteria ...
- ArticleAugust 2007
A New Method of Performance Test for Network Storage
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 416–420https://doi.org/10.1109/IMSCCS.2007.5Network storages are used widely in many fields of our society. But their testing performances are not as expected. Most of the tools being used to test the performance of network storage comes from the tools used to test the traditional storage system ...
- ArticleAugust 2007
Fault-Tolerance CMP Architecture based on SMT Technology
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 425–429https://doi.org/10.1109/IMSCCS.2007.43In order to improve the reliability of the single-chip multi-processor (CMP), this paper proposes a fault- tolerant CMP architecture which combines with the Simultaneous Multi-threading (SMT) technology so as to implement the transient fault detection ...
- ArticleAugust 2007
A Mobile Ad Hoc Network with Mobile Satellite Earth-stations
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 512–516https://doi.org/10.1109/IMSCCS.2007.4Ad hoc networks face the problem of improving networks' capacity and scalability. The scalability problem can be properly solved through physical hierarchy networking. In this paper, we propose a new type of hierarchal mobile ad hoc network, called the ...
- ArticleAugust 2007
Delay Analysis of Single-hop Communication in Wireless SensorNetworks with Mobile Sink
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 504–507https://doi.org/10.1109/IMSCCS.2007.34In wireless sensor networks where the sink is mobile, a node can conveniently hold an information packet until the sink comes closer. This allows to both decrease the number of wireless hops required to deliver the information to the sink and reduce ...
- ArticleAugust 2007
Control Flow Checking Algorithm using Soft-basedIntra-/Inter-block Assigned-Signature
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 412–415https://doi.org/10.1109/IMSCCS.2007.32In radiation environments, alpha particles, cosmic rays and solar wind flux can cause a single event upset (SEU), which is one of the major sources of bit-flips in digital electronics. The control-flow checking is an effective way for the running ...
- ArticleAugust 2007
Cluster Based Location-Aware Routing Protocol for Large Scale Heterogeneous MANET
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 366–373https://doi.org/10.1109/IMSCCS.2007.27Routing algorithms with low overhead, stable link, and the independence of large network are essential for the design and operation of the large scale wireless mobile ad hoc networks (MANET). In this paper, we proposed a novel Cluster Based Location-...
- ArticleAugust 2007
An Improved RED Algorithm with Combined of Queue Length and Sending-Rate Inspection
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 421–424https://doi.org/10.1109/IMSCCS.2007.17The main purpose of active queue management is to provide congestion information so that sources can set their rates. In this paper, we consider an algorithm which can achieve high utilization as well as a low queuing delay and loss, regardless of the ...
- ArticleAugust 2007
A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm
IMSCCS '07: Proceedings of the Second International Multi-Symposiums on Computer and Computational SciencesPages 374–380https://doi.org/10.1109/IMSCCS.2007.10The accurate real-time forecast of network security situations is the premise and basis of preventing large- scale network intrusions and attacks. In order to forecast the security situation more accurately, a quantitative forecast method of network ...