A Novel Approach for Multiple Resource Allocation In WWW
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
With the rapid growth of the Web, clients attempting to access some popular Web sites are experiencing slow response times due to server load and network congestion. In the paper we are proposing a method for trusted resource allocation in which all the web site objects are viewed as resources, and they are allocated to those who have the access rights, depends on the availability of resources. Each resource is assigned with ānā number of tokens if it could be allocated to the ānā number of users simultaneously without any sacrifice in performance. The resource availability is checked by the maximum capacity of that resource. The access rights are identified by the Access matrix which determines the rights of the clients about one particular object. . The clients are classified and each category of the clients is given different access right. This can be more useful in billing the usage of the valuable resources on a web based applications. The website could be viewed as trusted system where those who have access can only use the resources. This method ensures all the user requests are processed with in some deadlines.
Authors and Affiliations
Y. K. Viswanadham, Dr. M. V. L. N. Rajarao
Tone Reservation Technique Based Clipping and Filtering Method for PAPR Reduction by Scaling Residual noise
OFDM is an extinguishly used next-generation wireless transmission technique because of its easy equalization. OFDM can send over hundreds of parallel data streams via multiple carriers which makes the possibility of...
Extraction of Frequent Subgraph from Graph Database
Graphs are promising abstraction of complex structured and semi-structured data. Graph mining techniques extract, analyze and summarize significant and useful information from the graph databases. Finding frequent su...
Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography
In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applica...
Classification of Questions in Micro-blogging Environment Using Support Vector Machine
Micro-blogging has attracted a growing body of scholarships, because of its popularization. While the use of blogs has spread to a variety of contexts, such as academic research, business and education studies sugges...
Pseudo Random Number Generator Using Reseeding Module
In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which t...