Search For:

Displaying 1-8 out of 8 total
A Cross-Layer Design-Based Power-Saving Mechanism for IEEE 802.16e
Found in: Computer Science and Information Engineering, World Congress on
By Jianbin Xue, AiHua Zhang, Zhanting Yuan, Jie Cao, Qiuyu Zhang
Issue Date:April 2009
pp. 520-523
To enhance power efficiency of battery powered wireless access devices, the behaviors of the mobile stations (MS) working in the sleep mode operation in IEEE 802.16e was researched with a method of the Markov chain model. By exploring the relationship amon...
Grid Resource Discovery Model Based on Improved Architecture and Multicast
Found in: Grid and Cloud Computing, International Conference on
By Qiuyu Zhang, Zan Qiao, Zhanting Yuan
Issue Date:August 2009
pp. 427-429
In order to solve the shortcomings of traditional resource discovery mechanism. Many sophisticated strategies are implemented to ensure that the grid resource discovery service has good scalability and efficiency. Nodes are divided into different domains, ...
A Traffic-Aware Adaptive Sleep Mode Operation for IEEE 802.16e Based WiMAX
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jianbin Xue, Zhanting Yuan, Heiyan Chen, Aihua Zhang, Weitao Xu
Issue Date:April 2009
pp. 304-307
To enhance the energy efficiency of broadband wireless access devices based on battery power, a traffic-aware based adaptive sleep mode operation was proposed for IEEE 802.16e power saving mechanism. By analyzing the behaviors of a mobile station working i...
Double Starlike Graphs with Largest and Second Largest Degree Difference 2 Determined by Their Laplacian Spectrum
Found in: Computer Science and Information Engineering, World Congress on
By Pengli Lu, Zhanting Yuan
Issue Date:April 2009
pp. 26-29
In this paper, the double star like graphs $T(p,n,p-2)$, which is coalesced from two stars $K_{1,p}$ and $K_{1,p-2}$ by identifying the center of $K_{1,p}$ with one end of a path $P_n$ and the center of $K_{1,p-2}$ with the other end of $P_n$, is determine...
Distributed Storage and Retrieve of Similar Images in P2P System
Found in: Information Science and Engieering, International Symposium on
By Jianshe Dong, Peng Liu, Zhanting Yuan
Issue Date:December 2008
pp. 286-289
With rapidly increasing of images that should to be stored and retrieved, it is prospected to introduce the distributed storage in content based image retrieve (CBIR). P2P systems being researched widely for it can offer scalable, wide-area lookup services...
Construction of a Dynamic Trust Ontology Model
Found in: Computational Intelligence and Security, International Conference on
By Qiuyu Zhang, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan
Issue Date:December 2008
pp. 394-398
Ontology, which is a conceptional model to describe conceptions and the relationships of conceptions, originates from philosophy, is not only static but also dynamic. In PKI, static characteristics of trust model which based on CA can not satisfy dynamic c...
A Novel Anti-spamSchemefor Image-Based Email
Found in: Data, Privacy, and E-Commerce, International Symposium on
By Jianshe Dong, Zhanting Yuan, Qiuyu Zhang, Yufeng Zheng
Issue Date:November 2007
pp. 520-522
Spam has become a serious problem not only to the Internet but also to society. In past years, researchers studied the problem mainly on textual features. As the content of spam removing from text-only to multimedia-enriched, the existing text-based spam f...
A Multicast Routing Algorithm Based on Improved Annealing Mechanics in Transiently Chaotic Neural Network
Found in: Intelligent Systems Design and Applications, International Conference on
By Guangbin Bao, Zhanting Yuan, Jian Song, Yong Yu, Xinming Xie
Issue Date:October 2006
pp. 207-210
Multicast routing service is becoming a key requirement of computer networks in supporting multimedia applications. And multicast routing problem has been demonstrated technically as a NP-complete. This paper analyzes the dynamic characteristics of transie...