The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The occurrence of multiple holes in wireless sensor networks poses many challenges in designing routing protocols. The traditional scheme is forwarding packets along the hole perimeters. However, this scheme leads to two serious problems: data concentration around the hole boundaries and routing path enlargement Recently, several approaches have been proposed to address these two problems, wherein...
In wireless network system the resources are limited. Therefore, managing resources is considered as a challenging task. The resource are distributed among attached UEs, so allocating resources needs to be well controlled. Packet scheduler in LTE network is responsible for assigning resources to attached UEs. Also, femtocell network is considered as promising solution for poor channel in indoor environment...
Over the years the number of elements in a corporate network, the services and the amount of traffic have grown significantly. For this reason, it is increasingly important to analyze the traffic. Packet-based analysis is the traditional option but entails a high resources consumption. In order to palliate this, flow-based analysis arises. It usually implies to deploy a flow exporter, responsible...
Recent distributed key-value data stores, such as Aerospike are getting the momentum with ever-increasing need for large-scale real-time data processing. While these data stores can provide significantly improved performance, they still struggle to meet Quality of Service (QoS) during workload surges. In this paper, we address the problem of QoS-aware resource allocation for burst workloads in key-value...
Video content makes up more than half of the world's Internet traffic, and this figure is expected to grow rapidly. New techniques that remove traffic redundancy have been shown to significantly improve network performance since many concurrent streams deliver the same video. These techniques employ smart routers that recognize duplicated video streams and merge them to reduce traffic redundancy....
Video streaming is an important service provided by surveillance systems to enhance situation awareness. However, in military systems, data acquisition heavily depends on the network infrastructure. In this application domain, units are spread and the distance between the sources of data and the decision makers may be very large. In the case of video streaming, the demand for high network throughput...
Software-Defined Infrastructure (SDI) is a resource sharing infrastructure that embraces the concept of separation of the network control plane from its data plane, and software realization of network functions from the underlying hardware appliances through the virtualization technology in emerging infrastructures such as Cloud, Network Function Virtualization (NFV), and Software-Defined Networking...
The cloud manufacturing yields insights of manufacturing services over cyber space based on integration of advanced manufacturing with cloud computing. However, the different communication standards between the different system levels are main challenges for the integration of them without a conflicting communication. Ethernet appears as the best solution to support all levels for industrial manufacturing...
In this paper, we study the influence from the sentiment of regular tweets on retweeting. We propose a method to calculate the sentiment score for each tweet and each Twitter user. This method enables us to place the tweets and retweets into the same time period to explore the sentiment factor. We adopt the correlation coefficient between the sentiment scores of regular tweets and those of retweets...
Internet of Things (IoT) is characterized by heterogeneous devices that interact with each other on a collaborative basis to fulfill a common goal. In this scenario, some of the deployed devices are expected to be constrained in terms of memory usage, power consumption and processing resources. To address the specific properties and constraints of such networks, a complete stack of standardized protocols...
This paper introduces a study of the fog computing suitability assessment as a solution for the increasing demand of the IoT devices. In particular, we focus on the energy consumption and the Quality of Service (QoS) as two important metrics of the performance of the fog. Therefore, we present a modeling of these two metrics in the fog. Then, we express the problem as constrained optimization and...
Cloud computing has enabled many applications to dynamically accommodate their resources in response to variations in their workloads. Elastic scaling is implemented mostly via reactive techniques that are slow to respond and may induce service degradation during the adaptation period. To avoid those pitfalls, proactive techniques have emerged as an alternative. However, these are typically limited...
Virtual Machine (VM) consolidation in the cloud has received significant research interest. A large body of approaches for VM consolidation in data centers resort to variants of the bin packing problem which tries to minimize the number of deployed physical machines while meeting the Service-Level-Agreement (SLA) constraints. In this paper we introduce the concept of workload delay as a Quality-of-Service...
Nowadays, cloud computing has emerged as the most popular computing platform due to its ability to reduce the operating costs. A sizable chunk of the operating costs is composed of power consumption of the cloud data center alone. It has been observed that improperly sized virtual machines result in comparatively higher power consumption. Although efforts have been made to address the issue of high...
In this paper, we examine the possibility to utilize the well-known approximations of Jaccard metric in order to reduce computational complexity of Edit Distance metric estimation. The scope of our analytical results is the representing strings rather than the original (raw) textual data, still in practice we obtained a solid indication that the results can be applied to (raw) strings that have low...
Blockchain's ever increasing size has become a major problem. Bitcoin [7], for example, has grown to 115120 MB as of May 2017, which is roughly 115 GB. This uncontrollable growth of the Blockchain is bound to become an issue in the future, as hard disks may become too small to store the entire Blockchain history and traversing the transactions databases may become increasingly slow. Already, there...
A simple network model with torus topology and the virtual cut-through routing have been considered in order to find out and analyze certain relationships that can be used as a starting point for a deeper theoretical analysis and further research. An expression for the saturation point (message generation rate at which network saturates) and approximate expressions for the latency as a function of...
Road Side Units (RSUs) within the connected vehicle infrastructure are vulnerable to security and access control challenges. RSUs may share resources with unreliable SPs that could lead to information leakage due to an insecure messaging infrastructure. To mitigate these concerns, we introduce an automated service provision mechanism that enables a controlled messaging infrastructure using a Distributed...
Online advertisers, third party trackers and analytics services are constantly tracking user activities as they access web services through their web browsers or mobile apps. While, web browser plugins disabling and blocking Ads (often associated tracking/analytics scripts), e.g. AdBlock Plus[3] have been well studied and are relatively well understood, an emerging new category of apps in the tracking...
Cryptocurrency and blockchain technologies are recently gaining wide adoption since the introduction of Bitcoin, being distributed, authority-free, and secure. Proof of Work (PoW) is at the heart of blockchain's security, asset generation, and maintenance. Although simple and secure, a hash-based PoW like Bitcoin's puzzle is often referred to as “useless”, and the used intensive computations are considered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.