Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distrib...Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing.展开更多
There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The int...There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.展开更多
A real-time transaction service aims at ensuring the consistency of real-time and transactional Grid applications. This paper proposes an efficient real-time transaction service (RTTS). It provides abilities to discov...A real-time transaction service aims at ensuring the consistency of real-time and transactional Grid applications. This paper proposes an efficient real-time transaction service (RTTS). It provides abilities to discover qualified services, I.e., participants, to execute specified sub-transactions, coordinate real-time Grid transactions, calculate deadline and assign priority for scheduling concurrent transactions. The service discovery adopts the two-level registry mechanismto adapt to transient Grid services. The coordination algorithm invokes multiplefunctional alternative services for each sub-transaction so that it remarkablyimproves the successful ratio of real-time transactions. The experiment result shows that the RTTS can well coordinate real-time transactions for Grid service environment and shield users from the complex process.展开更多
This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communicati...This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communication mechanism. This parallel language can be used to write a programming language's denotational semantics which extracts the parallelism in the program. From this denotational definition of the programming language, the partial evaluator can generate parallel compiler of the language by self application.The key technique of partial evaluation is binding time analysis that determines in advance which parts of the source program can be evaluated during partial evaluation, and which parts cannot. A binding time analysis is described based upon type inference. A new type chcode is introduced into the type system, which denotes the type of those expressions containing residual channel operations. A well-formedness criterion is given which ensures that partial evaluation not only doesn't commit type errors but also doesn't change the sequence of channel operations. Before binding time analysis, channel analysis is used to analyze the communication relationship between send and receive processes.展开更多
QOS (Quality of Service) parameter definitions are the basis of further QOS control.But QOS parameters defined by orgallizations such as ISO and ITU are incoherent and incompatible. It leads to the inefficiency of QOS...QOS (Quality of Service) parameter definitions are the basis of further QOS control.But QOS parameters defined by orgallizations such as ISO and ITU are incoherent and incompatible. It leads to the inefficiency of QOS controls. Based on the analysis of QOS parameters defined by ISO and ITU, this paper first promotes Minimum QOS Parameter Set in transport layer. It demonstrates that the parameters defined by ISO and ITU can be represented by parameters or a combination of parameters of the Set. The paper also expounds that the Set is open and manageable and it can be the potential unified base for QOS parameters.展开更多
This paper elaborates the concept and model of protocol migration in net-work interconnection. Migration strategies and principles are discussed and several cases are studied in detail Which show the basic procedu-re ...This paper elaborates the concept and model of protocol migration in net-work interconnection. Migration strategies and principles are discussed and several cases are studied in detail Which show the basic procedu-re and tech-niques used in protocol migration.展开更多
In this paper,a control integration method based on agent cooperation,called ASOJI,is proposed,which designs the architecture of integrated application systems in distributed computation environments as an agent comm...In this paper,a control integration method based on agent cooperation,called ASOJI,is proposed,which designs the architecture of integrated application systems in distributed computation environments as an agent community composed of nested agent fed-erations in three aspects:architecture style,agent cooperation,and composition semantics.Through defining activity-sharing-orented joint intention in the way of stepwise refinement,ASOJI can not only support the transparent specification of the architecture for software com-position,but also eliminate the gap between agent theory and the engineering realiztion of control integration.展开更多
文摘Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing.
文摘There are inherent vulnerabilities that are not easily preventable in the mobile Ad-Hoc networks.To build a highly secure wireless Ad-Hoc network,intrusion detection and response techniques need to be deployed;The intrusion detection and cluster-based Ad-Hoc networks has been introduced,then,an architecture for better intrusion detection based on cluster using Data Mining in wireless Ad -Hoc networks has been shown.A statistical anomaly detection approach has been used.The anomaly detection and trace analysis have been done locally in each node and possibly through cooperation with clusterhead detection in the network.
基金国家高技术研究发展计划(863计划),国家重点基础研究发展计划(973计划),the grand project of the Science and Technology Commission of Shanghai Municipality
文摘A real-time transaction service aims at ensuring the consistency of real-time and transactional Grid applications. This paper proposes an efficient real-time transaction service (RTTS). It provides abilities to discover qualified services, I.e., participants, to execute specified sub-transactions, coordinate real-time Grid transactions, calculate deadline and assign priority for scheduling concurrent transactions. The service discovery adopts the two-level registry mechanismto adapt to transient Grid services. The coordination algorithm invokes multiplefunctional alternative services for each sub-transaction so that it remarkablyimproves the successful ratio of real-time transactions. The experiment result shows that the RTTS can well coordinate real-time transactions for Grid service environment and shield users from the complex process.
文摘This paper describes theoretical and practical aspects of a partial evaluator that treats a parallel lambda language. The parallel language presented is a combination of lambda calculus and message passing communication mechanism. This parallel language can be used to write a programming language's denotational semantics which extracts the parallelism in the program. From this denotational definition of the programming language, the partial evaluator can generate parallel compiler of the language by self application.The key technique of partial evaluation is binding time analysis that determines in advance which parts of the source program can be evaluated during partial evaluation, and which parts cannot. A binding time analysis is described based upon type inference. A new type chcode is introduced into the type system, which denotes the type of those expressions containing residual channel operations. A well-formedness criterion is given which ensures that partial evaluation not only doesn't commit type errors but also doesn't change the sequence of channel operations. Before binding time analysis, channel analysis is used to analyze the communication relationship between send and receive processes.
文摘QOS (Quality of Service) parameter definitions are the basis of further QOS control.But QOS parameters defined by orgallizations such as ISO and ITU are incoherent and incompatible. It leads to the inefficiency of QOS controls. Based on the analysis of QOS parameters defined by ISO and ITU, this paper first promotes Minimum QOS Parameter Set in transport layer. It demonstrates that the parameters defined by ISO and ITU can be represented by parameters or a combination of parameters of the Set. The paper also expounds that the Set is open and manageable and it can be the potential unified base for QOS parameters.
文摘This paper elaborates the concept and model of protocol migration in net-work interconnection. Migration strategies and principles are discussed and several cases are studied in detail Which show the basic procedu-re and tech-niques used in protocol migration.
文摘In this paper,a control integration method based on agent cooperation,called ASOJI,is proposed,which designs the architecture of integrated application systems in distributed computation environments as an agent community composed of nested agent fed-erations in three aspects:architecture style,agent cooperation,and composition semantics.Through defining activity-sharing-orented joint intention in the way of stepwise refinement,ASOJI can not only support the transparent specification of the architecture for software com-position,but also eliminate the gap between agent theory and the engineering realiztion of control integration.