Cover image for Computer Science Research and Technology.
Computer Science Research and Technology.
Title:
Computer Science Research and Technology.
Author:
Verdinand, Karl C.
ISBN:
9781619428225
Personal Author:
Physical Description:
1 online resource (343 pages)
Series:
Computer Science, Technology and Applications
Contents:
COMPUTER SCIENCE RESEARCH AND TECHNOLOGY -- COMPUTER SCIENCE RESEARCH AND TECHNOLOGY -- LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA -- CONTENTS -- PREFACE -- Chapter 1 MEDIUM ACCESS CONTROL PROTOCOLS IN PASSIVE OPTICAL NETWORKS BASED ON ETHERNET (EPONS) -- ABSTRACT -- 1. INTRODUCTION -- 2. ETHERNET PASSIVE OPTICAL NETWORKS -- 2.1. Introduction to Passive Optical Networks -- 2.2. EPON Standards -- 2.2.1. The EPON standard -- 2.2.1.1. The Multi-point control protocol (MPCP) in EPON networks -- 2.2.1.2. Point to Point Emulation (PtPE) and Shared Medium Emulation (SME) layers in EPON networks -- 2.2.2. The Gigabit EPON standard (10GEPON) -- 3. CONTENTION METHODS IN EPON NETWORKS -- 3.1. Time Division Multiple Access (TDMA) -- 3.1.1. Deployment of the TDMA protocol in Ethernet PONs -- 3.1.2. Dynamic Bandwidth Allocation (DBA) algorithms in Ethernet PONs -- 3.1.2.1.Centralized or offline scheduling methods in DBA algorithms -- 3.1.2.2. Polling or online scheduling methods in DBA algorithms -- 3.1.3.Quality of Service(QoS) in Ethernet PON Networks -- 3.1.3.1. Class of service (CoS)differentiation -- 3.1.3.2. Customer differentiation (service level agreement) -- 3.2. Wavelength Division Multiple Access (WDMA) -- 3.2.1. WDM-EPON deployed architectures -- 3.2.2. Dynamic bandwidth allocation (DBA) protocols in WDM-EPONS -- 4. FUTURE APPROACH: LONG-REACH PASSIVE OPTICAL NETWORKS -- 4.1. Long-Reach Architectures -- Planet SuperPON -- Long-reach PON architecture -- Long-reach PON architectures based on a ring topology -- Long-reach PON architectures based on hybrid combination DWDM-TDM -- 4.2. DBA Algorithms in Long-Reach Ethernet PON Architectures -- 5. CONCLUSION -- REFERENCES -- Chapter 2 A NON-ROUTINE PROBLEM SOLVING MECHANISM FOR A COMPREHENSIVE COGNITIVE AGENT ARCHITECTURE -- Abstract -- 1. Introduction.

2. Architectural Support for Non-routine Problem Solving -- 2.1. Perceptual Associative Memory -- 2.2. Workspace -- 2.3. Selective Attention -- 2.4. Procedural Memory -- 2.5. Action Selection -- Expectation Codelet -- Goal hierarchy and Subgoaling -- 2.6. Cognitive Cycle -- 3. Approach for Non-routine Problem Solving -- 3.1. Routine and Non-Routine Problems -- 3.2. Detecting Non-routine Problems -- 4. Non-routine Problem Solving Mechanism -- 4.1. Basis for the Mechanism -- 4.2. The Mechanism: NRPS Behavior Stream -- i. Initiate Problem Solving -- ii. Initialize Planner -- iii. Planner -- iv. Evaluate Solution -- v. Continue Search -- vi. Terminate with Failure -- vii. Terminate with Success -- NPRS Behavior Stream at Work -- 5. Conclusion -- References -- Chapter 3 SPEECH ACTS AND PROSODIC MODELING IN SERVICE-ORIENTED DIALOG SYSTEMS -- 1. Introduction -- 1.1. Specifications for Service Oriented Dialog Systems -- 1.2. The User-System Relationship and Related Parameters -- 1.3. Base Parameters of Present Analysis -- 2. Speech Acts and Dialog Structure: The Speech Act - Oriented Approach in Dialog Systems -- 2.1. Introduction -- 2.2. Relating Speech Acts and Steps in Task-Related Dialog Structure -- 3. Prosodic Modeling and Speech Acts for Task-Related Dialog -- Prosodic Emphasis and Word Category -- Language-Specific Parameters in Respect to Prosodic Emphasis, Word Category and Semantic Content -- 3.2.1. Language-Specific Parameters in Greek -- 3.2.2. Prosodic Emphasis and Word Category in Other Languages -- 4. Prosodic Modeling and Non-task-related Speech Acts in Service-Oriented Dialogs -- 4.1. Introduction -- 4.2. Defining Non-task-related Speech Acts in Dialog Structure -- 4.3. Prosodic Modeling and Non-task-related Speech Acts in Service-Oriented Applications -- 4.3.1. Introduction.

4.3.2. Prosodic Modeling and the User-System Relationship in Greek -- 4.3.3. Prosodic Modeling and the User-System Relationship in English and German -- 4.4. Language-Specific Features in Prosodic Modeling and Non-task-related Speech Acts -- 4.4.1. Introduction -- 4.4.2. The Grammatical and Lexical Parameter -- 4.4.3 The Pragmatic and Sociolinguistic Parameter -- 4.5. General Observations -- 5. Language-Specific Tone and Style -- 6. Conclusions and Further Research -- References -- Chapter 4 NCTUNS TOOL FOR IEEE 802.16J MOBILE WIMAX RELAY NETWORK SIMULATIONS -- Abstract -- 1. Introduction to IEEE 802.16j Multi-hop Relay Networks -- Transparent Mode -- Non-Transparent Mode -- 2. Introduction to NCTUns -- 2.1. Simulation Methodology -- 2.2. The Architecture of NCTUns -- I. Graphical User Interface (GUI) -- II. Simulation Engine (S.E.) -- III. Dispatcher -- IV. Coordinator -- V. Real-life Application Program -- VI. Kernel Patches -- 3. Design and Implementation of IEEE 802.16j Transparent Mode Networks over NCTUns -- 3.1. Module-Based Platform -- 3.2. Supported IEEE 802.16j Transparent Mode Network Topologies in NCTUns -- 3.3. Protocol Stacks of IEEE 802.16j Transparent Mode Networks in NCTUns -- 3.3.1. IEEE 802.16j TMR-BS Node -- 3.3.2. IEEE 802.16j T-RS Node -- 3.3.3. IEEE 802.16j T-MS Node -- 3.4. Design of IEEE 802.16j Transparent Mode Modules -- 3.4.1. MAC-Layer Module -- 3.4.2.PHY-Layer Module -- 4. Usage Examples of IEEE 802.16j Transparent Mode Network in NCTUns -- Topology Construction -- Power Setting -- Channel Setting -- QoS Setting -- Mobility Setting -- Hard Handover -- MS Path Selection Algorithm -- 5. Simulation Result Analyses and Verifications -- 5.1. Validation of Achieved throughput of Greedy UDP Flows -- 5.2. Validation of Adaptive Modulation and Coding Scheme and Channel Coding Functionality -- 6. Conclusion -- References.

Chapter 5 MOBILE MULTICAST PROTOCOLS IN WIRELESS NETWORKS -- Abstract -- I. Introduction -- II. Mobility Management Schemes -- III. Basic Multicast Support in Mobile IP -- IV. Mobile Multicast Protocols -- 1. Mobile Multicast (MoM) Protocol -- 2. Multicast by Multicast Agent (MMA) Protocol -- 3. Range-Based Mobile Multicast (RBMoM) -- 4. Timer-Based Mobile Multicast (TBMoM) -- 5. Mobile Multicast Mechanism for Fast Handovers -- V. Comparison -- VI. Conclusion -- References -- Chapter 6 ON STRONG USER AUTHENTICATION FOR REMOTE ACCESS: COMBINING AUTHENTICATION AND 3D SECURE E-COMMERCE -- Abstract -- 1. Introduction -- 2. Potential Vulnerabilities in Modern Computer Network Systems and Possible Ways to Prevent Attacks -- 3. Multilayered Security Infrastructure -- 3.1. Network Layer Security Mechanisms -- 3.2. Transport Layer Security Mechanisms -- 3.3. Application Layer Security Mechanisms -- 4. Strong User Authentication -- 5. Multiapplicative Smart Payment Cards -- 5.1. M/Chip Select 4 Payment Application for Multos -- 5.2. Mastercard CAP Application -- 6. User Authentication in 3D Secure E-Commerce Payment Model -- 7. Main Features of the Implemented PKI Solution -- 7.1. Interoperability -- 7.2. Architecture of the Implemented PKI Solution -- Certification Service -- Registration Service -- Enrolment Service -- Web Server Application -- RA Operator Application -- CA Administrator Application -- Application Programming Interface -- 8. Conclusions -- References -- Chapter 7 NEW SCALABLE VARIED DENSITY CLUSTERING ALGORITHM FOR LARGE DATASETS -- Abstract -- 1. Introduction -- 2. Related Work -- 3. The Proposed Algorithm -- A. Partitioning Stage -- B. EDBSCAN Each Partition -- C. Merging Dense Clusters -- D. Complexity Analysis -- 4. Experimental Results -- 5. Conclusion -- References.

Chapter 8 SECURE COMMUNICATION BETWEEN STB AND SMART CARD IN IPTV BROADCASTING -- Abstract -- 1. Introduction -- 2. Related Work -- 3. Review of Yoon et al.'s Protocol -- 4. The Cryptanaysis -- 5. Improved Protocol -- 6. Conclusion -- References -- Chapter9STICK-SLIPMOTIONCONTROLOFAWOOD-STICKTOOLFORLAPPINGALEDLENSMOLD -- Abstract -- 1.Introduction -- 2.DesktopOrthogonal-TypeRobot -- 3.CompliantMotionofBall-EndAbrasiveTool -- 3.1.CAD/CAM-BasedPosition/ForceControlwithWeakCouplingTechnique -- 3.2.TuningofDesiredDamping -- 3.3.Experiment -- 4.Stick-SlipMotionofBall-EndAbrasiveTool -- 4.1.Stick-SlipMotionControl -- 4.2.ExperimentofStick-SlipMotion -- 5.Conclusion -- Acknowledgments -- References -- Chapter10ATTACKINGSMARTCARDS:SIDECHANNELANDFAULTANALYSIS -- Abstract -- 1.Introduction -- 2.Preliminaries -- 2.1.AdvancedEncryptionStandard -- 2.2.RSA -- 2.3.ExponentiationAlgorithms -- 2.4.MontgomeryArithmetic -- 2.5.ChineseRemainderTheorem -- 3.SideChannelAnalysis -- 3.1.TimingAttacks -- 3.2.PowerAnalysisAttacks -- 3.2.1.SimplePowerAnalysis -- 3.2.2.DifferentialPowerAnalysis -- 3.2.3.TemplateAttacks -- 3.3.ElectromagneticAnalysis -- 3.4.Countermeasures -- 4.FaultAnalysis -- 4.1.FaultInjectionMechanisms -- 4.2.FaultsinCryptographicAlgorithms -- 4.2.1.FaultsinRSASignatureGeneration -- 4.3.Countermeasures -- 5.Conclusion -- References -- Chapter11MULTICASTTRANSPORTPROTOCOLS:REVIEWANDNEWTRENDS -- Abstract -- 1.Introduction -- 2.WorldwideMulticastTransportSolutions -- 2.1.NORMProtocolInstantiation -- 2.2.ALCProtocolInstantiation -- 3.ATailormadeMulticastTransportSolution -- 3.1.MUSTProtocol -- 3.1.1.OverallProtocolDescription -- 3.1.2.ProtocolCharacterization -- 3.1.3.ResultsDiscussion -- 3.2.eMUSTProtocol -- 3.2.1.OverallProtocolDescription -- 3.2.2.ProtocolCharacterization -- 3.2.3.ResultsDiscussion -- 4.NewAdvancedToolsforMulticastTransportProgramming.

4.1.FromTraditionalErasureCodestoFountainCodes.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: