4 resultados para Distributed mobility management
em DigitalCommons@University of Nebraska - Lincoln
Resumo:
Centralized and Distributed methods are two connection management schemes in wavelength convertible optical networks. In the earlier work, the centralized scheme is said to have lower network blocking probability than the distributed one. Hence, much of the previous work in connection management has focused on the comparison of different algorithms in only distributed scheme or in only centralized scheme. However, we believe that the network blocking probability of these two connection management schemes depends, to a great extent, on the network traffic patterns and reservation times. Our simulation results reveal that the performance improvement (in terms of blocking probability) of centralized method over distributed method is inversely proportional to the ratio of average connection interarrival time to reservation time. After that ratio increases beyond a threshold, those two connection management schemes yield almost the same blocking probability under the same network load. In this paper, we review the working procedure of distributed and centralized schemes, discuss the tradeoff between them, compare these two methods under different network traffic patterns via simulation and give our conclusion based on the simulation data.
Resumo:
Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We introduce three specific cryptography based hierarchical schemes, which can effectively enforce and implement access control and are designed for distributed environments because they do not need the presence of a central authority (except perhaps for set- UP).
Resumo:
In the mid-1820s, Anglo-American fur trappers, known as "mountain men," entered Arizona and began trapping beaver (Castor canadensis). In Arizona there have been a number of famous mountain men such as Sylvester and James Pattie, Ewing Young, Jededia Smith, and Bill Williams who trapped along the waterways in northern and southern Arizona. Although the heyday of mountain men lasted only a few decades due to a population decline of beaver, management of these animals continues to this day. The purpose of managing beavers shifted from monetary gain to controlling wildlife damage. During the late 1900s, beaver were still widely distributed in limited numbers throughout much of the state. We provide a historical overview of beaver management in Arizona with emphasis on the mountain men, recreational trapping, wildlife damage management, and beaver research in Arizona.
Resumo:
This NebGuide describes the life cycle of the army cutworm and pale western cutworm, and provides recommendations for management.The army cutworm, Euxoa auxiliaris, and the pale western cutworm, Agrotis orthogonia, are sporadic pests that are distributed throughout the Great Plains. The army cutworm can be found throughout Nebraska, but is more common in the western half of the state. Because of the drier environment, the pale western cutworm is found only in the western third of Nebraska. Both cutworms can feed on a vast array of crops and weeds. Their major economic impact is limited to winter wheat and alfalfa, because these are the vulnerable crops growing in the early spring when larval feeding activity occurs. However, they can also cause substantial damage to early spring row crops (sugarbeets and corn), especially in areas where winter cereal cover crops are used.