Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Physical Sciences and Mathematics (83)
- Computer Sciences (76)
- Electrical and Computer Engineering (30)
- Digital Communications and Networking (20)
- OS and Networks (7)
-
- Computer and Systems Architecture (5)
- Mechanical Engineering (5)
- Systems and Communications (5)
- Data Storage Systems (4)
- Education (4)
- Electrical and Electronics (4)
- Electromagnetics and Photonics (4)
- Robotics (4)
- Ocean Engineering (3)
- Oceanography (3)
- Oceanography and Atmospheric Sciences and Meteorology (3)
- Optics (3)
- Other Computer Engineering (3)
- Other Electrical and Computer Engineering (3)
- Physics (3)
- Business (2)
- Databases and Information Systems (2)
- Graphics and Human Computer Interfaces (2)
- Higher Education (2)
- Psychology (2)
- Social and Behavioral Sciences (2)
- Systems Architecture (2)
- Acoustics, Dynamics, and Controls (1)
- Institution
-
- University of Texas at El Paso (43)
- Washington University in St. Louis (35)
- TÜBİTAK (13)
- Wright State University (9)
- Portland State University (7)
-
- University of South Carolina (7)
- California State University, San Bernardino (6)
- Selected Works (5)
- University of Nebraska - Lincoln (5)
- Air Force Institute of Technology (4)
- American University in Cairo (4)
- Marquette University (4)
- Singapore Management University (4)
- Edith Cowan University (3)
- Embry-Riddle Aeronautical University (3)
- New Jersey Institute of Technology (3)
- Old Dominion University (3)
- University of Dayton (3)
- Boise State University (2)
- Morehead State University (2)
- University of Nevada, Las Vegas (2)
- Cedarville University (1)
- Chapman University (1)
- Eastern Illinois University (1)
- Missouri University of Science and Technology (1)
- Munster Technological University (1)
- Nova Southeastern University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- The University of Maine (1)
- Keyword
-
- Engineering (10)
- College of Engineering and Computer Science (9)
- Computer Science (9)
- Newsletters (9)
- Science news (9)
-
- Technical writing (9)
- Computer Science and Engineering (6)
- Software agents (6)
- Fuzzy logic (5)
- Computer networks (3)
- Digital libraries (3)
- Information resources (3)
- Information retrieval (3)
- Internet (3)
- Wireless communication systems (3)
- Adaptive computing systems (2)
- Computer programs (2)
- Distributors (Commerce) (2)
- Educational technology (2)
- Electronic commerce (2)
- Fuzzy (2)
- Interval computations (2)
- Mobile communication systems (2)
- Multi-agent systems (2)
- Multimedia systems (2)
- Non-associative operations (2)
- Presented Posters and Abstracts (2)
- Probabilistic (2)
- Spread spectrum communications (2)
- Teaching -- Aids and devices (2)
- Publication
-
- Departmental Technical Reports (CS) (40)
- All Computer Science and Engineering Research (35)
- Turkish Journal of Electrical Engineering and Computer Sciences (13)
- BITs and PCs Newsletter (9)
- Faculty Publications (7)
-
- Computer Science Faculty Publications and Presentations (6)
- Theses Digitization Project (6)
- Archived Theses and Dissertations (4)
- Electrical and Computer Engineering Faculty Research and Publications (4)
- Research Collection School Of Computing and Information Systems (4)
- Theses (4)
- Theses and Dissertations (4)
- Christopher N. Roman (3)
- Computer Science Faculty Publications (3)
- Department of Electrical and Computer Engineering: Faculty Publications (3)
- Departmental Papers (CS) (3)
- Electrical and Computer Engineering Faculty Publications (3)
- Electrical and Computer Engineering Faculty Publications and Presentations (2)
- International Bulletin of Political Psychology (2)
- Masters Theses (2)
- Theses: Doctorates and Masters (2)
- CSE Conference and Workshop Papers (1)
- College of Engineering and Computing Course Catalogs (1)
- Department of Electrical and Computer Engineering: Faculty Publications (to 2015) (1)
- Dissertations and Theses (1)
- Dissertations and Theses @ UNI (1)
- ENSI Informer Magazine Archive (1)
- Electrical & Computer Engineering Faculty Research (1)
- Electrical Engineering and Computer Science - All Scholarship (1)
- Electronic Theses and Dissertations (1)
- Publication Type
Articles 121 - 150 of 178
Full-Text Articles in Computer Engineering
Gene Expression Data Analysis Using Fuzzy Logic, Robert Reynolds
Gene Expression Data Analysis Using Fuzzy Logic, Robert Reynolds
Electronic Theses and Dissertations
DNA microarray technology allows for the parallel analysis of the expression of genes in an organism. The wealth of spatio-temporal data provided by the technology allows us to attempt to reverse engineer the genetic network. Fuzzy logic has been proposed as a method of analyzing the relationships between genes as well as their corresponding proteins. Combinations of genes are entered into a fuzzy model of gene interaction and evaluated on the basis of how well the combination fits the model. Those combinations of genes that fit the model are likely to be related. However, current analysis algorithms are slow and …
Scanner Parameter Estimation Using Bilevel Scans Of Star Charts, Elisa H. Barney Smith
Scanner Parameter Estimation Using Bilevel Scans Of Star Charts, Elisa H. Barney Smith
Electrical and Computer Engineering Faculty Publications and Presentations
Scanning a high contrast image in bilevel mode results in image degradation. This is caused by two primary effects: blurring and thresholding. This paper expands on a method of estimating a joint distortion parameter, called the edge spread, from a star sector test chart in order to calculate the values of the point spread function width and binarization threshold. This theory is also described for variations in the source pattern which can represent degradations caused by repetition of the bilevel process as would be seen in printing then scanning, or in repeated photocopying. Estimation results are shown for the basic …
Fuzzy Modeling Approach For Integrated Assessments Using Cultural Theory, Adnan Yazici, Fred E. Petry, Curt Pendergraft
Fuzzy Modeling Approach For Integrated Assessments Using Cultural Theory, Adnan Yazici, Fred E. Petry, Curt Pendergraft
Turkish Journal of Electrical Engineering and Computer Sciences
It has already been noted that the accurate prediction of societal responses requires the use of a formal model based on some social or cultural taxonomy. One such taxonomic candidate is Cultural Theory (CT). CT argues that all societies, irrespective of time or place, are informed by their underlying worldviews, which must be more or less Hierarchic, more or less Individualistic, more or less Egalitarian, and more or less Fatalistic. This approach appears to have a potential for cross-temporal and spatial comparisons that makes it a particularly attractive instrument for a study of the human dimensions of global climate change. …
Design And Implementation Of An Intranet-Solution Especially With Workflow Aspects, Robert Loew
Design And Implementation Of An Intranet-Solution Especially With Workflow Aspects, Robert Loew
Theses
An Intranet support a new or simply an easier information system for all the workers within a company using internet technology. On the one hand, employees can use Web technology and very simple tools to provide and navigate information. On the other hand, the costly and time-consuming business of installing and maintaining software on local PCs can be avoided by using Browser-based Intranet applications. Ideally, it would be possible to access all forms of information processing using one and the same Web browser. This is the aim of the Intranet Project upon which this thesis is based.
Various technologies for …
System Security In An Open Lab Environment, Erik Quist
System Security In An Open Lab Environment, Erik Quist
Masters Theses
This thesis presents a system security process for computer workstations in a university open lab environment, which was developed and implemented for the Lumpkin Hall Computer Labs at Eastern Illinois University (EIU). The system security includes the use of policies and NTFS permissions, registry hacks and script files. These techniques were applied to a mixture of Windows NT 4.0 service pack 6a and Windows 2000 Professional workstations in the Lumpkin Hall Computer Labs. They were then tested for appropriate security setup using a Network Security Checksheet and a survey. The Network Security Checksheet ensured that all of the workstations were …
A Proposal For A Scalable Internet Multicast Architecture, Sherlia Shi
A Proposal For A Scalable Internet Multicast Architecture, Sherlia Shi
All Computer Science and Engineering Research
We propose a new network and system architecture for multicast in the Internet. Our main objectives are to find a cost-effective way to scale to a large number of multicast groups whose members are geographically dispersed, and to enable small and less capable devices to participate in group communications. In order to preserve the efficiency of data distribution gained by multicast, while avoiding the control complexity previously exhibited by IP multicast, we propose the use of an overlay network for multicast services. We construct "virtual" multicast trees, which consist of unicast connections joining multicast servers in the network. These servers …
Aggregated Hierarchical Multicast For Active Networks, Tilman Wolf, Sumi Y. Choi
Aggregated Hierarchical Multicast For Active Networks, Tilman Wolf, Sumi Y. Choi
All Computer Science and Engineering Research
Active Networking is the basis for a range of new and innovative applications that make use of computational resources inside network routers. One such application is Aggregated Hierarchical Multicast, which aims at implementing efficient many-to-many communication. In certain scenarios it is possible to transmit less accurate, aggregated data and thus achieve better scalability. Using Active Networks, this aggregation computation can be done transparently by network routers without end system support. We present how aggregated data streams can be structured in a hierarchical fashion to allow easy access of data at the desired aggregation level. We introduce two application examples to …
Dres: Internet Resource Management Using Deferred Reservations, Samphel Norden
Dres: Internet Resource Management Using Deferred Reservations, Samphel Norden
All Computer Science and Engineering Research
In this proposal, we consider the problem of resource reservation for Integrated Services (IntServ) and Differentiated Services (DiffServ) networks. Current approaches for resource reservation in INtegrated Service Networks adopt an all-or-nothing approach, where partially acquired resources must be released if resources are not available at all routers on the chosen path. Furthermore, under high load, end-systems must retry requests repeatedly leading to inefficient allocation and increased traffic. We propose a new approach called Deferred REServation (DERS) that substantially improves performance (reduces the overall cell rejection probability and increases link utilization) over the all-or-nothing reservation approach. Call admissibility is increased by …
Fast Incremental Crc Updates For Ip Over Atm Networks, Florian Braun, Marcel Waldvogel
Fast Incremental Crc Updates For Ip Over Atm Networks, Florian Braun, Marcel Waldvogel
All Computer Science and Engineering Research
In response to the increasing network speeds, many operations in IP routers and similar devices are being made more efficient. With the advances in other areas of packet processing, the verification and regeneration of cyclic redundancy check (CRC) codes of the data link layer is likely to become a bottleneck in the near future. In this paper, we present a mechanism to defer CRC verification without compromising reliability. This opens the possibility of incremental updates of the CRC. We introduce a new high-speed technique and present efficient implementation, speeding up CRC processing by a factor of 15. Although the paper …
A Distributed Annotation System, Robin Dowell
A Distributed Annotation System, Robin Dowell
All Computer Science and Engineering Research
One goal of any genome project is the elucidation of hte primary sequence of DNA contained within a given species. While the availability ot the primary sequence itself is valuable, it does not reach its full potential until i has been annotated. Generally defined, annotation is descriptive information or commentary added to text, in this case genomic sequence. Without a mechanism for collecting, recording, and disseminating community-based annotation, a valuable source of information is severely diminshed. In this report I outline the design and implementation of a Distributed Annotation System (DAS). DAS allowes sequence annotations to be decentralized among multiple …
Layered Protocol Wrappers For Internet Packet Processing In Reconfigurable Hardware, Florian Braun, John Lockwood, Marcel Waldvogel
Layered Protocol Wrappers For Internet Packet Processing In Reconfigurable Hardware, Florian Braun, John Lockwood, Marcel Waldvogel
All Computer Science and Engineering Research
The ongoing increases of line speed in the Internet backbone combined with the need for increased functionality of network devices presents a major challenge. These demands call for the use of reprogrammable hardware to provide the required flexible, high-speed functionality, at all network layers. The Field Programmable Port Extender (FPX) provides such an environment for development of networking components in reprogrammable hardware. We present a framework to streamline and simplify networking applications that process ATM cells, AAL5 frames, Internet Protocol (IP) packets and UDP datagrams directly in hardware.
Implementation Of An Open Multi-Service Router, Fred Kuhns, John Dehart, Ralph Keller, John Lockwood, Prashanth Papu, Jyoti Parwatikar, Ed Spitznagel, David Richard, David Taylor, Jon Turner, Ken Wong
Implementation Of An Open Multi-Service Router, Fred Kuhns, John Dehart, Ralph Keller, John Lockwood, Prashanth Papu, Jyoti Parwatikar, Ed Spitznagel, David Richard, David Taylor, Jon Turner, Ken Wong
All Computer Science and Engineering Research
This paper describes the design, implementation, and performance of an open, high-performance, dynamically reconfigurable Multi-Service Router (MSR) being developed at Washington University in St. Louis. This router provides an experimentation platform for research on protocols, router software, and hardware design, network management, quality of service and advanced applications. The MSR has been designed to be flexible, without sacrificing performance. It support gigabit links and uses a scalable architecture suitable for supporting hundreds or even thousands of links. The MSR's flexibility makes it an ideal platform for experimental research on dynamically extensible networks that implement higher level functions in direct support …
Routing In Overlay Multicast Networks, Sherlia Y. Shi, Jonathan S. Turner
Routing In Overlay Multicast Networks, Sherlia Y. Shi, Jonathan S. Turner
All Computer Science and Engineering Research
Multicast servises can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated features, and since they don't require network supoprt for multicast, they can provide multicast services, where no network layer support is available. Overlay multicast networks offer an intermediate option, potentially combining the flexibility and advanced features of application layer multicast with the greater efficiency of network layer multicast. Overlay multicast networks play an important role in the Internet. Indeed, since Internet Service Providers have been slow to enable IP multicast in their networks, Internet multicast is …
A Termination Detection Protocol For Use In Mobile Ad Hoc Networks, Gruia-Catalin Roman, Jamie Payton
A Termination Detection Protocol For Use In Mobile Ad Hoc Networks, Gruia-Catalin Roman, Jamie Payton
All Computer Science and Engineering Research
As computing devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's business world, many consider devices such as cell phones, PDAs, and laptops as essential tools. As these and other devices become increasingly independent of the wired infrastructure, new kinds of applications that assume an ad hoc network infrastructure will need to be deployed. Such a setting poses new challenges for the software developer, e.g., the lack of an established network topology, bandwidth limitations, and frequent disconnections. In this paper, we begin to explore design strategies for developing applications over ad …
Relying On Safe Distance To Ensure Consistent Group Membership In Ad Hoc Networks, Qingfeng Huang, Christine Julien, Gruia-Catalin Roman, Ali Hazemi
Relying On Safe Distance To Ensure Consistent Group Membership In Ad Hoc Networks, Qingfeng Huang, Christine Julien, Gruia-Catalin Roman, Ali Hazemi
All Computer Science and Engineering Research
The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important because they simplify both the programming and verification tasks. Essential to constructing a consitent view is the ability to know what hosts are within proximity of each other, i.e., form a group in support of the particular application. In this paper we propose a protocol that allows hosts within communication range to maintain a consistent view of the group membership despite movement and frequent disconnections. The novel features of this protocol are its …
Scheduling Processing Resources In Programmable Routers, Prashanth Pappu, Tilman Wolf
Scheduling Processing Resources In Programmable Routers, Prashanth Pappu, Tilman Wolf
All Computer Science and Engineering Research
To provide flexibility in deploying new protocols and services, general-purpose processing engines are being placed in the datapath of routers. Such network processors are typically simple RISC multiprocessors that perform forwarding and custom application processing of packets. The inherent unpredictability of execution time of arbitrary instruction code poses a significant challenge in providing QoS guarantees for data flows that compete for such processing resources in the network. However, we show that network processing workloads are highly regular and predictable. Using estimates of execution times of various applications on packets of given lengths, we provide a method for admission control and …
Scalable Ip Lookup For Programmable Routers, David E. Taylor, John W. Lockwood, Todd Sproull, David B. Parlour
Scalable Ip Lookup For Programmable Routers, David E. Taylor, John W. Lockwood, Todd Sproull, David B. Parlour
All Computer Science and Engineering Research
Continuing growth in optical link speeds places increasing demands on the performance of Internet routers, while deployment of embedded and distributed network services imposes new demands for flexibility and programmability. IP adress lookup has become a significant performance bottleneck for the highest performance routers. New commercial products utilize dedicated Content Addressable Memory (CAM) devides to achieve high lookup speeds. This paper describes an efficient, scalable lookup engine design, able to achieve high-performance with the use of a small portion of a reconfigurable logic device and a commodity Random Access Memory (RAM) device. Based on Eatherton's Tree Bitmap algorithm [1] the …
Design Of Wavelength Converting Switches For Optical Burst Switching, Jeyashankher Ramamirtham, Jonathan Turner
Design Of Wavelength Converting Switches For Optical Burst Switching, Jeyashankher Ramamirtham, Jonathan Turner
All Computer Science and Engineering Research
Optical Burst Switching (OBS) is an experimental network technology that enables the construction of very high capacity routers, using optical data paths and electronic control. In this paper, we study two designs for wavelength converting switches that are suitable for use in optical burst switching systems and evaluate their performance. Both designs use tunable lasers to implement wavelength conversion. One is strictly nonblocking design, that also requires optical crossbars. The second substitutes Wavelength Grating Routers (WGR) for the optical crossbars, reducing cost, but introducing some potential for blocking. We show how the routing problem for the WGR-based switches can be …
Efficient Queue Management For Tcp Flows, Anshul Kantawala, Jonathan Turner
Efficient Queue Management For Tcp Flows, Anshul Kantawala, Jonathan Turner
All Computer Science and Engineering Research
Packets in the Internet can experience large queueing delays during busy periods. Backbone routers are generally engineered to have large buffers, in which packets may wait as long as half a second (assuming FIFO service, longer otherwise). During congestion periods, these bufferfs may stay close to full, subjecting packets to long delays, even when the intrinsic latency of the path is relatively small. This paper studies the performance improvements that can be obtained by using more sophisticated packet schedulers, than are typical of Internet routers. The results show that the large buffers found in WAN routers ocntribute only marginally to …
Relationship Between Two Generalized Images For Discrete And Differential Camera Motions, Robert Pless
Relationship Between Two Generalized Images For Discrete And Differential Camera Motions, Robert Pless
All Computer Science and Engineering Research
The recent popularity of catadioptic and multi-camera imaging systems indicates a need to create formal models for general, non-perspective camera geometries. Development of algorithmic tools for interpreting images from a generalized camera model will lead to a better understanding of how to design camera systems for particular tasks. Here we define the corollary to epi-polar constraints for standard cameras - the relationship between two images of a scene taken by generalized cameras from viewpoints related by discrete or differential motions.
Indra: A Distributed Approach To Network Intrusion Detection And Prevention, Qi Zhang, Ramaprabhu Janakiraman
Indra: A Distributed Approach To Network Intrusion Detection And Prevention, Qi Zhang, Ramaprabhu Janakiraman
All Computer Science and Engineering Research
While advances in computer and communications technology have made the network ubiquitous, they ahve also rendered networked systems vulnerable to malicious attacks orchestrated from a distance. These attacks, usually called cracker attacks or intrusions, start with crackers infiltrating a network through a vulnerable host and then going on to launch further attacks. Crackers depend on increasingly sophisticated techniques like using distributed attack sources. On the other hand, software that guards against them remains rooted in traditional centralized techniques, presenting an easily-targetable single point of failure. Scalable, distributed network intrusion prevention software is sorely needed. We propose Indra - a distributed …
Evaluation Of Motion-Jpeg2000 For Video Processing, Wei Yu, Ruibiao Qiu, Jason Fritts
Evaluation Of Motion-Jpeg2000 For Video Processing, Wei Yu, Ruibiao Qiu, Jason Fritts
All Computer Science and Engineering Research
The new ISO/ITU-T standard for still image coding, JPEG2000, has been shown to provide superior coding efficiency to the previous standard, JPEG. Because of the superb performance of JPEG2000, it is reasonable to argue that Motion-JPEG2000, the corresponding moving picture coding standard of JPEG2000, has equally outstanding performance. However, there has not been a sufficient performance evaluation of Motion-JPEG2000. To this end, we have studied the potential of Motion-JPEG2000 for video processing. Our experiments show that Motion-JPEG2000 provides high compression performance, strong error resilience, and good perceptual image quality. Together with a rich set of features inherited from JPEG2000, Motion-JPEG2000 …
A Dynamic Programming-Based Approach To Microarray Image Comparison And Registration, Sunil Bosco Rodrigues
A Dynamic Programming-Based Approach To Microarray Image Comparison And Registration, Sunil Bosco Rodrigues
Masters Theses
"Microarray technology is increasingly used as a means of high throughput analysis of human, non-human and plant genomes. Manual methods of array production have inherent imperfections and variations of the quality of output data derived from these arrays. A dynamic programming-based approach is presented to validate the quality of such data prior to insertion into evolving databases in order to assign reliably, genetic aberrations to bio-medical functions. Dynamic programming is used for comparing normal and tumor microarray image pairs and a cost function is developed which gives a value representing the difference between the images. Quality of the image pairs …
Modal Rules Are Co-Implications, Alexander Kurz
Modal Rules Are Co-Implications, Alexander Kurz
Engineering Faculty Articles and Research
In [13], it was shown that modal logic for coalgebras dualises—concerning definability— equational logic for algebras. This paper establishes that, similarly, modal rules dualise implications:It is shown that a class of coalgebras is definable by modal rules iff it is closed under H (images) and Σ (disjoint unions). As a corollary the expressive power of rules of infinitary modal logic on Kripke frames is characterised.
Rad Module Infrastructure Of The Field-Programmable Port Extender (Fpx) Version 2.0, David E. Taylor, John W. Lockwood, Naji Naufel
Rad Module Infrastructure Of The Field-Programmable Port Extender (Fpx) Version 2.0, David E. Taylor, John W. Lockwood, Naji Naufel
All Computer Science and Engineering Research
The Field-programmable Port eXtender (FPX) provides dynamic, fast, and flexible mechanisms to process data streams at the ports of the Washington University Gigabit Switch (WUGS-20). In order to facilitate the design and implementation of portable hardware modules for the Reprogrammable Application Device (RAD) on the FPX board, infrastructure components have been developed. These components abstract application module designers from device-specific timing specifications of off-chip memory devices, as well as processing system-level control cells. This document describes the design and internal functionality of the infrastructure components and is intended as a reference for future component revisions and additions. Application module designers …
The Fpx Kcpsm Module: An Embedded, Reconfigurable Active Processing Module For The Field Programmable Port Extender (Fpx), Henry Fu, John W. Lockwood
The Fpx Kcpsm Module: An Embedded, Reconfigurable Active Processing Module For The Field Programmable Port Extender (Fpx), Henry Fu, John W. Lockwood
All Computer Science and Engineering Research
While hardware plugins are well suited for processing data with high throughput, software plugins are well suited for implementing complex control functions. A plugin module has been implemented for the FPX that executes software on an embedded soft-core processor. By including this module in an FPX design, it is possible to implement active networking functions on the FPX using both hardware and software. The KCPSM, an 8-bit microcontroller developed by Xilinx Corp., has been embedded into an FPX module. The module includes circuits to be reprogrammed over the network and to execute new programs between the processing of data packerts. …
Performance Of Deferred Reservations In Data Networks, Samphel Norden, Jonathan Turner
Performance Of Deferred Reservations In Data Networks, Samphel Norden, Jonathan Turner
All Computer Science and Engineering Research
This paper studies the performance of deferred resource reservation in data networks. Conventional resource reservation protocols, such as PNNI and RSVP adopt an all-or-nothing approach, where partially acquired resources must be released if resources are not available at all links on the chosen path. During periods of high network load, this leads users to retry requests repeatedly, adding control traffic at exactly the time when the network's capacity to process that control traffic is exhausted. Deferred REServation (DRES) can significantly improve performance by reducing the overall call rejection probability, allowing more traffic to be carried, using the same resources. Call …
Generalized Rad Module Interface Specification Of The Field-Programmable Port Extender (Fpx) Version 2.0, David E. Taylor, John W. Lockwood, Sarang Dharmapurikar
Generalized Rad Module Interface Specification Of The Field-Programmable Port Extender (Fpx) Version 2.0, David E. Taylor, John W. Lockwood, Sarang Dharmapurikar
All Computer Science and Engineering Research
The Field-programmable Port eXtender (FPX) provides dynamic, fast, and flexible mechanisms to process data streams at the ports of the Washington University Gigabit Switch (WUGS-20). By performing all computations in FPGA hardware, cells and packets can be processed at the full line speed of the transmission interface, currently 2.4 Gbits/sec. In order to design and implement portable hardware modules for the Reprogrammable Application Devide (RAD) on the FPX board, all modules should conform to a standard interface. This standard interface specifies how modules receive and transmit ATM cells of data flows, prevent data loss during reconfiguration, and access off-chip memory. …
An Efficient Quality Scalable Motion-Jpeg2000 Transmission Scheme, Ruibiao Qiu, Wei Yu
An Efficient Quality Scalable Motion-Jpeg2000 Transmission Scheme, Ruibiao Qiu, Wei Yu
All Computer Science and Engineering Research
Video application over the Internet are getting increasingly popular because of the explosive growth of the Internet. However, video packets loss due to network congestions can degrade the video quality substantially. In this paper, we propose a transmission scheme for Motion-JPEG2000. It can be implemented in an active network environment efficiently. Our simulation shows that our scheme gracefully adapts to network congestion and improves the quality of video transmission in congested IP networks.
Placing Servers For Session-Oriented Services, Sumi Choi, Yuval Shavitt
Placing Servers For Session-Oriented Services, Sumi Choi, Yuval Shavitt
All Computer Science and Engineering Research
The provisioning of dynamic forms of services is becoming the main stream of today's network. In this paper, we focus on services assisted by network servers and different forms of associated sessions. We identify two types of services: transparent, where the session is unaware of the server location, and configurable, where the sessions need to be configured to use their closest server. For both types we formalize the problem of optimally placing network servers and introduce approximated solutions. We present simulation result of approximations and heuristics. We also solve the location problem optimally for a special topology. We show, through …