Zhejiang Normal University

Displaying 1-8 of 8 results

  • White Papers // Mar 2013

    Distributed Optimal Rate-Reliability-Lifetime Tradeoff in Wireless Sensor Networks

    The transmission rate, delivery reliability and network lifetime are three fundamental but conflicting design objectives in energy-constrained Wireless Sensor Networks. In this paper, the authors address the optimal rate-reliability-lifetime tradeoff with link capacity constraint, reliability constraint and energy constraint. By introducing the weight parameters, they combine the objectives at rate,...

    Provided By Zhejiang Normal University

  • White Papers // Sep 2011

    An ECK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security

    In this paper, the authors investigate the two-pass (one round) authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) model with perfect forward security against active adversary. Currently, there exist no authenticated key exchange protocols which are provably secure in the eCK model and meanwhile achieve perfect forward security against...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    Analysis and Research of Two-Level Scheduling Profile for Open Real-Time System

    In an open real-time system environment, the coexistence of different kinds of real-time and non real-time applications makes the system scheduling mechanism face new requirements and challenges. One two-level scheduling scheme of the open real-time systems is introduced, and points out that hard and soft real-time applications are scheduled non-distinctively...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    Research on the Survivability of Embedded Real-Time System

    Introducing survivability into Embedded Real-Time System (ERTS) can improve the survivability power of the system. This paper mainly discusses about the survivability of ERTS. The first is the survivability origin of ERTS. The second is survivability analysis. According to the definition of survivability based on survivability specification and division of...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    An Empirical Examination on Mobile Services Adoption in Rural China

    Whilst most of current studies on mobile services are based on urban users, this paper focuses on users living in rural China. Considering colossal urban-rural differences in life-style in developing countries, such as India and China, the research in this regard would offer some fresh insights for both practitioners and...

    Provided By Zhejiang Normal University

  • White Papers // Aug 2010

    Segmentation for Eyed Typhoon Cloud Image by Curvature and Fractal Feature

    An efficient method to segment eyed typhoon from a satellite cloud image is proposed. First, original satellite cloud image is enhanced by gray transform. Second, in order to reduce the computation burden to segment the whole satellite cloud image, single threshold segmentation based on Bezier histogram is implemented to the...

    Provided By Zhejiang Normal University

  • White Papers // Jun 2009

    Scheduling for Non-Real Time Applications of ORTS Based on Two-Level Scheduling Scheme

    In an open real-time system, the coexistence of different kinds of real-time and non real-time applications makes the system scheduling mechanism face new requirements and challenges. One two-level scheduling scheme of the open real-time systems was introduced. Through analysis, the authors find that the scheduling strategy for non real-time applications...

    Provided By Zhejiang Normal University

  • White Papers // Oct 2008

    On Load Balancing Model for Cluster Computers

    Recently, cluster computers become a viable and less expensive alternative to multiprocessor systems. However, a serious difficulty in concurrent programming of a cluster computer system is how to deal with scheduling and load balancing of such a system which may consist of heterogeneous computers. Based on the four-tuple DLBM (Dynamic...

    Provided By Zhejiang Normal University

  • White Papers // Sep 2011

    An ECK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security

    In this paper, the authors investigate the two-pass (one round) authenticated key exchange protocol in the enhanced Canetti-Krawczyk (eCK) model with perfect forward security against active adversary. Currently, there exist no authenticated key exchange protocols which are provably secure in the eCK model and meanwhile achieve perfect forward security against...

    Provided By Zhejiang Normal University

  • White Papers // Mar 2013

    Distributed Optimal Rate-Reliability-Lifetime Tradeoff in Wireless Sensor Networks

    The transmission rate, delivery reliability and network lifetime are three fundamental but conflicting design objectives in energy-constrained Wireless Sensor Networks. In this paper, the authors address the optimal rate-reliability-lifetime tradeoff with link capacity constraint, reliability constraint and energy constraint. By introducing the weight parameters, they combine the objectives at rate,...

    Provided By Zhejiang Normal University

  • White Papers // Oct 2008

    On Load Balancing Model for Cluster Computers

    Recently, cluster computers become a viable and less expensive alternative to multiprocessor systems. However, a serious difficulty in concurrent programming of a cluster computer system is how to deal with scheduling and load balancing of such a system which may consist of heterogeneous computers. Based on the four-tuple DLBM (Dynamic...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    Research on the Survivability of Embedded Real-Time System

    Introducing survivability into Embedded Real-Time System (ERTS) can improve the survivability power of the system. This paper mainly discusses about the survivability of ERTS. The first is the survivability origin of ERTS. The second is survivability analysis. According to the definition of survivability based on survivability specification and division of...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    Analysis and Research of Two-Level Scheduling Profile for Open Real-Time System

    In an open real-time system environment, the coexistence of different kinds of real-time and non real-time applications makes the system scheduling mechanism face new requirements and challenges. One two-level scheduling scheme of the open real-time systems is introduced, and points out that hard and soft real-time applications are scheduled non-distinctively...

    Provided By Zhejiang Normal University

  • White Papers // Jun 2009

    Scheduling for Non-Real Time Applications of ORTS Based on Two-Level Scheduling Scheme

    In an open real-time system, the coexistence of different kinds of real-time and non real-time applications makes the system scheduling mechanism face new requirements and challenges. One two-level scheduling scheme of the open real-time systems was introduced. Through analysis, the authors find that the scheduling strategy for non real-time applications...

    Provided By Zhejiang Normal University

  • White Papers // Jan 2011

    An Empirical Examination on Mobile Services Adoption in Rural China

    Whilst most of current studies on mobile services are based on urban users, this paper focuses on users living in rural China. Considering colossal urban-rural differences in life-style in developing countries, such as India and China, the research in this regard would offer some fresh insights for both practitioners and...

    Provided By Zhejiang Normal University

  • White Papers // Aug 2010

    Segmentation for Eyed Typhoon Cloud Image by Curvature and Fractal Feature

    An efficient method to segment eyed typhoon from a satellite cloud image is proposed. First, original satellite cloud image is enhanced by gray transform. Second, in order to reduce the computation burden to segment the whole satellite cloud image, single threshold segmentation based on Bezier histogram is implemented to the...

    Provided By Zhejiang Normal University