A Novel Approach for Multiple Resource Allocation In WWW
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 12
Abstract
With the rapid growth of the Web, clients attempting to access some popular Web sites are experiencing slow response times due to server load and network congestion. In the paper we are proposing a method for trusted resource allocation in which all the web site objects are viewed as resources, and they are allocated to those who have the access rights, depends on the availability of resources. Each resource is assigned with ‘n’ number of tokens if it could be allocated to the ‘n’ number of users simultaneously without any sacrifice in performance. The resource availability is checked by the maximum capacity of that resource. The access rights are identified by the Access matrix which determines the rights of the clients about one particular object. . The clients are classified and each category of the clients is given different access right. This can be more useful in billing the usage of the valuable resources on a web based applications. The website could be viewed as trusted system where those who have access can only use the resources. This method ensures all the user requests are processed with in some deadlines.
Authors and Affiliations
Y. K. Viswanadham, Dr. M. V. L. N. Rajarao
Design of Built-in Self-Repair Strategy with Selectable Redundancy for Embedded SRAM
The main strategy of this project is to design a fault diagnoses system for detection and repair of any permanent failures or faults in the embedded read only memories. Built-In Self-Repair (BISR) with redundancy is...
Design of On-line Interactive Data Acquisition and Control System for Embedded Applications
In various Internet applications based on the client/server architecture, it is better to use embedded WEB server other than PC server for decreasing volume, cost and power consumption. The paper introduces the desig...
Securing a Network by Modeling and Containment of Worms Using Preference Scanning
Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...
To Enable Base Station To Obtain The ‘True’ Estimate Of The Aggregate In The Presence Of The Attack
The sensor nodes appearance a multi-hop network as the base station (BS) proceeds as the central point of control. Wireless sensor networks used in different kinds of applications like Forest monitoring, weather fore...
A Novel Strategy to Maximize the modulation index Under Unbalanced DC Sources
In this paper a new NVM (Neutral modulation method) technique has been proposed to achieve balanced output in the multilevel cascaded inverter (MLCI) operating under unbalanced DC conditions. In order to examine thes...