Learn More
à Xv‡uà ‡urà …hƒvqà hq‰hpr†Ã vÃ €‚ivyrà p‚€ƒˆ‡vtà ‡rpu‚y‚t’à ‡ur…rà v†Ã hÃ vp…rh†vtà qr€hqà s‚…à processing real-time transactions in a mobile environment. This paper studies concurrency control problem in mobile distributed real-time database systems (MDRTDBS). Based on the High Priority Two Phase Locking (HP-2PL) scheme, we propose a distributed(More)
ÐWe study hypercube networks with a very large number of faulty nodes. A simple and natural condition, the local subcube-connectivity, is identified under which hypercube networks with a very large number of faulty nodes still remain connected. The condition of local subcube-connectivity can be detected and maintained in a distributed manner based on(More)
In this paper, we propose a novel active queue management algorithm PFED, which is based on network traffic prediction. The main properties of PFED are: (1) stabilizing queue length at a desirable level with consideration of future traffic, and using a MMSE (minimum mean square error) predictor to predict future network traffic; (2) imposing effective(More)
Multiprocessor job scheduling problem has become increasingly interesting, for both theoretical study and practical applications. Theoretical study of the problem has made significant progress recently, which, however, seems not to imply practical algorithms for the problem, yet. Practical algorithms have been developed only for systems with three(More)
Anycast is a new ldquoone-to-one-of-manyrdquo communication method in IPv6 networks. QoS anycast routing problem is a nonlinear combination optimization problem, which is proved to be a NP complete problem. Based on improved particle swarm optimization algorithm, an anycast routing algorithm with multiple QoS constraints is proposed. This algorithm uses a(More)
In mobile ad hoc networks (MANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Therefore,the cooperation of nodes is very important. With lack of a prior trust relationship, misbehavior caused by selfishness or malice may severely degrade the performance of the network. The cooperative security(More)
Host-based rerouting mechanism is a routing scheme that stores and forwards data in application layer. With this, users can communicate in a indirect way. Thus, identity information such as IP addresses can be effectively hidden against eavesdropper. In anonymous communication systems, such as Mixes, Onion Routing, and Crowds, this mechanism is adopted to(More)