The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IEEE 802.16 mesh mode supports two scheduling mechanisms, namely centralized scheduling and distributed scheduling. Centralized scheduling is based on a routing tree to offer centralized control. As we will show, the structure of the routing tree has a significant impact on the system performance. In this paper, we propose a routing tree construction scheme for centralized scheduling to fully...
The emergence of multi -processor, multi-threaded architectures (referred to as multi-* architectures) facilitates the design of high-throughput request processing systems (e.g., multiservice routers for GENI, intrusion detection systems, graphics and gaming systems, as well as high-throughput web servers and transaction processing systems). Because of the challenges in programming such architectures,...
The blocking performance of limited-reconflgurable all-optical networks is investigated in this paper. Reconfigurability is achieved by reconflgurable optical add-drop multiplexers (ROADMs) and tunable transponders. An analytical model is developed adopting a share-per-node model for the sharing of transponders within a reconfigurable node. The set of wavelengths that can be added/dropped at a reconfigurable...
The virtualization of I/O presents new challenges to the already formidable problem of network scalability for servers. The basic problem being addressed is that a finite set of networking resources within a server need to be shared among a number of guest virtual machines, and these network resources need to scale in order to satisfy the aggregate network throughput requirements of those guest virtual...
Error-correcting codes based on quasigroup transformations are proposed. For the proposed codes, similar to recursive convolutional codes, the correlation exists between any two bits of a codeword, which can have infinite length, theoretically. However, in contrast to convolutional codes, the proposed codes are nonlinear and almost random: for codewords with large enough length, the distribution of...
Packet buffers in a smart network interface card are managed in a way to reduce any packet losses from high-speed burst incoming data. Currently, two types of packet buffer management techniques are used. They are static buffer management and dynamic buffer management techniques. Dynamic buffer management techniques are more efficient than the static ones because they change the threshold value according...
Wireless mesh networks (WMNs) are becoming well-known as a new broadband Internet access technology through multihop transmission nowadays. With the tremendous popularity of the group communication, such as Push-to-Talk service, the need to deliver the traffic of push-to-talk over WMNs is becoming important. Since the push-to-talk traffic over WMNs is delay-sensitive traffic, a proactive routing protocol...
Distributed sensor system applications (e.g., wireless sensor networks) have been studied extensively in recent years. Such applications involve resource-limited embedded sensor nodes that communicate with each other through self-organizing protocols. Depending on application requirements, distributed sensor system design may include protocol and prototype implementation. Prototype implementation...
As the technology underlying sensor networks becomes more advanced and reliable, ubiquitous computing will come closer to being a reality. This paper details the design and deployment of several sensor nodes that use the delay tolerant network approach in order to meet the relevant application requirements. Two applications are presented, lake water quality monitoring in rural lakes and noise level...
By using personal information in a pervasive computing environment, context-aware applications can provide appropriate services for people. This personal information is often involved in personal privacy. In order to protect personal privacy concerns about personal information, privacy role is proposed to control access personal information. We also construct an information system about the privacy...
When both TCP Vegas and TCP Reno share the same wired network, TCP Reno dominates and obtains most of the bandwidth due to its more aggressive mechanisms. In this paper, a simulation study of the compatibility of TCP Reno and TCP Vegas in wireless IEEE 802.11 ad hoc networks using both static and mobile network configurations, is presented. It is shown that when both coexist in the same static ad...
Wireless mesh networks (WMNs) have emerged as a key technology for the next-generation wireless networking. Due to infrequent topology change and unreliable wireless links, a fundamental problem arisen is how to form an optimal topology to meet the traffic requirement. In this paper, we propose a joint optimization design on topology formation and traffic routing, which is formulated as a linear binary...
Existing routing protocols for wireless ad hoc networks assume a homogeneous network with either omnidirectional antennas or smart (beamforming) antennas. However it is possible to have a heterogeneous network with each node either using an omnidirectional antenna or a smart antenna. We investigate the routing and MAC layer issues that arise in such heterogeneous networks. We extend the expected number...
In large scale mobile gaming environments, efficient mechanisms for state update is crucial to allow graceful real-time interaction of a large number of players, under limited wireless network bandwidth. By using the state updating threshold as a key parameter that bridges the resulting state inconsistency (or distortion) and the network traffic, we are able to model the fundamental traffic-distortion...
This paper studies the energy consumption of frame slotted Aloha (FSA) based anti-collision protocols. Specifically, we investigate twelve FSA variants using a detailed qualitative and quantitative methodology to evaluate their energy efficiency with varying tag population. Our results show that the variant that adjusts its frame size in accordance with tag population and incorporates the muting and...
Discovering Web services using keyword-based search techniques offered by existing UDDI APIs (i.e. Inquiry API) may not yield results that are tailored to clients' needs. When discovering Web services, clients look for those that meet their requirements, primarily the overall functionality and quality of service (QoS). Standards such as UDDI, WSDL, and SOAP have the potential of providing QoS-aware...
Video streaming applications have gained in popularity in recent years. The quality of service offered by such applications is limited by the available transmission rates as well as time-varying conditions, such as, channel fading and network congestion, which lead to packet losses. Scalable video coding techniques that allow for the flexible adaptation of temporal resolution as well as quality of...
Many multipath routing protocols proposed to date have used destination sequence numbers to provide multiple loop-free paths to destinations. We present the first on-demand multipath routing protocol for ad hoc networks that uses source sequence numbers to maintain loop-free routes. We propose a novel load-balancing scheme that incurs very little control overhead. Extensive simulations illustrate...
Mobile sink has been adopted by many schemes for lifetime improvement in wireless sensor networks. It is necessary to propagate the topological or location changes caused by the sink movement across the network for successful data delivery. However, previous studies on using mobile sink either assume that some global information of the network is already available or let the mobile sink convey the...
This paper investigates a user attention model based on the visual rhythm analysis for automatically determining the region-of-interest (ROI) in a video. The visual rhythm, an abstraction of a video, is a thumbnail version of a fully video by a 2D image that captures the temporal information of a video sequence. Four sampling lines, including diagonal, anti-diagonal, vertical and horizontal lines,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.