Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,393)
  • Open Access


    PPP: Prefix-Based Popularity Prediction for Efficient Content Caching in Contentcentric Networks

    Jianji Ren1, Shan Zhao1, Junding Sun1, Ding Li2, Song Wang3, Zongpu Jia1

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 259-265, 2018, DOI:10.32604/csse.2018.33.259

    Abstract In the Content-Centric Networking (CCN) architecture, popular content can be cached in some intermediate network devices while being delivered, and the following requests for the cached content can be efficiently handled by the caches. Thus, how to design in-network caching is important for reducing both the traffic load and the delivery delay. In this paper, we propose a caching framework of Prefix-based Popularity Prediction (PPP) for efficient caching in CCN. PPP assigns a lifetime (in a cache) to the prefix of a name (of each cached object) based on its access history (or popularity), which is represented as a Prefix-Tree… More >

  • Open Access


    Openflow Based Dynamic Flow Scheduling with Multipath for Data Center Networks

    Haisheng Yu1, Heng Qi1, Keqiu Li1, Jianhui Zhang1,Peng Xiao2, Xun Wang1

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 251-258, 2018, DOI:10.32604/csse.2018.33.251

    Abstract The routing mechanism in Data Center networks can affect network performance and latency significantly. Hash-based method, such as ECMP (Equal-Cost Multi-Path), has been widely used in Data Center networks to fulfill the requirement of load balance. However, ECMP statically maps one flow to a path by a hash method, which results in some paths overloaded while others remain underutilized. Some dynamic flow scheduling schemes choose the most underutilized link as the next hop to better utilize the network bandwidth, while these schemes lacks of utilizing the global state of the network. To achieve high bandwidth utilization and low latency, we… More >

  • Open Access


    Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System

    Anfeng Liu1, Jie Min1, Kaoru Ota2, Ming Zhao3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 235-250, 2018, DOI:10.32604/csse.2018.33.235

    Abstract Software-Defined Networking (SDN) is a new network architecture with flexibility and scalability, researchers introduced the core idea of SDN into wireless network, and a cooperative communication system based on network coding is proposed. In this paper, we carry on an investigation in differentiated service strategy of network coding cooperative communication system. The meaning of differentiated services is for the different applications take different power for data transmission and the transmission power is associated with their reliability needs. In other words, transmission power control is performed in the presence of known reliability, we named the scheme Reliability-Bounded Transmission Power Control (RTPC)… More >

  • Open Access


    Preface of Special Issue: Future Internet

    Xiulong Liu1, Mianxiong Dong2, Xiaobo Zhou3

    Computer Systems Science and Engineering, Vol.33, No.4, pp. 233-234, 2018, DOI:10.32604/csse.2018.33.233

    Abstract This article has no abstract. More >

  • Open Access


    Integrating a Decision Tree Perspective at the Operational-Level of BPM+

    Ahmad Alomari1,∗, Alain April1, Carlos Monsalve2, Amjad Gawanmeh3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 219-227, 2018, DOI:10.32604/csse.2018.33.219

    Abstract Decision trees are among the best-known decision-making techniques and have been used extensively for both data analysis and predictive modeling. BPM+ is a novel process modeling approach that helps represent business process models in a consistent and structured way to meet different stakeholders’ process representation needs. This paper reports on the outcomes of an ontological analysis of the potential use of decision-tree representations as a new BPM+ perspective for the operational level of abstraction. This new perspective effectively demonstrates how a specialized/operational BPM stakeholder perspective can be used to improve the existing organizational business process model repository. More >

  • Open Access


    Forensic Investigation Through Data Remnants on Hadoop Big Data Storage System

    Myat Nandar Oo1, Sazia Parvin2, Thandar Thein3

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 203-217, 2018, DOI:10.32604/csse.2018.33.203

    Abstract Forensic examiners are in an uninterrupted battle with criminals in the use of Big Data technology. The underlying storage system is the main scene to trace the criminal activities. Big Data Storage System is identified as an emerging challenge to digital forensics. Thus, it requires the development of a sound methodology to investigate Big Data Storage System. Since the use of Hadoop as Big Data Storage System continues to grow rapidly, investigation process model for forensic analysis on Hadoop Storage and attached client devices is compulsory. Moreover, forensic analysis on Hadoop Big Data Storage System may take additional time without… More >

  • Open Access


    Sentiment Analysis System in Big Data Environment

    Wint Nyein Chan1, Thandar Thein2

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 187-202, 2018, DOI:10.32604/csse.2018.33.187

    Abstract Nowadays, Big Data, a large volume of both structured and unstructured data, is generated from Social Media. Social Media are powerful marketing tools and social big data can offer the business insights. The major challenge facing social big data is attaining efficient techniques to collect a large volume of social data and extract insights from the huge amount of collected data. Sentiment Analysis of social big data can provide business insights by extracting the public opinions. The traditional analytic platforms need to be scaled up for analyzing a large volume of social big data. Social data are by nature shorter… More >

  • Open Access


    A Risk Poker Based Testing Model for Scrum

    Siti Noor Hasanah Ghazali1, Siti Salwah Salim1,*, Irum Inayat2, Siti Hafizah Ab Hamid1

    Computer Systems Science and Engineering, Vol.33, No.3, pp. 169-185, 2018, DOI:10.32604/csse.2018.33.169

    Abstract In agile software development, project estimation often depends on group discussion and expert opinions. Literature claims that group discussion in risk analysis helps to identify some of the crucial issues that might affect development, testing, and implementation. However, risk prioritization often relies on individual expert judgment. Therefore, Risk Poker, a lightweight risk-based testing methodology in which risk analysis is performed through group discussion that outperforms the individual analyst’s estimation is introduced in agile methods. Keeping in view aforementioned benefits Risk Poker can offer, unfortunately, no study has been conducted to empirically prove its ability to improve the testing process to… More >

  • Open Access


    Online And Offline Scheduling Schemes to Maximize the Weighted Delivered Video Packets Towards Maritime Cpss

    Tingting Yang1, Hailong Feng1, Chengming Yang2, Ge Guo3, Tieshan Li1

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 157-164, 2018, DOI:10.32604/csse.2018.33.157

    Abstract In this paper, the online and offline scheduling schemes towards maritime Cyber Physical Systems (CPSs), to transmit video packets generating from the interior of vessel. During the sailing from the origin port to destination port, the video packets could be delivered via the infostations shoreside. The video packets have their respective release times, deadlines, weights and processing time. The video packets only could be successfully transmitted before their deadlines. A mathematic job-machine problem is mapped. Facing distinguished challenges with unique characteristics imposed in maritime scenario, we focus on the heterogeneous networking and resource optimal scheduling technology to provide valuable insights… More >

  • Open Access


    A Dynamic Online Protection Framework for Android Applications

    Junfeng Xu, Linna Zhou

    Computer Systems Science and Engineering, Vol.33, No.2, pp. 149-155, 2018, DOI:10.32604/csse.2018.33.149

    Abstract At present, Android is the most popular Operating System (OS) which is widespreadly installed on mobile phones, smart TVs and other wearable devices. Due to its overwhelming market share, Android attracts the attentions from many attackers. Reverse Engineering technology plays an important role in the field of Android security, such as cracking applications, malware analysis, software protection, etc. In order to prevent others from obtaining the real codes and tampering them, this paper designs and implements a online dynamic protection framework by deploying dynamic anti-debugging technology for Android application with comprehensive utilization of encryption, dynamic loading and shell technologies. Evaluated… More >

Displaying 1371-1380 on page 138 of 1393. Per Page