Virtual Network with Security Guarantee Embedding Algorithms
|
|
- Margaret McDaniel
- 6 years ago
- Views:
Transcription
1 2782 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 irtual Network with Security Guarantee Embedding Algorithms Chiqiang Xing National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China Julong Lan and Yuxiang Hu National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China Abstract Network irtualization has been widely concerned as the new technology to remedy the current ossification Internet architecture. Preious irtual network (N) embedding algorithms focus on optimizing the use of resources with regard to performance with constraints on irtual nodes and links. here are few researches to analyze the security threat to the irtual network. In this paper, we first present two security threats of irtual network and inestigate them in depth. hen we propose a noel irtual network with security guarantee that will take the trust alue and security protection leel as the new security constraints during its embedding. he irtual network with security guarantee embedding algorithm is gien at last, and the simulation results show that the algorithm is effectie. Index erms irtual network embedding;security guarantee; trust alue; security protection leel. I. INRODUCION he packet switching used by the Internet Protocol (IP) has its own quality characteristics [1], and its simple structure that the network terminals are intelligent makes the Internet an important information infrastructure that supports economic deelopment, social progress and scientific innoation in modern society, while generates some new problems. First, the rigid Internet architecture, the single function of network layer and the excessie separation between the business and network cannot meet the dierse needs of the business; secondly, because the Internet cannot be changed, the implementation and promotion of new technologies, such as IP6, DiffSer and IntSer are ery difficult [2]. In recent years, network irtualization has been widely concerned by the industry and academia [3]. Network irtualization has been propounded as a fundamental diersifying attribute of the future internetworking paradigm that will allow multiple heterogeneous network architectures to coexist on a shared substrate [4]. It also enables researchers to design and ealuation new networking protocols on the heterogeneous experimental architectures [5] [6]. Constructing irtual backbone network in wireless sensor networks also has a wonderful performance in improing the performance of broadcast [7]. herefore, the network irtualization can support network technology innoations effectiely, make it possible to deploy new network architectures, protocols and applications without changing the existing network. It not only proides a feasible eolution way from the current network to the future, but also a key feature of the future Internet [8]. Preious irtual network embedding algorithms are aimed to archie optimization objects, such as the acceptance ratio, the aerage reenue/cost of the substrate network oer time and the load balancing, with constraints on irtual nodes and links. hese irtual network embedding (NE) algorithms can be diided into different kinds: uncoordinated and coordinated, static and dynamic, distributed and centralized, concise and redundant. Minlan Yu[9] designed a irtual link mapping algorithm and path migration algorithm based on the multi-commodity flow (MCF)under the condition that the substrate network support diision and migration, improed the link mapping phase of the baseline algorithm to get higher substrate network resource utilization. In literature [10], the main objectie of the irtual network embedding algorithm based on traffic constraint was to find a irtual network that can not only meet the traffic demand but also get efficient utilization of the substrate network resource. In literature [11] a irtual network mapping algorithm with QoS guarantees (QoSMap) was proposed, its basic idea is to map a irtual link onto a single link and use a hop relay routing node to proide high quality backup routing path for the irtual link, improing the quality and reliability of the irtual network. Literature [12] presents two algorithms in order to make the substrate network load balanced: irtual network mapping algorithm without reconfiguration and irtual network mapping algorithm with reconfiguration, the first algorithm s basic idea is to map all of the irtual nodes onto the substrate nodes with little load and nearer to the irtual node that hae already been mapped, then map the irtual link with the shortest path algorithm; the latter cyclically examine the load of the substrate nodes and links. And when the load exceeds a predefined threshold alue, the Ns mapped to the node or link will be re-mapped to eliminate resource bottlenecks. doi: /jcp
2 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER Nowadays, the issues of network security are becoming increasingly serious and attract more attention [13]. hese algorithms are proposed to increase the acceptance ratio that map as more as possible N requests onto specific nodes and paths in the substrate network with constraints on irtual links and nodes resources. Howeer, the security of the substrate hosts in the substrate network is not considered. Because all the irtual nodes of different N requests are mapped onto the substrate nodes, the N will be affected if the substrate nodes are under attack or cannot be trusted. In response to these problems, we will consider new security constraints that the substrate nodes need to meet the security requirements of the irtual networks during the mapping to guarantee the security of N and resist the possible attacks to the substrate hosts. he remainder of this paper is organized as follows. Section 2 formalizes the irtual Network with Security guarantee (SN) model and gies the description and ealuation of the embedding problems. Based on the Section 2, we proposed two algorithms: N embedding algorithm based on the greedy algorithm (NE-GA) without security constraints and N embedding algorithm with security constraints (SNE-GA), and then compared the both in Section 3. Section 4 presents simulations results that ealuate the proposed algorithms and Section 5 concludes the paper. II. IRUAL NEWORK MODEL AND EMBEDDING PROBLEM A. Model of the irtual Network with Security Guarantee he hierarchy architecture of Ns is shown in Figure 1. he substrate nodes that the irtual nodes are mapped onto are called host nodes. Figure 1. the hierarchy architecture of the irtual network he security of information is an issue related to information and communication technology and a management issue as well [14]. he risks that the N introduced can be categorized in two areas: A host node attacking one of its irtual nodes. he resources that the irtual node uses are ultimately the resources owned by host nodes. All the computations of the irtual node are carried out by the hardware and software of host nodes. he host nodes can monitor or change any act of the irtual nodes in theory. And irtual nodes hae no option to defend themseles. In this case we need to map the irtual nodes onto trusted host nodes. Other malicious nodes attacking the host nodes affecting the working of Ns. In this case, host nodes being under attack, the Ns cannot work properly, een causing information leakage. hen we need to consider the anti-attack ability, called security protection leel of the substrate nodes. And we can only map the irtual nodes onto the substrate nodes that hae a higher leel of the security protection. In the first case, we can use the trust relationship between nodes to get the trust alue as one of the security constraints on irtual nodes. Some researchers apply the trust relationship mechanism to the communication network to enable the network with intrusion tolerance and increase the security. Usually, the trust alue node A to node B is a decimal between 0 and 1. he higher alue indicates the more trust from A to B. Meanwhile, the trust relationship management is a complex process. he trust alue will decrease if B does some malicious actiities to other nodes that A recognizes. For simple, we will not consider the trust relationship between nodes and set the trust alue of each node a unified decimal between 0 and 1 in the whole network. For the second case, we can introduce the computer information system security protection leel of substrate nodes, which is defined in the GB Classified oriteria for security protection of computer information system, as another security constraint on irtual nodes. GB proides the computer information system security protection with fie leels: the first leel of user self-protection leel, the second leel of system audit protection leel, the third leel of security token protection leel, the fourth leel of structural protection leel and the fifth leel of access authentication protection leel. his proision applies to diide leel of the computer information system security protection. he security protection capabilities of the computer information system increase as the leel increases. he relationships between fie leels and security functions are shown in the able 1: ABLE 1 HE RELAIONSHIPS BEWEEN FIE LEELS AND SECURIY FUNCIONS Leel 1 Leel 2 Leel 3 Leel 4 Leel 5 Discretionary Access Control Y Y Y Y Y Mandatory Access Control - - Y Y Y Mark Y Y Y
3 2784 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 Authentication Y Y Y Y Y Object reuse - Y Y Y Y Audit - Y Y Y Y Data Integrity Y Y Y Y Y Coert channel analysis Y Y rusted path Y Y Credible analysis Y So, during the embedding process of SN, except for the remaining node CPU resources and link bandwidth need to meet the N request, the trust alue and security protection leel of substrate nodes should also meet the requirements of Ns. B. irtual Network Embedding Problem Substrate network. For the embedding problem of SN, the substrate network can be modeled as a weighted undirected graph and denote it by G s =( s, E s ), where s is the set of substrate nodes and E s is the set of substrate links. Each substrate node s s is associated with the CPU capacity weight alue C( s ), trust alue ( s ) and safety protection leel S( s ). Each substrate link e s (i, j) E s between two substrate nodes i and j is associated with the bandwidth capacity weight alue W(e s ) denoting the total amount of bandwidth. he C( s ), ( s ), S( s ) and W(E s ) are non-negatie, and ( s ) [0,1], S( s ) {1,2,3,4,5}. N request. Similar to the substrate network, we model N requests as weighted undirected graphs and denote a N request by G =(, E ). Likewise, Each irtual node is associated with the required CPU weight alue C( ), trust alue ( ) and safety protection alue S( ). Each irtual link e E is associated with the required bandwidth weight alue W(e s ) denoting the required bandwidth. he C( ), ( ), S( ) and W(E ) are non-negatie, and ( ) [0,1], S( ) {1,2,3,4,5}. Each N is also associated with the required time and lifetime. N Embedding. A irtual network embedding for a N request can be defined as a mapping: M : G ( s, P ), where s s is a subset of the substrate nodes and P P, the mapping result of E s,is a subset of the substrate links. he N embedding can be naturally decomposed into node and link mapping and both the s and P are required to meet certain constraints. For the node mapping M : s, mapping irtual nodes onto substrate nodes that all M ( ) S subject to RC( M ( )) C( ) M ( ( )) ( ) (1) SM ( ( )) S ( ) For the link mapping RW ( es) W ( e), es P( M ( u), M ( )) (2) RC( s ) and RW(e s ) denote the remaining CPU resources of node s and the remaining bandwidth of link e s, where u and are irtual nodes. Objecties. Our main interest is to propose an efficient embedding algorithm for the SN and compare with the N. Because of the additional security constraints, the security protection leel and the trust alue on irtual nodes during the embedding process of N, we redefine the reenue and cost of the substrate network as follows. Similar to the preious work, we introduce the notion of reenue that corresponds to the economic benefit of accepting the N request. We denote by R(G, t) the reenue of sering the N request at time t. Reenue gies an insight into how much an InP will gain by accepting a N request. RG (, t) = α W( e) + α C ( ) 1 2 e E + α ( k ( ) + k S( )) We also redefine the cost of accepting a N request as the sum of total substrate resources allocated to the N. CG (, t) = α We ( ) + α C ( ) 1 2 ' ' es P s s + α ( k ( ) + k S( )) ' s s And the following three ealuations can be gien: 1) Aerage Reenue Oer ime: 2) Acceptance Ratio: R/ = lim t= 0 lim 3) Aerage Reenue/Cost: lim RG (, t) S RG (, t) CG (, t) III. IRUAL NEWORK WIH SECURIY GUARANEE EMBEDDING ALGORIHM We employ a node mapping algorithm based on greedy, since it is computational too expensie to employ other strategies. In order to map irtual nodes onto substrate nodes based on the greedy algorithm, we gies the following definition to ealuate the remaining bandwidth of substrate nodes and the demand bandwidth of irtual nodes: From the substrate node s point of iew, we denote by PR(t, s ) the potential remaining bandwidth of the substrate node at time t as the sum of the remaining bandwidth of all the links that connect node s : (3) (4) (5) (6) (7)
4 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER PR(, t) = RWte (, ) (8) s es L( s) We also define by PR(t, ) the potential required bandwidth of the irtual node at time t as the sum of the required bandwidth of all the irtual links that connect to : PR(, t) = Wte (, ) (9) e L( ) Algorithm 1 N Embedding Algorithm based on Greedy Algorithm, NE-GA Step 1: Sort the irtual nodes according to the PR(t, ) and the substrate nodes according to the AR(t, s ) in descending order when the N request arries. Define N and N s as the number of irtual nodes and substrate nodes respectiely; Step 2: for i=1:n, j=1: N s, if RC( s ) j RC( ) i, map the irtual node i onto the substrate node sj. If all the irtual nodes are mapped successfully, go to Step 3; otherwise go to Step 5, the request fails; Step 3: e E, find the shortest path that meets the bandwidth requirement with the shortest path algorithm to complete the link mapping. If all the irtual links are mapped successfully, go to Step 4; otherwise go to Step 5, the request fails; Step 4: Update the substrate network with the node CPU resources and link bandwidth resources; Step 5: Waiting for the next N request arries and then go to Step 1. In the SN embedding algorithm, because of the additional security constraints we first need to remoe the substrate nodes that does not meet the needs of the SN request, and then perform the aboe NE-GA algorithm. Meanwhile, due to the "bucket effect" of the security, we let the security protection leel S and the trust alue of the irtual nodes to be same in the same SN. We can gie the SN embedding algorithm based on greedy. Algorithm 2 SN Embedding Algorithm based on Greedy Algorithm, SNE-GA Step 1: Remoe the substrate nodes that cannot meet the security constraints S, when the SN request arries, getting an aailable set of substrate nodes. Define N and N s as the number of irtual nodes and aailable substrate nodes respectiely. If N s >N, go to Step 2; otherwise go to Step 5, the request fails; Step 2: for i=1: N, j=1: N s, if RC( s ) j RC( ) i, then map the irtual node i onto substrate node sj. If all the irtual nodes are mapped successfully, go to Step 3; otherwise go to Step 5, the request fails; Step 3: e E find the shortest path that meets the bandwidth requirement with the shortest path algorithm to complete the link mapping. If all the irtual links are mapped successfully, go to Step 4; otherwise go to Step 5, the request fails; Step 4: Update the substrate network with the node CPU resources and link bandwidth resources; Step 5: Waiting for the next SN request arries and then go to Step 1. s Compared with the NE-GA, the SNE-GA algorithm will lead to lower acceptance ratio as the aailable substrate nodes decrease because of the security constraints on irtual nodes. he following simulation experiments and results also erified this situation. I. PERFORMANCE EALUAION In this section, we first describe the performance ealuation enironment, and then present our main ealuation results. Our ealuation focuses primarily on comparing the acceptance ratio, reenue and cost of substrate network in the aboe two algorithms. A. Ealuation Enironment We implement a N embedding simulator to ealuate our algorithms. Substrate network. We use the G-IM tool [15] to generate the substrate network topology. he substrate network is configured to hae 100 nodes and around 500 links, a scale that corresponds to a medium-sized ISP. he CPU resources at nodes and the link bandwidths at links follow a uniform distribution from 50 to 100 units. he trust alue and the security protection leel follow a uniform distribution from 0 to1 and 1to 5 (integer) separately. N request. he arrials of N requests are modeled by a Poisson process with mean fie requests per 100 time units. he duration of the requests follows an exponential distribution with 500 time units on aerage. In one N request, the number of N nodes is randomly determined by a uniform distribution between 2 and 20. Each pair of irtual nodes are randomly connected with probability 0.5. As well, the CPU requirements of the irtual nodes and the bandwidth requirements of the irtual links are uniformly distributed between 0 and 50. he required trust alue and the security protection leel follow a uniform distribution from 0 to1 and 1to 5 (integer) separately. In NE-GA and G-SP [11], because there are no security constraints, we set α 1 =α 2 =0.5, α 3 =0 in (3) (4). In SNE-GA, we set α 1 =α 2 =α 3 =1/3, and considering the alues of and S, set k 1 =25, k 2 =5.We run all of simulations for time units, which correspond to about 2500 requests on aerage in an instance of simulation. B. Ealuation Results We used seeral metrics in our ealuations to measure the performances of our algorithms against the G-SP and compare the N and SN. he metrics conclude the acceptance ratio, aerage reenue(r) and cost (C) oer time. We also ealuated and compared the acceptance ratio by changing the distributions that the trust alue and security protection leel of substrate nodes follow. In all cases we plot the performance metrics against time to show how each of these algorithms actually perform in the long run. We summarize our key obserations in the following. (1) NE-GA leads to higher acceptance ratio than G-SP and because of additional security constraints, SNE-GA leads to lower acceptance ratio than NE-GA. Fig.2 depict that without the security
5 2786 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 constraints, the acceptance ratio of NE-GA is 65%, achieing about 10% increases oer the G-SP. And the acceptance ratio of SNE-GA is about 53%, 12% decreasing oer the NE-GA. his is because that NE-SC takes the trust alue and security protection leel as the additional constraints on irtual nodes, the aailable substrate nodes decrease for each N request. can proide customized serices and security guarantee, making the reenue increase significantly and the cost increase slightly, leading significantly improement of the R/C. Fig.3 and Fig.4 gie the aerage reenue and cost oer time separately. We can see that because of the security constraints, the acceptance ratio decreased, as the cost and reenue NE-GA G-SP SNE-GA NE-GA SNE-GA Acceptance Ratio Reenue/Cost Figure 2. N request acceptance ratio. Figure 3. ime aerage of reenue/cost (2)NE-SC leads to higher reenue/cost than NE-GA. Figure 3 shows the result. Because of the additional components (trust alue and security protection leel in (3) (4))in the reue and cost, the substrate network Aerage Cost Oer ime NE-GA SNE-GA Aerage Reenue Oer ime NE-GA SNE-GA 10 6 Figure 4. Aerage cost oer time reenue oer time Figure 5. Aerage (3) he substrate network with higher trust alue and security protection leel will lead to higher acceptance ratio. From the results aboe we can see that the acceptance ratio decreased due to additional constraints of the security protection leel and trust alue on irtual nodes. herefore, the different distributions of the trust alue and security protection leel (called as the ability ) of the substrate network will lead to different acceptance ratio. he following simulation shows this situation too. he different distributions of the trust alue and security protection leel of the substrate network are shown in able 2. We can see that the ability of substrate nodes in Distribution 2 is stronger than Distribution 1. ABLE 2 DIFFEREN DISRIBUIONS OF HE RUS ALUE AND SECURIY PROECION LEEL Security protection leel rust alue Distribution1 Distribution2 Leel 1 [0,0.2) Leel 2 [0.2,0.4)
6 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER he result of acceptance ratio is shown in Fig.5. he acceptance of Distribution 2 is 57%, 4% (about 100 SN requests) increase oer Distribution 1. his is because the "ability" of substrate nodes in Distribution 2 is stronger than Distribution 1, leading the number of aailable substrate nodes increasing for each N request, and the higher acceptance ratio. Acceptance Ratio Leel 3 [0.4,0.6) Leel 4 [0.6,0.8) Leel 5 [0.8,1] Distribution1 Distribution2 Figure 6. SN request acceptance ratio. CONCLUSION Network irtualization has been propounded as a fundamental diersifying attribute of the future internetworking paradigm that will allow multiple heterogeneous network architectures to coexist on a shared substrate. Howeer, being the foundation critical infrastructure, N must strie to ensure a certain leel of security. In this paper we first analyzes two security risks that the network irtualization introduced and then proposes a new irtual network model with security guarantee that take the trust alue and security protection leel of substrate nodes as new constraints. Finally, the irtual network with security guarantee embedding algorithm based on greedy algorithm is gien and the simulation results show that the algorithm is effectie and alidate. We also proed that the substrate nodes with higher security ability can increase the acceptance ratio. Meanwhile, the irtual network model with security guarantee in this paper is a new consideration that needs further study in many ways: First, the dynamically management and update of the trust relationships between substrate nodes. Second, the improement of the SN embedding algorithm, especially considering how to use the intelligence optimization algorithm to increase the acceptance ratio and make the substrate network load balanced are the future works. ACKNOWLEDGMEN his paper is originated from a project numbered as 2012CB315901, which is supported by national 973 foundations, and 2011AA01A103, 2011AA01A101, which is supported by national 863 foundations. REFERENCES [1] CHENG Dong-nian, WANG Bin-qiang, WANG Bao-jin, ZHANG Jian-hui. Preliminary study on the connotation of flexibility in dynamically reconfigurable networks[j].journal of Communication, olume33, Number8, pages , 2012 [2] Secure irtual network embedding. Praxis der Information serarbeiting and Kommunikation, olume34, Number4, pages , [3] CHENG Xiang, ZHANG Zhong-bao, SU Sen, YANG Fang-chun. Surey of irtual network embedding problem[j]. Journal of Communication, olume32, Number10, pages ,2011. [4] Mosharaf Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba. ineyard: irtual Network Embedding Algorithms With Coordinated Node and Link Mapping. IEEE/ACM RANSACIONS ON NEWORKING, OL. 20, NO. 1, FEBRUARY2012. [5] GENI:Global enironment for network innoations, [Online].Aailable: [6] A. Baier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, In INI eritas: Realistic and controlled network experimentation, in Proc. ACM SIGCOMM, 2006, pp [7] Yong ang, Yu Xiang, et al. Leeraging 1-hop Neighborhood Knowledge for Connected Dominating Set in Wireless Sensor Networks. Journal of Computers, 2012, 7(1), [8] FEAMSlER N, GAO L, REXFORD J. How to lease the Interact in your spare time[j]. ACM SIGCOMM Computer Communication Reiew 2007, 37(1): [9] YU M, YI Y, REXFORD J, et a1. Rethinking irtual network embedding: substrate support for path splitting and migration[j], ACMSIGCOMM Computer Communication Reiew, 2008, 38(2): [10] LU J. URNER J, Efficient Mapping of irtual Networks onto a Shared Substrate[R]. Department of Computer Science and Engineering, Washington Uniersity, [11] SHAMSI J, BROCKMEYER M. QoSMap:QoS aware mapping of irtual networks for resiliency and efficiency[a]. Proceedings of the IEEE GLOBECOM Workshop [C] Washington. IX, USA, [12] ZHU Y, AMMAR M. Algorithms for assigning substrate network resources to irtual network components[a]. Proceedings of the IEEE INFOCOM[C]. Barcelona, Spain, 2006, pp [13] Ye Du Jiqiang, Liu Ruhui, et al. A Dynamic Security Mechanism for Web Serices Based on NDIS Intermediate Driers. JOURNAL OF COMPUERS. 2011, 6(10), [14] Kuo-Hsiung Liao, Hao-En Chueh. Medical Organization Information Security Management Based on ISO27001 Information Security Standard. Journal of Software, 2012,7(4), [15] E. W. Zegura, K. L. Calert, and S. Bhattacharjee. How to model an internetwork. In Proc. IEEE INFOCOM, 1996.
7 2788 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 Chiqiang Xing is currently a Post-Graduate student at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China, superised by Professor Julong Lan. His research interests include information network, network security and new network architecture. Julong Lan is currently a professor at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China. His research interests include new network architecture and Network modeling. Yuxiang Hu is currently a lecturer at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China. His research interests include new network architecture, routing and switching technologies.
Minimizing bottleneck nodes of a substrate in virtual network embedding
Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@
More informationVirtual Network Embedding with Substrate Support for Parallelization
Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya
More informationVNE-Sim: A Virtual Network Embedding Simulator
VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,
More informationA New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks
Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm
More informationA Novel Secure Localization Scheme Against Collaborative Collusion in Wireless Sensor Networks
A Noel Secure Localization Scheme Against Collaboratie Collusion in Wireless Sensor Networks Jinfang Jiang 1, Guangjie Han 1,2, Lei Shu 2, Han-Chieh Chao 3, Shojiro Nishio 2 1 Department of Information
More informationA Prediction-based Dynamic Resource Management Approach for Network Virtualization
A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology
More informationA Bit-Window based Algorithm for Balanced and Efficient Object Placement and Lookup in Large-scale Object Based Storage Cluster
A Bit-Window based Algorithm for Balanced and Efficient Object lacement and Lookup in Large-scale Object Based Storage Cluster enuga Kanagaelu A*STA Data Storage Institute, Singapore Email:renuga_KANAGAVELU@dsia-staredusg
More informationDSNRA: a Dynamic Substrate Network Reconfiguration Algorithm
DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract
More informationIBM Tivoli OMEGAMON XE for CICS TG on z/os Version User's Guide SC
IBM Tioli OMEGAMON XE for CICS TG on z/os Version 5.1.0 User's Guide SC14-7476-00 IBM Tioli OMEGAMON XE for CICS TG on z/os Version 5.1.0 User's Guide SC14-7476-00 Note Before using this information and
More informationTechnical Report CS : Incorporating Trust in Network Virtualization
Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE
More informationIBM i Version 7.2. Security Service Tools IBM
IBM i Version 7.2 Security Serice Tools IBM IBM i Version 7.2 Security Serice Tools IBM Note Before using this information and the product it supports, read the information in Notices on page 37. This
More informationModification of an energy-efficient virtual network mapping method for a load-dependent power consumption model
Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science
More informationReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck
ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding
More informationExploiting Route Redundancy via Structured Peer to Peer Overlays
Exploiting Route Redundancy ia Structured Peer to Peer Oerlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz Uniersity of California, Berkeley Challenges Facing
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationRobinhood: Towards Efficient Work-stealing in Virtualized Environments
1 : Towards Efficient Work-stealing in Virtualized Enironments Yaqiong Peng, Song Wu, Member, IEEE, Hai Jin, Senior Member, IEEE Abstract Work-stealing, as a common user-leel task scheduler for managing
More informationLive Partition Mobility ESCALA REFERENCE 86 A1 85FA 01
Lie Partition Mobility ESCALA REFERENCE 86 A1 85FA 01 ESCALA Lie Partition Mobility Hardware May 2009 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDE 01 FRANCE REFERENCE 86 A1 85FA 01 The following
More informationTivoli Application Dependency Discovery Manager Version 7 Release 2.1. Installation Guide
Tioli Application Dependency Discoery Manager Version 7 Release 2.1 Installation Guide Tioli Application Dependency Discoery Manager Version 7 Release 2.1 Installation Guide Note Before using this information
More informationA Flexible Scheme of Self Recovery for Digital Image Protection
www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China
More informationExpertise-Based Data Access in Content-Centric Mobile Opportunistic Networks
Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks Jing Zhao, Xiaomei Zhang, Guohong Cao, Mudhakar Sriatsa and Xifeng Yan Pennsylania State Uniersity, Uniersity Park, PA IBM T.
More informationCONTINUOUS VIGILANCE POLICY
CONTINUOUS VIGILANCE POLICY Policy: Policy Owner: Continuous Vigilance CIO Change Management Original Implementation Date: 8/30/2017 Effectie Date: 8/30/2017 Reision Date: Approed By: NIST Cyber Security
More informationIBM Sterling Gentran:Server for Windows. Installation Guide. Version 5.3.1
IBM Sterling Gentran:Serer for Windows Installation Guide Version 5.3.1 IBM Sterling Gentran:Serer for Windows Installation Guide Version 5.3.1 Note Before using this information and the product it supports,
More information2 Video Quality Assessment framework for ROI-based Mobile Video Adaptation
3rd International Conference on Multimedia Technology(ICMT 2013) A Noel Scheme of Video Quality Estimation for the ROI Transcoding Video Ting Yao 1. Abstract. Because of the limitation of bandwidth and
More informationiseries Experience Reports Configuring Management Central Connections for Firewall Environments
iseries Experience Reports Configuring Management Central Connections for Firewall Enironments iseries Experience Reports Configuring Management Central Connections for Firewall Enironments Copyright
More informationiplanetwebserveruser sguide
IBM Tioli Monitoring for Web Infrastructure iplanetwebsereruser sguide Version 5.1.0 SH19-4574-00 IBM Tioli Monitoring for Web Infrastructure iplanetwebsereruser sguide Version 5.1.0 SH19-4574-00 Note
More informationInternet Information Server User s Guide
IBM Tioli Monitoring for Web Infrastructure Internet Information Serer User s Guide Version 5.1.0 SH19-4573-00 IBM Tioli Monitoring for Web Infrastructure Internet Information Serer User s Guide Version
More informationSA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks
SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks Bounpadith Kannhaong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato Graduate School of Information Sciences ohoku Uniersity
More informationIBM. Systems management Logical partitions. System i. Version 6 Release 1
IBM System i Systems management Logical partitions Version 6 Release 1 IBM System i Systems management Logical partitions Version 6 Release 1 Note Before using this information and the product it supports,
More informationIBM Security Access Manager for Web Version 7.0. Upgrade Guide SC
IBM Security Access Manager for Web Version 7.0 Upgrade Guide SC23-6503-02 IBM Security Access Manager for Web Version 7.0 Upgrade Guide SC23-6503-02 Note Before using this information and the product
More informationIBM Tivoli Storage Manager for Windows Version Installation Guide
IBM Tioli Storage Manager for Windows Version 7.1.1 Installation Guide IBM Tioli Storage Manager for Windows Version 7.1.1 Installation Guide Note: Before using this information and the product it supports,
More informationCloning IMS Systems and Databases
white paper Cloning IMS Systems and Databases Ensure the Ongoing Health of Your IMS Database System Rocket Mainstar Cloning IMS Systems and Databases A White Paper by Rocket Software Version 3.1 Reised
More informationiseries Configuring Management Central Connections for Firewall Environments
iseries Configuring Management Central Connections for Firewall Enironments iseries Configuring Management Central Connections for Firewall Enironments Copyright International Business Machines Corporation
More informationTechnology Mapping Targeting Routing Congestion under Delay Constraints
1 Technology Mapping Targeting Routing Congestion under Delay Constraints Rupesh S. Shelar, Member, IEEE, Prashant Saxena, and Sachin S. Sapatnekar, Fellow, IEEE Abstract Routing congestion has become
More informationVirtual Backbone Construction for Cognitive Radio Networks without Common Control Channel
Virtual Backbone Construction for Cognitie Radio Networks without Common Control Channel Ying Dai, Jie Wu, and ChunSheng Xin Department of Computer and Information Sciences, Temple Uniersity, Philadelphia,
More information2009 Conference for Visual Media Production
009 Conference for Visual Media Production COECTIG SHAPESS VAIATIOS I STEEO IMAGE PAIS C. Doutre and P. asiopoulos Departement of Electrical and Computer gineering Uniersity of British Columbia, Vancouer,
More informationIBM Netcool Operations Insight Version 1 Release 4.1. Integration Guide IBM SC
IBM Netcool Operations Insight Version 1 Release 4.1 Integration Guide IBM SC27-8601-08 Note Before using this information and the product it supports, read the information in Notices on page 403. This
More informationIBM Tivoli Storage Manager for Virtual Environments Version Data Protection for VMware Installation Guide IBM
IBM Tioli Storage Manager for Virtual Enironments Version 7.1.6 Data Protection for VMware Installation Guide IBM IBM Tioli Storage Manager for Virtual Enironments Version 7.1.6 Data Protection for VMware
More informationManaged Dynamic VPN Service: Core Capacity Sharing Schemes For Improved VPN Performance
This full tet paper was peer reiewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 2007 proceedings. Managed Dynamic VPN Serice: Core Capacity Sharing
More informationTSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks
: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Deliery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He and Daid H.C. Du Department of Computer Science & Engineering,
More informationRegistration Authority Desktop Guide
IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01 IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01
More informationA SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang
More informationIBM Security Access Manager Version Appliance administration topics
IBM Security Access Manager Version 8.0.0.5 Appliance administration topics IBM Security Access Manager Version 8.0.0.5 Appliance administration topics ii IBM Security Access Manager Version 8.0.0.5:
More informationA Modified Tabu Search Algorithm to Solve Vehicle Routing Problem
Journal of Computers Vol. 29 No. 3, 2018, pp. 197-209 doi:10.3966/199115992018062903019 A Modified Tabu Search Algorithm to Sole Vehicle Routing Problem Qinhong Fu 1, Kang Zhou 1*, Huaqing Qi 2, Falin
More informationMaximizing the Lifetime of Dominating Sets
Maximizing the Lifetime of Dominating Sets Thomas Moscibroda and Roger Wattenhofer {moscitho, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich 892 Zurich, Switzerland
More informationEnsuring Catalog and Control Data Set Integrity
white paper Ensuring Catalog and Control Data Set Integrity Part I: Catalog Integrity Ensuring Catalog and Control Data Set Integrity Part 1: Catalog Integrity A White Paper by Rocket Software Version
More informationOn Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks
On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless
More informationResource analysis of network virtualization through user and network
Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information
More informationEvaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks
Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Mohamed Faten Zhani, Raouf Boutaba Institute of
More informationIBM Initiate Web Reports. User's Guide. Version9Release7 SC
IBM Initiate Web Reports User's Guide Version9Release7 SC19-3142-04 IBM Initiate Web Reports User's Guide Version9Release7 SC19-3142-04 Note Before using this information and the product that it supports,
More informationIBM i Version 7.2. Connecting to IBM i IBM i Access for Web IBM
IBM i Version 7.2 Connecting to IBM i IBM i Access for Web IBM IBM i Version 7.2 Connecting to IBM i IBM i Access for Web IBM Note Before using this information and the product it supports, read the information
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More informationMemory Hierarchy. Reading. Sections 5.1, 5.2, 5.3, 5.4, 5.8 (some elements), 5.9 (2) Lecture notes from MKP, H. H. Lee and S.
Memory Hierarchy Lecture notes from MKP, H. H. Lee and S. Yalamanchili Sections 5.1, 5.2, 5.3, 5.4, 5.8 (some elements), 5.9 Reading (2) 1 SRAM: Value is stored on a pair of inerting gates Very fast but
More informationIBM i Version 7.2. Service and support IBM
IBM i Version 7.2 Serice and support IBM IBM i Version 7.2 Serice and support IBM Note Before using this information and the product it supports, read the information in Notices on page 71. This document
More informationIBM Tivoli Storage Manager for Windows Version 7.1. Installation Guide
IBM Tioli Storage Manager for Windows Version 7.1 Installation Guide IBM Tioli Storage Manager for Windows Version 7.1 Installation Guide Note: Before using this information and the product it supports,
More informationTopology-Awareness and Reoptimization Mechanism for Virtual Network Embedding
Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University
More informationTrust-Based Recommendation: an Empirical Analysis
rust-based Recommendation: an Empirical Analysis Daire O Doherty Uniersite catholique de Louain 1348 Louain-La-Neue, Belgium daire.odoherty@student.uclouain.be Salim Jouili EURA NOVA Rue Emile Francqui,
More informationInternational Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online):
COMPUTER REPRESENTATION OF GRAPHS USING BINARY LOGIC CODES IN DISCRETE MATHEMATICS S. Geetha* & Dr. S. Jayakumar** * Assistant Professor, Department of Mathematics, Bon Secours College for Women, Villar
More informationTivoli Monitoring: Windows OS Agent
Tioli Monitoring: Windows OS Agent Version 6.2.2 User s Guide SC32-9445-03 Tioli Monitoring: Windows OS Agent Version 6.2.2 User s Guide SC32-9445-03 Note Before using this information and the product
More informationInstalling and Configuring Tivoli Enterprise Data Warehouse
Installing and Configuring Tioli Enterprise Data Warehouse Version 1 Release 1 GC32-0744-00 Installing and Configuring Tioli Enterprise Data Warehouse Version 1 Release 1 GC32-0744-00 Installing and Configuring
More informationLoad Stabilization and Minimization of Handover Delay in IEEE802.16
Load Stabilization and Minimization of Handoer Delay in IEEE802.16 Anil Sangwan. Assistant Professor, Electronics and Communication, Uniersity Institute of Engineering and Technology, Maharshi Dayanand
More informationTHE RESEARCH ON LPA ALGORITHM AND ITS IMPROVEMENT BASED ON PARTIAL INFORMATION
THE RESEARCH O LPA ALGORITHM AD ITS IMPROVEMET BASED O PARTIAL IFORMATIO 1 SHEG XI 1 School of Finance, Shandong Polytechnic Uniersity, Jinan, 250353 China ABSTRACT With the growing expansion of data size,
More informationSolutions for SAP Systems Using IBM DB2 for IBM z/os
Rocket Mainstar Solutions for SAP Systems Using IBM DB2 for IBM z/os white paper Rocket Mainstar Solutions for SAP Systems Using IBM DB2 for IBM z/os A White Paper by Rocket Software Version 1.4 Reised
More informationMotion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity
Motion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity Jun-Geon Kim and Daeho Lee Abstract-- In this paper, we propose a noel method of motion compensated frame interpolation
More informationOn Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs
On Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs Yilin Shen, Ying Xuan, My T. Thai CISE Dept, Uniersity of Florida, Email: {yshen, yxuan, mythai}@cise.ufl.edu Abstract Minimum-latency
More informationModification Semantics in Now-Relative Databases
Modification Semantics in Now-Relatie Databases Kristian Torp Christian S. Jensen Richard T. Snodgrass February 5, 00 Abstract Most real-world databases record time-arying information. In such databases,
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationAll Rights Reserved 2017 IJARCET
END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,
More informationHigh Availability Guide for Distributed Systems
IBM Tioli Monitoring Version 6.2.3 Fix Pack 1 High Aailability Guide for Distributed Systems SC23-9768-03 IBM Tioli Monitoring Version 6.2.3 Fix Pack 1 High Aailability Guide for Distributed Systems SC23-9768-03
More informationIBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3. Guide and Reference
IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3 Guide and Reference IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3 Guide and Reference Note Before using
More informationTopology-aware Virtual Network Embedding Using Multiple Characteristics
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 1, Jan. 2014 145 Topology-aware Virtual Network Embedding Using Multiple Characteristics Jianxin Liao 1*, Min Feng 1, Tonghong Li 2, Jingyu
More informationCompatible Class Encoding in Roth-Karp Decomposition for Two-Output LUT Architecture
Compatible Class Encoding in Roth-Karp Decomposition for Two-Output LUT Architecture Juinn-Dar Huang, Jing-Yang Jou and Wen-Zen Shen Department of Electronics Engineering, National Chiao Tung Uniersity,
More informationConstructing Connected Dominating Sets with Bounded Diameters in Wireless Networks
Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng
More informationConnectivity-aware Virtual Network Embedding
Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding
More informationA Multicast Routing Algorithm for 3D Network-on-Chip in Chip Multi-Processors
Proceedings of the World Congress on Engineering 2018 ol I A Routing Algorithm for 3 Network-on-Chip in Chip Multi-Processors Rui Ben, Fen Ge, intian Tong, Ning Wu, ing hang, and Fang hou Abstract communication
More informationA Two-phase Distributed Training Algorithm for Linear SVM in WSN
Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear
More informationIBM Interact Version 9 Release 0 May 31, User's Guide
IBM Interact Version 9 Release 0 May 31, 2013 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 97. This edition applies to ersion 9,
More informationIBM Cloud Orchestrator Version Content Development Guide IBM
IBM Cloud Orchestrator Version 2.5.0.8 Content Deelopment Guide IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to ersion 2, release
More informationCapacitated Vehicle Routing Problem Solving using Adaptive Sweep and Velocity Tentative PSO
(IJACSA) International Journal of Adanced Computer Science and Applications, Capacitated Vehicle Routing Problem Soling using Adaptie Sweep and Velocity Tentatie PSO M. A. H. Akhand, Zahrul Jannat Peya
More informationModification Semantics in Now-Relative Databases
5 Modification Semantics in Now-Relatie Databases Kristian Torp, Christian S. Jensen, and Richard T. Snodgrass Most real-world databases record time-arying information. In such databases, the notion of
More informationIBM. Basic system operations. System i. Version 6 Release 1
IBM System i Basic system operations Version 6 Release 1 IBM System i Basic system operations Version 6 Release 1 Note Before using this information and the product it supports, read the information in
More informationA Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost
A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica
More informationIBM Tivoli Storage Manager Version Optimizing Performance IBM
IBM Tioli Storage Manager Version 7.1.6 Optimizing Performance IBM IBM Tioli Storage Manager Version 7.1.6 Optimizing Performance IBM Note: Before you use this information and the product it supports,
More informationIBM Tealeaf cximpact Version 9 December 4, Tealeaf Reporting Guide
IBM Tealeaf cximpact Version 9 December 4, 2014 Tealeaf Reporting Guide Note Before using this information and the product it supports, read the information in Notices on page 175. This edition applies
More informationSource Routing Algorithms for Networks with Advance Reservations
Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract
More informationA New Approach to Ant Colony to Load Balancing in Cloud Computing Environment
A New Approach to Ant Colony to Load Balancing in Cloud Computing Environment Hamid Mehdi Department of Computer Engineering, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran Hamidmehdi@gmail.com
More informationIBM. Connecting to IBM i IBM i Access for Web. IBM i 7.1
IBM IBM i Connecting to IBM i IBM i Access for Web 7.1 IBM IBM i Connecting to IBM i IBM i Access for Web 7.1 Note Before using this information and the product it supports, read the information in Notices,
More informationMessage Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks
, March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,
More informationOpportunistic Bandwidth Sharing for Virtual Network Mapping
Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department
More informationSelective Refinement Of Progressive Meshes Using Vertex Hierarchies
Selectie Refinement Of Progressie Meshes Using Vertex Hierarchies Yigang Wanga, Bernd Fröhlichb and Martin Göbelc a,c Fraunhofer-Institut für Medienkommunication, Germany b Bauhaus-Uniersität Weimar, Germany
More informationDiscovery of BGP MPLS VPNs
Discoery of BGP MPLS VPNs Sarit Mukherjee, Tejas Naik, Sampath Rangarajan Center for Networking Research Bell Labs, Holmdel, NJ sarit@bell-labs.com, {tnaik, sampath}@research.bell-labs.com Abstract. BGP/MPLS
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationIBM Unica Detect Version 8 Release 5 October 26, Administrator's Guide
IBM Unica Detect Version 8 Release 5 October 26, 2011 Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 175. This edition applies
More informationVerifying Keys through Publicity and Communities of Trust " Eric Osterweil! Dan Massey! Danny McPherson! Lixia Zhang!
Verifying Keys through Publicity and Communities of Trust " Eric Osterweil! Dan Massey! Danny McPherson! Lixia Zhang! DNSSEC: Security for a Core Internet System" DNS is a staple of today s online actiities!
More informationTriangulated Views Selection for Image-based Walkthrough
Proceedings of the International MultiConference of Engineers and Computer Scientists 009 Vol I IMECS 009, March 8-0, 009, Hong Kong Triangulated Views Selection for Image-based Walkthrough Chang Ok Yun,
More informationAn Improved k-nearest Neighbor Classification Algorithm Using Shared Nearest Neighbor Similarity
ging, 26(3), p.p.405-421. 10. D. Adalsteinsson, J. A. Sethian (1999) The Fast Construction of Extension Velocities in Leel Set Methods. Journal of Computational Physics, 148, p.p.2-22. Information technologies
More informationIBM Unica Distributed Marketing Version 8 Release 6 May 25, Field Marketer's Guide
IBM Unica Distributed Marketing Version 8 Release 6 May 25, 2012 Field Marketer's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
More informationWebSphere Message Broker ESQL
WebSphere Message Broker ESQL Version 6 Release 0 WebSphere Message Broker ESQL Version 6 Release 0 Note Before using this information and the product it supports, read the information in the Notices
More informationIntelligent Load Balancing Approach for Cognitive Radio Networks
Intelligent Load Balancing Approach for Cognitive Radio Networks 1 Ravneet Kaur, 2 Er.Vimmi Malhotra 1 Student, M.Tech CSE, 2 Assistant Professor, Dept. of CSE, 1 ravneetkaur0013@gmail.com, 2 malhotra.vimmi22@gmail.com
More informationIBM Tivoli Monitoring for Virtual Environments: Dashboard, Reporting, and Capacity Planning Version 7.1 Fix Pack 1. User s Guide SC
IBM Tioli Monitoring for Virtual Enironments: Dashboard, Reporting, and Capacity Planning Version 7.1 Fix Pack 1 User s Guide SC14-7493-01 IBM Tioli Monitoring for Virtual Enironments: Dashboard, Reporting,
More informationIBM License Metric Tool 9.2.x. Scalability Guide. Version 2 IBM
IBM License Metric Tool 9.2.x Scalability Guide Version 2 IBM IBM License Metric Tool 9.2.x Scalability Guide Version 2 IBM Scalability Guide This edition applies to ersion 9.2.x of License Metric Tool
More information