首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
To provide a secure traversal service, firewalls need more than static packet filtering and application-level proxies. SOCKS (Secure sOCKets) is an application-independent transport-level proxy that offers user-level authentification and data encryption. An extended SOCKS UDP (user datagram protocol) binding model with appropriate socket calls is proposed to provide complete support for UDP-based multimedia streaming applications  相似文献   

2.
Multimedia Tools and Applications - Through the rapid evolution of information technology, there are many innovative services and products bring a lot of convenience for people especially...  相似文献   

3.
In nowadays World Wide Web topology, it is not difficult to find the presence of proxy servers. They reduce network traffic through the cut down of repetitive information. However, traditional proxy server does not support multimedia streaming. One of the reasons is that general scheduling strategy adopted by most of the traditional proxy servers does not provide real-time support to multimedia services. Based on the concept of contractual scheduling, we have developed a proxy server that supports real-time multimedia applications. Moreover, we developed the group scheduling mechanism to enable processing power transfer between tasks that can hardly be achieved by traditional schedulers. They result in a substantially improved performance particularly when both time-constrained and non-time-constrained processes coexist within the proxy server. In this paper, the design and implementation of this proxy server and the proposed scheduler are detailed. Wai-Kong Cheuk received the B.Eng. (Hons.) and M. Phil. degrees in 1996 and 2001, respectively, from the Hong Kong Polytechnic University, where he is currently pursuing the Ph.D. degree. His main research interests include distributed operating systems and video streaming. Tai-Chiu Hsung (M'93) received the B.Eng. (Hons.) and Ph.D. degrees in electronic and information engineering in 1993 and 1998, respectively, from the Hong Kong Polytechnic University, Hong Kong. In 1999, he joined the Hong Kong Polytechnic University as a Research Fellow. His research interests include wavelet theory and applications, tomography, and fast algorithms. Dr. Hsung is also a member of IEE. Daniel Pak-Kong Lun (M'91) received his B.Sc. (Hons.) degree from the University of Essex, Essex, U.K., and the Ph.D. degree from the Hong Kong Polytechnic University, Hung Hom, Hong Kong, in 1988 and 1991, respectively. He is currently an Associate Professor and the Associate Head of the Department of Electronic and Information Engineering, the Hong Kong Polytechnic University. His research interests include digital signal processing, wavelets, multimedia technology, and Internet technology. Dr. Lun was the Secretary, Treasurer, Vice-Chairman, and Chairman of the IEEE Hong Kong Chapter of Signal Processing in 1994, 1995–1996, 1997–1998, 1999–2000, respectively. He was the Finance Chair of 2003 IEEE International Conference on Acoustics, Speech and Signal Processing, held in Hong Kong, in April 2003. He is a Chartered Engineer and a Corporate member of the IEE.  相似文献   

4.
The design and implementation of a secure auction service   总被引:1,自引:0,他引:1  
We present the design and implementation of a distributed service for performing sealed bid auctions. This service provides an interface by which clients, or “bidders”, can issue secret bids to the service for an advertised auction. Once the bidding period has ended, the auction service opens the bids, determines the winning bid, and provides the winning bidder with a ticket for claiming the item bid upon. Using novel cryptographic techniques, the service is constructed to provide strong protection for both the auction house and correct bidders, despite the malicious behavior of any number of bidders and fewer than one third of the servers comprising the auction service. Specifically, it is guaranteed that: bids of correct bidders are not revealed until after the bidding period has ended; the auction house collects payment for the winning bid; losing bidders forfeit no money; and only the winning bidder can collect the item bid upon. We also discuss techniques to enable anonymous bidding  相似文献   

5.
6.
Parametric types offer an attractive solution to the problems of dealing with arrays in Pascal. These problems arise from the use of strong, static type checking, especially of array-type procedure arguments. Parametric types provide solutions both for the array procedure argument problem and allow the consistent inclusion of arrays with dynamic bounds. A parametric type mechanism is proposed and design issues are discussed. The inclusion of parametric types has major effects on the implementation of a language like Pascal. The implementation issues and implementation versus design tradeoffs are examined. The implementation strategy used can be extended to accommodate the standard and generic types in Ada.  相似文献   

7.
Mobile cloud is not just a traditional cloud, but a concept of virtualization that has expanded into mobile technology. It provides access to the data created and used by a user and content service by cloud platform. A feature of mobile cloud is supported that is the convenience of multimedia content sharing by mobile devices. However, there is a problem of inaccuracy of information retrieval in the process of sharing as well as personal information leakage and service inability status due to the malicious access to the mobile terminal in the retrieval process. This paper suggests the model to which the protective technique of multimedia content retrieval & access in mobile cloud is applied. The model stores and manages the individually different forms of content, and constructs the multimedia ontology in order to enhance the reliability in mismatched problems occurring in the retrieval process, and also suggests the response technique to security vulnerability occurring in the content access.  相似文献   

8.
This paper presents SEAS, the Secure E-voting Applet System, a protocol for implementing a secure system for polling over computer networks, usable in distributed organizations whose members may range up to dozens of thousands. We consider an architecture requiring the minimum number of servers involved in the validation and voting phases. Sensus, [Cranor L, Cytron RK. Sensor: a security-conscious electronic polling system for the internet. In: Proceedings of HICSS'97. IEEE; 1997. p. 561–70], a well-known e-voting protocol, requires only two servers, namely a validator and a tallier. Even if satisfying most of the security requirements of an e-voting system, Sensus suffers from a vulnerability that allows one of the entities involved in the election process to cast its own votes in place of those that abstain from the vote. SEAS is a portable and flexible system that preserves the limited number of servers of Sensus, but it avoids the mentioned vulnerability. We propose a prototype implementation of SEAS based on Java applet and XML technology.  相似文献   

9.
Tan  Yongjie  Qin  Jie 《Multimedia Tools and Applications》2020,79(3-4):1625-1640
Multimedia Tools and Applications - Reversible image watermarking algorithm is an important branch of information hiding, which can protect the integrity of data. Therefore, it is of great...  相似文献   

10.
As the Internet has become a more central aspect for information technology, so have concerns with supplying enough bandwidth and serving web requests to end users in an appropriate time frame. Web caching was introduced in the 1990s to help decrease network traffic, lessen user perceived lag, and reduce loads on origin servers by storing copies of web objects on servers closer to end users as opposed to forwarding all requests to the origin servers. Since web caches have limited space, web caches must effectively decide which objects are worth caching or replacing for other objects. This problem is known as cache replacement. We used neural networks to solve this problem and proposed the Neural Network Proxy Cache Replacement (NNPCR) method. The goal of this research is to implement NNPCR in a real environment like Squid proxy server. In order to do so, we propose an improved strategy of NNPCR referred to as NNPCR-2. We show how the improved model can be trained with up to twelve times more data and gain a 5–10% increase in Correct Classification Ratio (CCR) than NNPCR. We implemented NNPCR-2 in Squid proxy server and compared it with four other cache replacement strategies. In this paper, we use 84 times more data than NNPCR was tested against and present exhaustive test results for NNPCR-2 with different trace files and neural network structures. Our results demonstrate that NNPCR-2 made important, balanced decisions in relation to the hit rate and byte hit rate; the two performance metrics most commonly used to measure the performance of web proxy caches.  相似文献   

11.
In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing provides a new conceptualization of the uses of reflections for various applications. We describe the fundamental technical components of such systems and illustrate the technical challenges in two different forms of electronic mirror systems for apparel shopping. The first example, the Responsive Mirror, is an intelligent video capture and access system for clothes shopping in physical stores that provides personalized asynchronous reflections of clothing items through an implicitly controlled human–computer interface. The Responsive Mirror employs computer vision and machine learning techniques to interpret the visual cues of the shopper’s behavior from cameras to then display two different reflections of the shopper on digital displays: (1) the shopper in previously worn clothing with matching pose and orientation and (2) other people in similar and dissimilar shirts with matching pose and orientation. The second example system is a Countertop Responsive Mirror that differs from the first in that the images do not respond to the real-time movement of the shopper but to frames in a recorded video so that the motion of the shopper in the different recordings are matched non-sequentially. These instantiations of the mirror systems in fitting room and jewelry shopping scenarios are described, focusing on the system architecture and the intelligent computer vision components. The effectiveness of Responsive Mirror is demonstrated by the user study. The paper contributes a conceptualization of reflection and examples of systems illustrating new applications in multimedia systems that break traditional reflective synchronies.  相似文献   

12.
《微型机与应用》2015,(10):35-37
为了实现基于Android手机平台的音频会话和图像上传,设计了一个基于Android手机的多媒体应用软件。首先介绍了Android端的多媒体发展趋势,然后介绍了如何设计并实现在手机端的VOIP以及利用FTP协议上传图像。测试结果表明,用户可以通过软件客户端与PC客户端进行音频会话,并有良好的通话体验,登录FTP服务器可以查看到通过软件上传的图像。  相似文献   

13.
针对通用的课件开发工具在化学教学领域中个性化、可视化方面的不足,提出了一种基于可视化文档和数据库技术开发“个性化多媒体化学课件”的新思路,并通过对其个性化和可视化特征的分析,重点介绍了这一开发工具的结构和功能。给出了利用Borland C Builder的VCL组件实现可视化的方法。  相似文献   

14.
15.
As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module.  相似文献   

16.
Proxy mobile IPv6 (PMIPv6) is a network-based mobility management protocol that improves performance in terms of handover latency, signaling cost, and packet loss compared to host-based mobility management protocols. However, still packet loss occurs during the handover of the mobile node (MN). Several attempts have been made to improve the reliability of PMIPv6 service by proposing schemes in which packets are buffered in network entities during the handover of the MN to prevent packet loss, and performance improvement has been demonstrated via simulations. So far, there have been no implementations of buffering functions in the literature. This paper addresses design of buffering function and its implementation to prevent packet loss, and demonstrates the results. We have implemented a PMIPv6 testbed based on open source resources. We discuss the functional and performance enhancements, comparing PMIPv6 with the buffering implemented and standard PMIPv6. We also propose an improved buffering function where the packet forwarding rate of the buffer is adjusted. The results through the testbed show that the buffering function in PMIPv6 effectively prevents packet loss during the handover of the MN. We have found out that we can manage the amount of packets in the buffer without further increment by adjusting the packet forwarding rate of the buffer as well.  相似文献   

17.
Implementation of a design pattern can take many forms according to the programming language being used. Most of the literature presents design patterns in their conventional object-oriented implementations. Several other studies show the implementation in aspect-oriented languages such as AspectJ, EOS, and Caesar. In this work, we compare the implementation of three design patterns: singleton, observer, and decorator design patterns in these languages and also discuss the possibility of implementing them in ParaAJ: an extension to the AspectJ language that implements the idea of parametric aspects. We found that ParaAJ helps in making the implementation of the singleton and observer patterns reusable but it fails to help in the decorator case. The problem with the decorator pattern exists because of the current translation mechanism of ParaAJ׳s aspects to normal AspectJ׳s aspects. This opens the door for further work in ParaAJ to better support the idea of parametric aspects.  相似文献   

18.
Son  Siwoon  Im  Hyeonseung  Moon  Yang-Sae 《The Journal of supercomputing》2021,77(10):11353-11389
The Journal of Supercomputing - Distributed stream processing engines (DSPEs) provide stream partitioning methods for distributing messages to tasks deployed in the distributed environment for...  相似文献   

19.
This note deals with controller robustification using equivalent observer based structure. The purpose of the method is to improve the parametric robustness of an initial controller, synthesized, for example, by using the LQ,H/sub /spl infin//, or /spl mu/ technique. The method uses equivalent Luenberger observer formulation and multimodel design procedure for the parametric robustification. First, the initial controller is put under equivalent observer structure. Second, from this observer-based formulation, the controller is reshaped to increase the parametric robustness without paying attention to the closed-loop poles coming from the controller dynamics. Note that during this step, changes in the controller initial performances are minimized. Another advantage of the equivalent observer based formulation lies with the fact that it could directly be used to schedule the controller (dynamic and feedback parts). Finally, the global method (equivalent observer plus robustification) is applied on the robust control of the space shuttle described in /spl mu/-analysis and synthesis toolbox.  相似文献   

20.
Multimedia Tools and Applications - Secure reversible watermarking schemes are essential for image authentication and tamper detection in medical, military and government applications. In this...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号