The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The scalable and massively parallel computing systems composed of many processors, which are connected on chips that will become more and more complex and unreliable. This paper presents a bio-inspired error tolerance framework and three design principles based on the Autonomous Error Tolerant (AET) architecture. A nearby error perception mechanism is carefully designed to detect faults and an initiative...
To reduce the routing overhead in routing discovery of Ad hoc On-demand Distance Vector junior routing (AODVjr) algorithm and decrease energy consumption of ZigBee network, the improved AODVjr routing algorithm based on node depth in ZigBee network is proposed. Utilizing ZigBee hierarchical structure and the node depth, the proposed algorithm sets the tree routing hops between source node and destination...
Researches on routing handover are getting more and more in recent years, which leads to several handover principles. A series of developments have been made in routing research field under a single principle. This article puts forward a new strategy ILDRHS (Improved LDRHS) based on LDRHS (Least Delay Routing Handover Strategy). The new one concentrates on the combination of connecting time, delay...
Because of lacking secure strategy, there appear a lot of security leaks and increasing security threats in SS7 network. Based on the analysis of security leaks in message handling of the network and features of those threats, the paper proposes a defense method against the counterfeit signaling network management messages. After adding service discrimination in MTP3 layer message handling, this method...
The nodes of wireless sensor networks (WSNs) should execute tasks such as sensor data acquiring, routing, data processing etc, it will cause decrease of the data transmission rate while using single-task framework. In the paper, multitask cooperation of thread pool technology is applied to WSNs. It will no only speeds up the executing efficiency of WSNs, but realizes task decoupling easily, avoids...
Interconnection network plays an important role in massively parallel systems. As a high performance switched network standard, Infiniband is widely used in MPP systems. Compared to fat-tree topology which is commonly used in Infiniband networks, mesh/torus topology can achieve better performance and scalability. This paper proposes an Infiniband-based multi-path mesh/torus interconnection network...
Concerning event-driven wireless sensor network scenario where the traffic has burst-bulk characteristic, an intra-flow network coding based opportunistic multipath routing protocol called Code Paths was proposed. A routing metric taking delay and congestion factors into account has been defined and implemented, which is used to establish gradient field from nodes to sink. When an event occurs in...
In this paper, propose a quasi-linear pattern based on expectation and variance to process the random constraints, after analyzing the essence of stochastic programming and the deficiencies of existing methods. Give a stochastic programming pattern (generalized expected value model) with good operability, and establish its corresponding generalized expected value model in stochastic vehicle routing...
Accurate searching in current structured P2P network is popular, but range query is very difficult and complex. In this paper, based on the Pastry, we propose a resources allocating mechanism for searching the objects among certain ranges in P2P network, and give the searching algorithm in detail. This mechanism does not need change the original P2P infrastructure, the algorithm is simple and easy...
Geographical source routing is a promising routing technique for VANETs, due to its adaptability for network dynamics and ability to handle topology holes. In traditional geographical source routing algorithms a best-known neighbor, typically the neighbor closest to the next junction in a greedy fashion, is designated as the next hop. This approach may cause two drawbacks: (1) the designated neighbor...
An energy-efficient event detection and dissemination (EEDD) scheme for event-driven wireless sensor networks applications is introduced. Based on clustering-based architecture, EEDD includes sensor and aggregation management, sleep and wakeup scheduling, and a customized multi-channel MAC/routing protocol with power control. Bit map based MAC approach is adapted to use not only in intra-cluster communication,...
Network routing has a direct impact on the fairness and efficiency of the whole network .In order to improve the fairness of the network, each node should take into account the choices of other nodes. In this paper, a routing algorithm was proposed on the basis of the coalitional game theory. First, different coalitions will be formed dynamically in the routing process. Then the solutions to these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.