Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleJuly 2015
Relocation routing for energy balancing in mobile sensor networks
Wireless Communications & Mobile Computing (WCMC), Volume 15, Issue 10Pages 1418–1432https://doi.org/10.1002/wcm.2410Wireless sensor networksWSNs have been widely investigated in the past decades because of its applicability in various extreme environments. As sensors use battery, most works on WSNs focus on energy efficiency issuese.g., local energy balancing ...
- ArticleOctober 2012
Research on security management in active network node operating systems
WISM'12: Proceedings of the 2012 international conference on Web Information Systems and MiningPages 254–263https://doi.org/10.1007/978-3-642-33469-6_35This paper analyzes the security requirements and problems with which active nodes are confronted, and proposes a general security management subsystem in Active Network NodeOS. The subsystem implements through four functions: resource management, hop-...
- articleSeptember 2011
Toward in vivo nanoscale communication networks: utilizing an active network architecture
Frontiers of Computer Science in China (SPFCSC), Volume 5, Issue 3Pages 316–326https://doi.org/10.1007/s11704-011-0116-9A safe and reliable in vivo nanoscale communication network will be of great benefit for medical diagnosis and monitoring as well as medical implant communication. This review article provides a brief introduction to nanoscale and molecular networking ...
- ArticleJune 2010
Formulating State Equations of RLCM Active Network over F(z)
ICECE '10: Proceedings of the 2010 International Conference on Electrical and Control EngineeringPages 3771–3774https://doi.org/10.1109/iCECE.2010.920The state equations of RLCM active network over F(z) are formulated in this paper by analyzing the topologic structure and the cut-set matrix Ql. The computer programming of the state equations is considered and Purslow's conclusion of the state ...
- ArticleNovember 2009
Side Effect Prediction Using Cooperative Pathways
BIBM '09: Proceedings of the 2009 IEEE International Conference on Bioinformatics and BiomedicinePages 142–147https://doi.org/10.1109/BIBM.2009.26Drugs and biological experiments are designed to affect a particular target gene or pathway. However, they might inadvertently activate other pathways and cause side effects.Because of the existence of complex cellular mechanisms responding to stimuli,...
-
- ArticleMarch 2009
Traffic Engineering Based Attack Detection in Active Networks
ICDCN '09: Proceedings of the 10th International Conference on Distributed Computing and NetworkingPages 181–186https://doi.org/10.1007/978-3-540-92295-7_22Distributed denial of service attacks are the serious candidates for traffic analysis next to traffic performance evaluation. As these threats deplete the network resources rapidly particularly link parameters, modeling these attacks provide a strong ...
- ArticleJanuary 2009
An Intelligent Mobile IP Routing Algorithm Based on the Active Network
CMC '09: Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 02Pages 253–258https://doi.org/10.1109/CMC.2009.180This paper aims at solving the following two problems about the standard Mobile IP protocol: the reduction of network payload throughput and the packets loss when plenty of mobile nodes move between domains frequently. The paper puts forward an ...
- articleMarch 2007
A sufficient condition of controllability of RLCM active networks over F(z): Research Articles
This paper defines the separability of an RLCM active network and finds a sufficient condition that the active network is controllable and observable over F(z) if its passive network is controllable and observable over F(z). So the controllability (...
- articleAugust 2006
Using active networks technology for dynamic QoS
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 50, Issue 11Pages 1692–1709https://doi.org/10.1016/j.comnet.2005.06.017We propose a dynamic QoS, or D-QoS, model where QoS settings can be automatically reconfigured based upon requests from authorized users. Different levels of privilege can be assigned to users enabling higher privileged users to interrupt the network ...
- articleMarch 2006
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics
Journal of Network and Systems Management (JNSM), Volume 14, Issue 1Pages 69–80https://doi.org/10.1007/s10922-005-9016-3This paper describes an approach to detecting distributed denial of service (DDoS) attacks that is based on fundamentals of Information Theory, specifically Kolmogorov Complexity. A theorem derived using principles of Kolmogorov Complexity states that ...
- ArticleFebruary 2006
Just in time Entertainment Deployment on Mobile Platforms
Managing the deployment of Games on mobile phones can be really complex. Developers have to create multiple versions of the applications, even if they write it in Java. There is thus a need for generic tools to help programmers in the task of building ...
- articleJanuary 2006
NANA: A nano-scale active network architecture
ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 2, Issue 1Pages 1–30https://doi.org/10.1145/1126257.1126258This article explores the architectural challenges introduced by emerging bottom-up fabrication of nanoelectronic circuits. The specific nanotechnology we explore proposes patterned DNA nanostructures as a scaffold for the placement and interconnection ...
- articleSeptember 2005
Efficient Packet Distribution Scheme in Cluster-Based Active Router
IEICE - Transactions on Information and Systems (TROIS), Volume E88-D, Issue 9Pages 2201–2204https://doi.org/10.1093/ietisy/e88-d.9.2201An active network has the advantage of being able to accept new protocols quickly and easily. The cluster-based active router can provide sufficient computing power for customized computations. In the router architecture, load balancing is achieved by ...
- ArticleFebruary 2005
Active Network Support for Deployment of Java-Based Games on Mobile Platforms
DFMA '05: Proceedings of the First International Conference on Distributed Frameworks for Multimedia ApplicationsPages 88–95https://doi.org/10.1109/DFMA.2005.10Active Networks are a promising way to develop new services for data transport. Network programmable nodes can propose high level services by processing "on the fly" streams of data. In this paper, we describe how to use an active network solution to ...
- articleFebruary 2004
Active security management based on secure zone cooperation
Future Generation Computer Systems (FGCS), Volume 20, Issue 2Pages 283–293https://doi.org/10.1016/S0167-739X(03)00144-4Due to its open protocol, the Internet has revolutionized computer networks, but this revolution brings new risks and threats. The best way to protect computer networks is to prevent attackers from intruding, using fast automated procedures. However, ...
- articleJanuary 2004
Configurable Network Processing for Mobile Agents on the Internet
Cluster Computing (KLU-CLUS), Volume 7, Issue 1Pages 73–83https://doi.org/10.1023/B:CLUS.0000003947.03930.24This paper presents a framework for building and deploying protocols for migrating mobile agents over the Internet. The framework enables network protocols for agent migration to be naturally implemented within mobile agents and then dynamically ...
- ArticleOctober 2003
Analysis for Active Network Security Abased on Pi-Calculus Model
In order to search and analysis the threat model of active network, we hope to present a kind of strict and mathematic model analysis for active network security.We use the \pi-calculusto analyze the security relation of active network components and ...
- ArticleAugust 2002
Dynamic service extensibility through programmable network
There has been a tremendous interest in making the current Internet architecture capable of supporting diverse requirements for emerging value-added service-oriented applications such as bandwidth on-demand, multimedia teleconference and telemedicine. ...
- articleFebruary 2002
- ArticleJanuary 2002
Design and Evaluation of Dynamic Protocol Selection Architecture for Reliable Multicast
IP multicast is an effective technology on the one-to-many and many-to-many communications. Multicast applications use UDP(User Datagram Protocol) for transport protocol and have the responsibility for reliable communications. Then it is difficult to ...