Mobile cloud computing(MCC) combines mobile Internet and cloud computing to improve the performance of mobile applications. However, MCC faces the problem of energy efficiency because of randomly varying channels. A...Mobile cloud computing(MCC) combines mobile Internet and cloud computing to improve the performance of mobile applications. However, MCC faces the problem of energy efficiency because of randomly varying channels. A scheduling algorithm is proposed by introducing the Lyapunov optimization, which can dynamically choose users to transmit data based on queue backlog and channel statistics. The Lyapunov analysis shows that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in the channel-aware mobile cloud computing system. The simulation results verify the effectiveness of the proposed algorithm.展开更多
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s...The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.展开更多
Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of hetero...Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCWES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized.展开更多
基金supported by the National Natural Science Foundation of China(61173017)the National High Technology Research and Development Program(863 Program)(2014AA01A701)
文摘Mobile cloud computing(MCC) combines mobile Internet and cloud computing to improve the performance of mobile applications. However, MCC faces the problem of energy efficiency because of randomly varying channels. A scheduling algorithm is proposed by introducing the Lyapunov optimization, which can dynamically choose users to transmit data based on queue backlog and channel statistics. The Lyapunov analysis shows that the proposed scheduling algorithm can make a tradeoff between queue backlog and energy consumption in the channel-aware mobile cloud computing system. The simulation results verify the effectiveness of the proposed algorithm.
基金This project was supported by the National Natural Science Foundation of China (60672068)the National High Technology Development 863 Program of China (2006AA01Z436, 2007AA01Z452.)
文摘The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.
文摘Mobile agents provide a new method for the distributed computation. This paper presents the advantages of using mobile agents in a distributed virtual environment (DVE) system, and describes the architecture of heterogeneous computer's distributed virtual environment system (HCWES) designed to populate some mobile agents as well as stationary agents. Finally, the paper introduces how heterogeneous computer network communication is to be realized.