The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the containment control problem for discrete-time high-order multi-agent systems with time-varying delays. Based on the distributed containment control protocol only depends on the agent's own information and its neighbors' partial information, the properties of the product of infinite nonnegative matrices and the composite of binary relation are utilized to derive a necessary...
The containment control problem for general discrete-time second-order multi-agent systems is investigated in this paper. Based on a distributed containment control algorithm with the state gain parameters in a given range, we transform the system to an equivalent error system, and then analyze the convergence of the error system by the eigenvalues of the corresponding coefficient matrix. Finally,...
The fault rate of on-load tap-changer (OLTC) has always been in a high level, and that is exactly the primary reason of transformer faults. As a result, an on-line detection method of OLTC was proposed. The embedded platform and wireless sensor network (WSN) technology was introduced into the on-line detection system. WSN was used to obtain OLTC status information. The embedded platform software,...
Datacenter networks are commonly structured with hierarchical topologies in which multipaths are provided to create redundant paths between end-to-end servers. Without a dedicated flow control mechanism, different sizes of traffic flows are statically allocated to links without sensing the current link utilization, which can result in transient network congestion that impacts on the latency experienced...
Why are some people more creative than others? How do human brain networks evolve over time? A key stepping stone to both mysteries and many more is to compare weighted brain networks. In contrast to networks arising from other application domains, the brain network exhibits its own characteristics (e.g., high density, indistinguishability), which makes any off-the-shelf data mining algorithm as well...
Modern cloud-based applications are becoming more communication-intensive, posing a challenge for data centers to supply sufficient bandwidth. Current data centers are not optimized for such cloud-based software services. In practice, due to the variability of traffic load, data centers may suffer from lower throughput, as well as higher latency, dramatically reducing quality of service (QoS). This...
Visually mining a large influence graph is appealing yet challenging. Existing summarization methods enhance the visualization with blocked views, but have adverse effect on the latent influence structure. How can we visually summarize a large graph to maximize influence flows? In particular, how can we illustrate the impact of an individual node through the summarization? Can we maintain the appealing...
With the fast growth of Internet traffic, wireless access networks are facing a big challenge to provide even higher bandwidth to users, which requires upgrading wireless backhauls. In this paper, we consider optimal topology planning for microwave-based wireless backhaul networks. Considering a range of constraints such as avoidances of microwave link crosses, small angles between neighbouring links,...
In this paper we propose and analyze a localized backbone renovating algorithm (LBR) to renovate a broken backbone in the network. This research is motivated by the problem of virtual backbone maintenance in wireless ad hoc and sensor networks, where the coverage area of nodes are disks with identical radii. According to our theoretical analysis, the proposed algorithm has the ability to renovate...
Diagnosing a large-scale sensor network is a crucial but challenging task. Particular challenges include the resource and bandwidth constraints on sensor nodes, the spatiotemporally dynamic network behaviors, and the lack of accurate models to understand such behaviors in a hostile environment. In this paper, we present the Sensor Anomaly Visualization Engine (SAVE), a system that fully leverages...
In the maintenance of communication networks, nodes often need to be rebooted or brought off line for software updates, configuration updates or hardware maintenance. ISPs often run the same protocols and use equipment from the same vendor network-wide, increasing the probability that a maintenance window will be network wide. Some of the updates can be critical where we have to update fast, for example,...
New technological advances in large-scale protein-protein interaction (PPI) detection provide researchers a valuable source for elucidating the bimolecular mechanism in the cell. In this paper, we investigate the problem of protein complex detection from noisy protein interaction data, i.e., finding the subsets of proteins that are closely coupled via protein interactions. Many people try to solve...
In this paper, we describe a path-based intrinsic monitoring protocol that can efficiently associate SNMP based MIB information to a network path within a single administrative domain. Our method is based on intrinsic monitoring, a lightweight metric collection protocol that makes use of the IPv6 Router Alert hop-by-hop option. The main advantage of our approach is that operators can rapidly associate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.