期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
PROXY-BASED PATCHING STREAM TRANSMISSION STRATEGY IN MOBILE STREAMING MEDIA SYSTEM
1
作者 Liao Jianxin Lei Zhengxiong Ma Xutao Zhu Xiaomin 《Journal of Electronics(China)》 2006年第4期515-519,共5页
A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA... A mobile transmission strategy, PMPatching (Proxy-based Mobile Patching) transmission strat-egy is proposed, it applies to the proxy-based mobile streaming media system in Wideband Code Division Multiple Access (WCDMA) network. Performance of the whole system can be improved by using patching stream to transmit anterior part of the suffix that had been played back, and by batching all the demands for the suffix arrived in prefix period and patching stream transmission threshold period. Experimental results show that this strategy can efficiently reduce average network transmission cost and number of channels consumed in central streaming media server. 展开更多
关键词 Mobile streaming media system Proxy-based Mobile patching (PMpatching) transmission strategy patching stream Batching
在线阅读 下载PDF
Modeling and Defending Passive Worms over Unstructured Peer-to-Peer Networks 被引量:8
2
作者 王方伟 张运凯 马建峰 《Transactions of Tianjin University》 EI CAS 2008年第1期66-72,共7页
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ... Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense. 展开更多
关键词 network security unstructured peer-to-peer networks passive worms propagationmodel patch dissemination strategy
在线阅读 下载PDF
PARALLEL COMPUTATION OF SUPER-SONIC BLUNT BODY VISCOUS FLOWFIELDS IN PVM
3
作者 Yang Xiaohui, Wang Zhenghua, Wang Chengyao (Dept. 1, National University of Defense Technology, Changsha, 410073, China) 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1997年第4期26-30,共5页
Supersonic viscous flows past blunt bodies is calculated with TVD difference scheme and implicit Lower Upper Symmetric Gauss Seidel (LU SGS) method, and parallel programming designing software platform PVM is used b... Supersonic viscous flows past blunt bodies is calculated with TVD difference scheme and implicit Lower Upper Symmetric Gauss Seidel (LU SGS) method, and parallel programming designing software platform PVM is used based on message passing to distribute a large task according to some patching strategies to a large number of processors in the network. These processors accomplish this large task together. The marked improvement of computational efficiency in networks, especially in MPP system, demonstrates the potential vitality of CFD in engineering design. 展开更多
关键词 computational fluid dynamics supersonic speed blunt bodies viscous flow PVM patching strategy parallel mode SPEEDUP networks
在线阅读 下载PDF
Optimal adoptions of freemium version and patching strategy:Network and security externalities
4
作者 Nan Feng Hanyue Zhang +3 位作者 Changqing Dong Jie Zhang Minqiang Li Jing Xie 《Journal of Management Science and Engineering》 2022年第1期107-132,共26页
The freemium pricing model has become mainstream in the software industry.A large user base can induce positive network effects while expanding security risks associated with unpatched users.This study explores a two-... The freemium pricing model has become mainstream in the software industry.A large user base can induce positive network effects while expanding security risks associated with unpatched users.This study explores a two-stage decision problem faced by software vendors that involves a freemium versioning strategy and a subsequent security-patching strategy when taking both the positive network externality and negative security externality into consideration.It is noteworthy that a joint effect of the two externalities on the vendor’s management decisions exists.First,we analytically derive three patching strategies for the vendor:PS_(1)(rebates all users),PS_(2)(rebates only freeware users),and PS_(3)(rebates no users).Our results indicate that,if the strength of the positive network externality is relatively low,the optimal security-patching strategy will be significantly affected by the negative security externality.Specifically,when the intensity of the negative security externality is low,the vendor’s optimal patching strategy will be PS_(1).However,with the increase in the negative security externality,the optimal patching strategy changes to PS_(2) and then to PS_(3),whereas the strategy spaces of PS_(1) and PS_(2) decrease in the positive network externality to zero.Nevertheless,if the strength of the positive network externality is relatively high,the vendor is better off selecting PS_(1) when the negative security externality is low.However,when the negative security externality is high,PS_(3) is optimal.Furthermore,based on optimal patching strategies,we reveal the optimal conditions required for the vendor to adopt the freemium model compared with commercial only.Of interest,we find that the vendor adopting the freemium version is also influenced by the interaction of the two externalities.Finally,through numerical experiments,we find that the vendor and social planner’s interests can be aligned under certain conditions.However,this is not always the case. 展开更多
关键词 Freemium Positive network externality Negative security externality patching strategy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部