The continuous-time MIGI1 queue with vacations has been studied by many researchers. In the paper the authors report on an investigation of the discrete-time M/G/l queue using Little's formula and conditional expectation. This direct approach can also be adopted to study the continuous-time case.
For a Kautz network with f d t y components wepropose a distributed fdt-tolerant routing scheme, called DFTR, in which each noonfauty node knows no more than t k condition @its links and adjacent &. We construct a rooted wee for a given destination in t k Kautz network, and use it to develop DFTR such that a f d t y component will never be encountered more than once. In DFTR, each no& is attempting to route a message via the shortest path. I f a node on the path detects a faulty no& at the next hop, a best alternative path for routing the message around the faulty component is to be obtained. A best alternah've path is first generated by the reduced concatenation of this node and t k &stination, and then is checked to make sure that it does not contain any of encountered faulty nodes. I f it does, a new alternative path is generated as before. We invent an e&ient approach in the ckcking step to reduce computational time. With slight modification, DFTR may adapt to de Bruijn n e w r h [ 3 ] as well.
In the next generation mobile telecommunications, any third party that provides wireless data services (e.g., mobile banking) must have its own solution for end-to-end security. Existing mobile security mechanisms are based on public-key cryptosystem. The main concern in a public-key setting is the authenticity of the public key. This issue can be resolved by identity-based (ID-based) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper proposes an efficient IDbased encryption algorithm. We actually implement the ID-based encryption schemes and compare the performance to show the advantage of our approach. Our study indicates that our solution outperforms a previously proposed algorithm by 20 -35%.Index Terms-End-to-end security, identity-based cryptography, mobile banking, public key.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.