A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that...A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is and the overall performance is excellent.展开更多
The modernization of water conservancy project management is a complicated engineering system involving a management system, a management method, management personnel, the exertion of social, economic, and ecological ...The modernization of water conservancy project management is a complicated engineering system involving a management system, a management method, management personnel, the exertion of social, economic, and ecological effects, and so on. However, indices for evaluating the modernization of water conservancy project management are usually unobtainable in practical applications. Conducting appropriate extension of the classical rough set theory and then applying it to an incomplete information system are the key to the application of the rough set theory Based on analysis of some extended rough set models in incomplete information systems, a rough set model based on the θ-improved limited tolerance relation is put forward. At the same time, upper approximation and lower approximation are defined under this improved relation. According to the evaluation index system and management practices, the threshold for θ is defined. An example study indicates the practicability and maneuverability of the model.展开更多
Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely R...Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.展开更多
In the case study in Agricultural Area of Tibet, the process and characteristics of farmers' land use were surveyed by semi-structural interview questionnaire. By comparing the change of land covers and farmers...In the case study in Agricultural Area of Tibet, the process and characteristics of farmers' land use were surveyed by semi-structural interview questionnaire. By comparing the change of land covers and farmers' land decision in two periods, the spatial connection of them was obtained. And the relations among farmers' land decision, land use change and environment were examined by calculating emergy and value flow. The results show that: hunting the maximal profits is the primary aim of farmers' land decision; farmers' land decision is incompatible with sustainable land use presently; farmers' land decision and land cover can be embodied spatially by each other; the change of farmers' land decision can be monitored by observing the change of land cover, and the sustainability of farmers' land decision can be appraised by calculating emergy and value flow.展开更多
To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission...To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission error is much different from congestion control. The paper analyzes the side effect of RTT estimation while making the TCP source to handle congestion and wireless error losses properly. Then present a strategy using information feedback by the last hop acknowledgement and monitoring the queuing level of the wired bottleneck link by calculating the changes in transmission delay along the path. With the identification of the early stage of congestion, it can respond to wired congestion quickly while keeping wireless link more reliable, and make TCP react to the different packets losses more appropriately.展开更多
Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and u...Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and use, cluster fault location and maintenance, resource pool grouping, and construction and application of heterogeneous virtualization platforms. In the area of distributed technology, distributed file system and KeyNalue storage engine are discussed. A solution is proposed for the host bottleneck problem, and a standard storage interface is proposed for the distributed file system. A directory-based storage scheme for Key/Value storage engine is also proposed.展开更多
文摘A new collusion attack on Pour-like schemes is proposed in this paper. Then, we present a collusion-free centralized multicast key management scheme based on characteristic values of members. The re-keying method that other group members calculate new keys when a member is joining or leaving is also designed. It achieves forward secrecy and backward secrecy. Compared with typical existing centralized schemes, the storage of Group Key Controller (GKC) in our scheme halves the storage overhead of others, and communication overhead of GKC is 2 in case of joining re-keying. Especially, the leaving re-keying overhead is and the overall performance is excellent.
基金supported by the Fundamental Research Funds for the Central Universities(Grant No.2013B102008)the Open Fund of the Yellow River Committee(Grant No.2011535012)
文摘The modernization of water conservancy project management is a complicated engineering system involving a management system, a management method, management personnel, the exertion of social, economic, and ecological effects, and so on. However, indices for evaluating the modernization of water conservancy project management are usually unobtainable in practical applications. Conducting appropriate extension of the classical rough set theory and then applying it to an incomplete information system are the key to the application of the rough set theory Based on analysis of some extended rough set models in incomplete information systems, a rough set model based on the θ-improved limited tolerance relation is put forward. At the same time, upper approximation and lower approximation are defined under this improved relation. According to the evaluation index system and management practices, the threshold for θ is defined. An example study indicates the practicability and maneuverability of the model.
基金the National Natural Science Foundation of China(60132030)and the National Education Department Doctorial Foundation Project(RFDP1999048602)
文摘Improving the Quality of Service (QoS) of Internet traffic is widely recognized as a critical issue for the next-generation networks. In this paper, we present a new algorithm for the active queue management, namely RED-DTB. This buffer control technique is used to enforce approximate fairness among a large number of concurrent Internet flows. Like RED (Random Early Detection) algorithm, the RED-DTB mechanism can be deployed to actively respond to the gateway congestion, keep the gateway in a healthy state, and protect the fragile flows from being stolen bandwidth by greedy ones. The algorithm is based on the so-called Dual Token Bucket (DTB) pattern. That is, on the one hand, every flow is rate-limited by its own token bucket, to ensure that it can not consume more than its fair share of bandwidth; On the other hand, to make some compensations to less aggressive flows, such as connections with larger round trip time or smaller sending window, and to gain a relatively higher system utilization coefficient, all flows, depending on their individual behavior, may have a chance to fetch tokens from the public token bucket when they run out of their own share of tokens. The algorithm is analyzed and evaluated by simulations, and is proved to be effective in protecting the gateway buffer and controlling the fair allocation of bandwidth among flows.
文摘In the case study in Agricultural Area of Tibet, the process and characteristics of farmers' land use were surveyed by semi-structural interview questionnaire. By comparing the change of land covers and farmers' land decision in two periods, the spatial connection of them was obtained. And the relations among farmers' land decision, land use change and environment were examined by calculating emergy and value flow. The results show that: hunting the maximal profits is the primary aim of farmers' land decision; farmers' land decision is incompatible with sustainable land use presently; farmers' land decision and land cover can be embodied spatially by each other; the change of farmers' land decision can be monitored by observing the change of land cover, and the sustainability of farmers' land decision can be appraised by calculating emergy and value flow.
文摘To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission error is much different from congestion control. The paper analyzes the side effect of RTT estimation while making the TCP source to handle congestion and wireless error losses properly. Then present a strategy using information feedback by the last hop acknowledgement and monitoring the queuing level of the wired bottleneck link by calculating the changes in transmission delay along the path. With the identification of the early stage of congestion, it can respond to wired congestion quickly while keeping wireless link more reliable, and make TCP react to the different packets losses more appropriately.
文摘Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and use, cluster fault location and maintenance, resource pool grouping, and construction and application of heterogeneous virtualization platforms. In the area of distributed technology, distributed file system and KeyNalue storage engine are discussed. A solution is proposed for the host bottleneck problem, and a standard storage interface is proposed for the distributed file system. A directory-based storage scheme for Key/Value storage engine is also proposed.