A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA...A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.展开更多
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.展开更多
Supersonic viscous flows past blunt bodies is calculated with TVD difference scheme and implicit Lower Upper Symmetric Gauss Seidel (LU SGS) method, and parallel programming designing software platform PVM is used b...Supersonic viscous flows past blunt bodies is calculated with TVD difference scheme and implicit Lower Upper Symmetric Gauss Seidel (LU SGS) method, and parallel programming designing software platform PVM is used based on message passing to distribute a large task according to some patching strategies to a large number of processors in the network. These processors accomplish this large task together. The marked improvement of computational efficiency in networks, especially in MPP system, demonstrates the potential vitality of CFD in engineering design.展开更多
The freemium pricing model has become mainstream in the software industry.A large user base can induce positive network effects while expanding security risks associated with unpatched users.This study explores a two-...The freemium pricing model has become mainstream in the software industry.A large user base can induce positive network effects while expanding security risks associated with unpatched users.This study explores a two-stage decision problem faced by software vendors that involves a freemium versioning strategy and a subsequent security-patching strategy when taking both the positive network externality and negative security externality into consideration.It is noteworthy that a joint effect of the two externalities on the vendor’s management decisions exists.First,we analytically derive three patching strategies for the vendor:PS_(1)(rebates all users),PS_(2)(rebates only freeware users),and PS_(3)(rebates no users).Our results indicate that,if the strength of the positive network externality is relatively low,the optimal security-patching strategy will be significantly affected by the negative security externality.Specifically,when the intensity of the negative security externality is low,the vendor’s optimal patching strategy will be PS_(1).However,with the increase in the negative security externality,the optimal patching strategy changes to PS_(2) and then to PS_(3),whereas the strategy spaces of PS_(1) and PS_(2) decrease in the positive network externality to zero.Nevertheless,if the strength of the positive network externality is relatively high,the vendor is better off selecting PS_(1) when the negative security externality is low.However,when the negative security externality is high,PS_(3) is optimal.Furthermore,based on optimal patching strategies,we reveal the optimal conditions required for the vendor to adopt the freemium model compared with commercial only.Of interest,we find that the vendor adopting the freemium version is also influenced by the interaction of the two externalities.Finally,through numerical experiments,we find that the vendor and social planner’s interests can be aligned under certain conditions.However,this is not always the case.展开更多
基金Supported by: (1) Specialized Research Fund for the Doctoral Program of Higher Education (No. 20030013006) (2) National Specialized R&D Project for the Product of Mobile Communications (Develop-ment and Application of Next Generation Mobile Intel-ligent Network)+3 种基金 (3) Development Fund Key Project for Electronic and Information Industry (Core Service Plat-form for Next Generation Network) (4) Development Fund Project for Electronic and Information Industry (Value-added Service Platform and Application System for Mobile Communications) (5) Development Fund Project for Electronic and Information Industry (Con-tent-based Integrated Charging Platform for Telecom-munication Networks) (6) National Specific Project for Hi-tech Industrialization and Information Equipments (Mobile Intelligent Network Supporting Value-added Data Services).
文摘A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server.
基金National Natural Science Foundation of China (No.60633020 and No. 90204012)Natural Science Foundation of Hebei Province (No. F2006000177)
文摘Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
文摘Supersonic viscous flows past blunt bodies is calculated with TVD difference scheme and implicit Lower Upper Symmetric Gauss Seidel (LU SGS) method, and parallel programming designing software platform PVM is used based on message passing to distribute a large task according to some patching strategies to a large number of processors in the network. These processors accomplish this large task together. The marked improvement of computational efficiency in networks, especially in MPP system, demonstrates the potential vitality of CFD in engineering design.
文摘The freemium pricing model has become mainstream in the software industry.A large user base can induce positive network effects while expanding security risks associated with unpatched users.This study explores a two-stage decision problem faced by software vendors that involves a freemium versioning strategy and a subsequent security-patching strategy when taking both the positive network externality and negative security externality into consideration.It is noteworthy that a joint effect of the two externalities on the vendor’s management decisions exists.First,we analytically derive three patching strategies for the vendor:PS_(1)(rebates all users),PS_(2)(rebates only freeware users),and PS_(3)(rebates no users).Our results indicate that,if the strength of the positive network externality is relatively low,the optimal security-patching strategy will be significantly affected by the negative security externality.Specifically,when the intensity of the negative security externality is low,the vendor’s optimal patching strategy will be PS_(1).However,with the increase in the negative security externality,the optimal patching strategy changes to PS_(2) and then to PS_(3),whereas the strategy spaces of PS_(1) and PS_(2) decrease in the positive network externality to zero.Nevertheless,if the strength of the positive network externality is relatively high,the vendor is better off selecting PS_(1) when the negative security externality is low.However,when the negative security externality is high,PS_(3) is optimal.Furthermore,based on optimal patching strategies,we reveal the optimal conditions required for the vendor to adopt the freemium model compared with commercial only.Of interest,we find that the vendor adopting the freemium version is also influenced by the interaction of the two externalities.Finally,through numerical experiments,we find that the vendor and social planner’s interests can be aligned under certain conditions.However,this is not always the case.