The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Datacenter networks are commonly structured with hierarchical topologies in which multipaths are provided to create redundant paths between end-to-end servers. Without a dedicated flow control mechanism, different sizes of traffic flows are statically allocated to links without sensing the current link utilization, which can result in transient network congestion that impacts on the latency experienced...
Wireless backhaul networks provide vital infrastructure support for large public and private networks, and their efficient design is essential for smoothly handling the rapid growth of the Internet traffic. For its efficient capacity utilization, a well-planned topology would be crucial for such networks. Existing studies on planning for wireless backhaul network topologies have mostly focused on...
Why are some people more creative than others? How do human brain networks evolve over time? A key stepping stone to both mysteries and many more is to compare weighted brain networks. In contrast to networks arising from other application domains, the brain network exhibits its own characteristics (e.g., high density, indistinguishability), which makes any off-the-shelf data mining algorithm as well...
With the fast growth of Internet traffic, wireless access networks are facing a big challenge to provide even higher bandwidth to users, which requires upgrading wireless backhauls. In this paper, we consider optimal topology planning for microwave-based wireless backhaul networks. Considering a range of constraints such as avoidances of microwave link crosses, small angles between neighbouring links,...
In this paper we propose and analyze a localized backbone renovating algorithm (LBR) to renovate a broken backbone in the network. This research is motivated by the problem of virtual backbone maintenance in wireless ad hoc and sensor networks, where the coverage area of nodes are disks with identical radii. According to our theoretical analysis, the proposed algorithm has the ability to renovate...
Diagnosing a large-scale sensor network is a crucial but challenging task. Particular challenges include the resource and bandwidth constraints on sensor nodes, the spatiotemporally dynamic network behaviors, and the lack of accurate models to understand such behaviors in a hostile environment. In this paper, we present the Sensor Anomaly Visualization Engine (SAVE), a system that fully leverages...
In the maintenance of communication networks, nodes often need to be rebooted or brought off line for software updates, configuration updates or hardware maintenance. ISPs often run the same protocols and use equipment from the same vendor network-wide, increasing the probability that a maintenance window will be network wide. Some of the updates can be critical where we have to update fast, for example,...
Protein-protein interactions (PPIs) play fundamental roles in nearly all biological processes and differ based on the composition, affinity and lifetime of the association. A vast amount of PPI data for various organisms is available from MIPS, DIP and other sources. The identification of functional modules in PPI network is of great interest because they often reveal unknown functional ties between...
The network dynamic evaluation is in the proven prescription legal science has truthfully given the trusted degree of the network from the real network to the simulation experiment evaluation concrete model and the realization process. The network modelling process uses the extraction real network data, establishes the simulation environment, under the simulation environment destructive collapse test...
The forwarding paths in an IP network may change due to a link failure, network equipment maintenance, or reconfiguration of link weights. The forwarding tables in the routers need then to be updated. These updates may cause transient loops and link overflow, if they are not performed in an appropriate order. While existing proposals achieve loop-free updates, transient link overflow is still a problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.