Showing 133–144 of 207 results

  • On improving recovery performance in erasure code based geo-diverse storage clusters

    On improving recovery performance in erasure code based geo-diverse storage clusters

    0 out of 5
    5,500

    On improving recovery performance in erasure code based geo-diverse storage clusters Abstract-Erasure code based distributed storage systems are increasingly being used by storage providers for big data storage since they offer the same reliability as replication with significant decrease in the amount of storage required. But, when it comes to a storage system with data…

  • On Maximizing Diffusion Speed Over Social Networks With Strategic Users

    On Maximizing Diffusion Speed Over Social Networks With Strategic Users

    0 out of 5
    5,500

    On Maximizing Diffusion Speed Over Social Networks With Strategic Users Abstract? A variety of models have been proposed and analyzed to understand how a new innovation (e.g., a technology, a product, or even a behavior) diffuses over a social network, broadly classified into either of epidemic-based or game-based ones. In this paper, we consider a…

  • On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy

    On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy

    0 out of 5
    4,500

    On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy Abstract?On Nonblocking Multicast Fat-Tree Data Center Networks with Server Redundancy. Fat-tree networks have been widely adopted as network topologies in data center networks < Final Year Projects 2016 > DCNs. However,it is costly forfat-tree DCNs to support nonblocking multicast communication,due to the large number of…

  • On the Node Clone Detection in Sensor Networks for Electronic Copy RightManagement System

    On the Node Clone Detection in Sensor Networks for Electronic Copy RightManagement System

    0 out of 5
    4,500

    On the Node Clone Detection in Sensor Networks for Electronic Copy RightManagement System Abstract?On the Node Clone Detection in Sensor Networks for Electronic Copy RightManagement System. Random key predistribution security schemes are well suited for use in sensor networks due to their low overhead. However, the security of a network using predistributed keys can be…

  • On the Security of End-to-End Measurements Based on Packet-Pair Dispersions

    On the Security of End-to-End Measurements Based on Packet-Pair Dispersions

    0 out of 5
    4,500

    On the Security of End-to-End Measurements Based on Packet-Pair Dispersions sequence and plain text   Abstract? The packet-pair technique is a widely adopted method to estimate the capacity of a path. The use of the packet-pair technique has been suggested in numerous applications including network management and end-to-end admission control. Recent observations also indicate that…

  • On-Demand Discovery of Software Service  Dependencies in MANETs

    On-Demand Discovery of Software Service Dependencies in MANETs

    0 out of 5
    4,500

    On-Demand Discovery of Software Service Dependencies in MANETs Abstract? On-Demand Discovery of Software Service Dependencies in MANETs. The combination of service-oriented applications, with their run-time service binding, and mobile ad hoc networks, with their transient communication topologies, brings a new level of complex dynamism to the structure and behavior of software systems. The existing system…

  • Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection

    Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection

    0 out of 5
    4,500

    Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection Abstract? Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection. Current network intrusion detection systems lack adaptability to the frequently changing network environments. Furthermore, intrusion detection in the new distributed architectures is now a major requirement. In this paper, we propose two online Adaboost-based…

  • Optimized Active Single-Miller Capacitor Compensation With Inner Half-Feedforward Stage for Very High-Load Three-Stage OTAs

    Optimized Active Single-Miller Capacitor Compensation With Inner Half-Feedforward Stage for Very High-Load Three-Stage OTAs

    0 out of 5
    5,500

    Optimized Active Single-Miller Capacitor Compensation With Inner Half-Feedforward Stage for Very High-Load Three-Stage OTAs Abstract? A new effective single-Miller capacitor compensation topology for three-stage amplifiers with very large capacitive loads, realized through an active-feedback capacitor together with an inner half-feedforward stage. Moreover, an optimized design strategy which profitably exploits the two left half-plane zeros is…

  • P2P Video Streaming Replication Scheme for P2P VoD Services

    P2P Video Streaming Replication Scheme for P2P VoD Services

    0 out of 5
    4,500

    P2P Video Streaming Replication Scheme for P2P VoD Services Abstract-In P2P Video-on-Demand (VoD) services, the storage size of lightweight devices is limited so that they can only store the partial video data rather than a complete file. Therefore, peers cannot find the required video data from neighbor peers, and then fetch the video data from…

  • P2P Video Streaming Replication Scheme for P2P VoD Services

    P2P Video Streaming Replication Scheme for P2P VoD Services

    0 out of 5
    4,500

    P2P Video Streaming Replication Scheme for P2P VoD Services Abstract-In P2P Video-on-Demand (VoD) services, the storage size of lightweight devices is limited so that they can only store the partial video data rather than a complete file. Therefore, peers cannot find the required video data from neighbor peers, and then fetch the video data from…

  • PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System

    PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System

    0 out of 5
    4,500

    PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System Abstract?PACK: Prediction-Based Cloud Bandwidthand Cost Reduction System. In this paper, < Final Year Projects > we present PACK (Predictive ACKs), a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth…

  • PAIS: A Proximity-aware Interest-clustered P2P File Sharing System

    PAIS: A Proximity-aware Interest-clustered P2P File Sharing System

    0 out of 5
    4,500

    PAIS: A Proximity-aware Interest-clustered P2P File Sharing System Abstract? PAIS: A Proximity-aware Interest-clustered P2P File Sharing System.Ef?cient ?le query is important to the overall performance of Peer-to-Peer < Final Year Projects 2016 > P2P ?le sharing systems. Clustering peers by their common interests can signi?cantly enhance the ef?ciency of ?le query. On the other hand,…

End of content

End of content