Learn More
In this paper, we extend previous works on task assignment problems for a set of linear-pipeline tasks over a set of processors. Different from previous works, we revisit the problems with two additional system factors: deadline and energy-consumption, which are key factors in real-time and power-aware computation. For a set of linear-pipelined real-time(More)
One of the unique features of P2P streaming is that each peer plays both client and server roles at the same time. Distribution of program streams is achieved by peer forwarding instead of providing from a set of centralized servers. Consequently, loss of a frame not only causes the peer to miss the frame, but all the descendant peers feel the effect as(More)
Due to fast changing of spam techniques, we argue that multiple spam detection strategies should be developed to effectively against spam. Among many others, (naive) Bayesian filter is one of those being proposed. While there are some early works being done on Bayesian approaches for spam detection, it is unknown if such a simple approach is still effective(More)
OVSF (Orthogonal Variable Spreading Factor) codes are used as channelization codes in WCDMA system. OVSF codes are getting popular due to his efficiency and flexibility to allocate variable bite rates for different bandwidth requirement of applications. A core design issue of OVSF code allocation schemes is to utilize the codes efficiently such that more(More)
On behalf of all the ICACT2016 international conference committees, we would like to welcome all of you to ICACT2016. It is a great pleasure for us to host The ICACT is annual international conference in the communications field, where all experts from home and abroad come together to present their work, and share new ideas and visions for achieving the(More)
Previous studies have discussed various constrained minimal spanning tree (MST) problems. In this paper, we propose an efficient algorithm for solving a class of constrained MST problems. The proposed PSO (Particle Swarm Optimization)-like strategy for solving constrained MST problems identifies optimal MSTs under degree and delay constraints. The solution(More)
Due to Internet, people prefer using emails instead of traditional post mails, because of its simple and easy to use. Meanwhile unsolicited emails (spam) become a serious problem, as sending bulk emails are almost cost free in terms of time and money. Spam not only reduces system performance of mail servers but also annoys mail receivers. Nowadays attacks(More)