Filters








58,512 Hits in 3.8 sec

An asymmetric stream communication system

Andrew P. Black
1983 Proceedings of the ninth ACM symposium on Operating systems principles - SOSP '83  
This paper explores ~he implications of this idea in the context of an object oriented operating system.  ...  However, in a conventional operating system, the direction of control flow is the same for both input and output: the program plays the active role, while the operating system transput primitives are always  ...  The design of the Unix operating system is based on the assumption that (except for a primitive "software interrupt" facility) all programs communicate by byte-stream.  ... 
doi:10.1145/800217.806610 dblp:conf/sosp/Black83 fatcat:z26e4ymwfbh5vf4godz7y733du

An asymmetric stream communication system

Andrew P. Black
1983 ACM SIGOPS Operating Systems Review  
This paper explores ~he implications of this idea in the context of an object oriented operating system.  ...  However, in a conventional operating system, the direction of control flow is the same for both input and output: the program plays the active role, while the operating system transput primitives are always  ...  The design of the Unix operating system is based on the assumption that (except for a primitive "software interrupt" facility) all programs communicate by byte-stream.  ... 
doi:10.1145/773379.806610 fatcat:fchqgxk6jvbmlhj5advg6k7c6y

Video streaming using whitespace spectrum for vehicular applications

Tan Zhang, Sayandeep Sen, Suman Banerjee
2013 Proceeding of the 11th annual international conference on Mobile systems, applications, and services - MobiSys '13  
We present Scout, a communication system leveraging TV whitespaces to support robust and high-speed streaming services. Scout uses two key techniques to improve video performance.  ...  First, it extends network coverage through an asymmetric network architecture where whitespace transceivers are used for the downlink direction while a cellular path is used for the uplink.  ...  (i) An asymmetric design for coverage improvement: Scout communicates the downlink traffic (usually the dominant fraction) primarily over the whitespace path while sending the uplink traffic primarily  ... 
doi:10.1145/2462456.2465731 dblp:conf/mobisys/ZhangSB13 fatcat:do5ukvq5pbcnjhns2ud7jy37ce

Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks

Arif Sari, Mehmet Karay
2015 International Journal of Communications, Network and System Sciences  
Data security in the past dealth with integrity, confidentiality and ensuring authorized usage of the data and the system.  ...  Data communication between computers has brought about countless benefits to users, but the same information technologies have created a gap, a vulnerable space in the communication medium, where the data  ...  Figure 3 . 3 Asymmetric encryption. Figure 4 . 4 Block chiper: ECB mode. Figure 5 . 5 Stream chiper: simple mode (synchronous system).  ... 
doi:10.4236/ijcns.2015.813051 fatcat:onvfqdz7bjdwrnl6b6tyxx2why

High Density FTTH Network Utilizing Asymmetric Data Transmission

Tak-Chuen Luk, Ozdal Boyraz
2007 2007 Conference on Lasers and Electro-Optics (CLEO)  
A WDM-PON recycling incoming light to transmit upload stream has been proposed.  ...  Effect of Rayleigh scattering and uneven energy distribution are evaluated to achieve >60km bidirectional communication carrying 10Gb/s download and >300Mb/s upload data traffic.  ...  In Fig. 2a , the system performance for different download stream power is estimated for 2 mW maximum upload stream power values.  ... 
doi:10.1109/cleo.2007.4453459 fatcat:yi4bdsugfba2xon2fra2ed7p2a

High density FTTH network utilizing asymmetric data transmission

Tak-Chuen Luk, Ozdal Boyraz
2007 2007 Quantum Electronics and Laser Science Conference  
A WDM-PON recycling incoming light to transmit upload stream has been proposed.  ...  Effect of Rayleigh scattering and uneven energy distribution are evaluated to achieve >60km bidirectional communication carrying 10Gb/s download and >300Mb/s upload data traffic.  ...  In Fig. 2a , the system performance for different download stream power is estimated for 2 mW maximum upload stream power values.  ... 
doi:10.1109/qels.2007.4431236 fatcat:tkr56yhdyng7tfscdhdeyojh4m

A hybrid Radio Frequency and broadcast Visible Light Communication system

Michael B. Rahaim, Anna Maria Vegni, Thomas D. C. Little
2011 2011 IEEE GLOBECOM Workshops (GC Wkshps)  
In this paper we propose an indoor hybrid system that integrates WiFi and VLC luminaries.  ...  Our system utilizes (i) broadcast VLC channels to supplement RF communications and (ii) a handover mechanism between WiFi and VLC to dynamically distribute resources and optimize system throughput.  ...  We assume there is no contention on the channel and the entire WiFi capacity is available for downlink traffic; • Case 2: Utilizing an asymmetric system where all downlink traffic is communicated through  ... 
doi:10.1109/glocomw.2011.6162563 dblp:conf/globecom/RahaimVL11 fatcat:twg2ly4mgzdizo2f66deutih2e

Symmetric and Asymmetric Encryption

Gustavus J. Simmons
1979 ACM Computing Surveys  
Not only is an asymmetric encryption system one in whmh the transmitter and receiver keys are different, but in addition it Is computatmnally mfeaslble to compute at least one from the other.  ...  Asymmetric systems make it possible to authent2cate messages whose contents must be revealed to an opponent or allow a transmitter whose key has been compromised to communmate m privacy to a receiver whose  ...  An essential difference between symmetric and asymmetric cryptosystems is that one of the transmitter or receiver keys can be compromised in the asymmetric system with some secure communications still  ... 
doi:10.1145/356789.356793 fatcat:dueqqh5tn5frfnm5hkjbqzazdy

Page 191 of The Astrophysical Journal Vol. 62, Issue 3 [page]

1925 The Astrophysical Journal  
their original paths, to such an extent that they may, at least for a long time, be counted as members of the local system.  ...  This gets special support by the flagrant fact that the line combining the true vertices of the two star-streams is almost exactly at right angles to the direction of the asymmetrical drift of the high-velocity  ... 

Supporting MapReduce on large-scale asymmetric multi-core clusters

M. Mustafa Rafique, Benjamin Rose, Ali R. Butt, Dimitrios S. Nikolopoulos
2009 ACM SIGOPS Operating Systems Review  
Our contributions are: An exploration of various design alternatives for hybrid asymmetric clusters of AMPs and GPPs; the adoption of a streaming approach to supporting MapReduce computations on clusters  ...  In these settings, scheduling, communication and I/O are managed by generalpurpose processors (GPPs), while computation is off-loaded to AMPs.  ...  choices for data streaming and processing and their impact on overall system performance of asymmetric cluster architectures; • A runtime technique for regulating data distribution and streaming in MapReduce  ... 
doi:10.1145/1531793.1531800 fatcat:vux7diouknfshbka5dyfxnlaue

A Robust Satellite Imagery On-Board Security System

2018 Journal of the ACS Advances in Computer Science  
This done by developing a software using encryption code impeded on raspberry pi as a complete system.  ...  There is a great demand of satellite image security system for providing secure storage and transmission of satellite images.  ...  [12] Stream cipher A stream cipher is an encryption algorithm that encrypts 1 bit or byte of plaintext at a time. It uses an infinite stream of pseudorandom bits as the key.  ... 
doi:10.21608/asc.2018.158383 fatcat:lddkybk3f5hhpmytbis54j2iri

An Augmented Level of Security for Bluetooth Devices Controlled by Smart Phones and Ubiquitous Handheld Gadgets

Soham Sengupta, Partha pratim Sarkar
2015 International Journal of Information Engineering and Electronic Business  
The section [2.3] below describes an Asymmetric Cryptography approach.  ...  Asymmetric cryptographic approach.  ...  An Augmented Level of Security for Bluetooth Devices Controlled by Smart Phones and Ubiquitous 3.  ... 
doi:10.5815/ijieeb.2015.04.08 fatcat:e6ye2rrlxrenbf3fm7j4zxphhq

A New Method for Authentication Based on Covert Channel [chapter]

Yanan Sun, Xiaohong Guan, Ting Liu
2011 Lecture Notes in Computer Science  
Specifically, by manipulating the inter-packet delays, we implement a prototype system for authentication and embed the authentication tag within the packet intervals based on network covert channel.  ...  In this paper, we put forward a new method which utilize the communication channel, not the content, as the data carrier, and guarantee the validation of the user's identity during the common data transmission  ...  Our future work is focus on evaluat ing the performance of the proposed system and further analyzing the difference of the traffic stream between legal and covert communication.  ... 
doi:10.1007/978-3-642-24403-2_13 fatcat:pn5u6xz2gze4dbhsubf5noyisi

Filter design with optimized numbers of data streams for multi-pair two-way relaying under asymmetric rate requirements

Holger Degenhardt, Anja Klein
2012 2012 International ITG Workshop on Smart Antennas (WSA)  
The bidirectional communications between the nodes are supported by an intermediate nonregenerative multi-antenna relay station.  ...  To maximize the achievable sum rate under asymmetric rate requirements, a strategy to optimize the number of simultaneously transmitted data streams of each node is presented.  ...  SYSTEM MODEL As shown in Figure 1 , K pairwise bidirectional communications via an intermediate multi-antenna relay station RS of 2K multi-antenna half-duplex nodes are considered.  ... 
doi:10.1109/wsa.2012.6181223 dblp:conf/wsa/Degenhardt012 fatcat:nhh7h4n4c5bbtmuinl5dvs77ay

CellMR: A framework for supporting mapreduce on asymmetric cell-based clusters

M.M. Rafique, B. Rose, A.R. Butt, D.S. Nikolopoulos
2009 2009 IEEE International Symposium on Parallel & Distributed Processing  
We present CellMR, an efficient and scalable implementation of the MapReduce framework for asymmetric Cell-based clusters.  ...  slices the input into small work units and streams them to the asymmetric nodes for efficient processing.  ...  acceleratortype compute nodes; • An exploration of alternative design choices for data streaming and processing and their impact on overall system performance on asymmetric architectures; • A runtime  ... 
doi:10.1109/ipdps.2009.5161062 dblp:conf/ipps/RafiqueRBN09 fatcat:lnuviocd35hl5bclk2lloykwnm
« Previous Showing results 1 — 15 out of 58,512 results