The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a formal model of Extended Finite State Machines (EFSMs) is proposed and an approach to their analysis is suggested. The state of an EFSM is captured by its configuration. A class of EFSMs, called Modular Vector Addition Systems (MVAS), is defined and analyzed. Modular Vector Addition Systems cover a significant subset of models used in communication protocols and behavioral synthesis...
On-demand routing protocols in wireless ad-hoc (mesh) networks use route requests to search for a routing path. To determine a route that optimizes a metric function, an intermediate node retransmits a route request that has a lower metric value. This can create flooding waves, where a large number of route requests are retransmitted through the network. In this paper, we study different classes of...
Rapid adoption of smartphones and tablets in recent years has changed the way people communicate with each other and operate in the work environment. The use of personal devices in the enterprise has become commonplace. These devices have given workers the flexibility of being mobile and still participate in collaboration sessions. However, transferring sessions between devices is not very seamless...
Ensuring end-to-end video quality requires monitoring quality in real-time (in-service) and taking counter-measures in times of adverse network conditions. Such application-layer QoS assurance mechanisms require light-weight video quality metrics that can be implemented with low computational and communication overheads. In this paper, we propose a novel video quality metric for video conferencing-type...
There are two broad categories of approaches used for checkpointing: application-transparent and application-assisted. Typically, application-assisted approaches provide a more flexible and light-weight mechanism but require changes to the application. Although most applications run well under virtualization (e.g. Xen which is being adopted widely), the addition of application-assisted checkpointing...
Virtualization provides enormous economic and ecological benefits by enabling server consolidation and supporting low-cost green data centers. A key component of the hypervisor in a virtualized system is the scheduler. A typical scheduler provides parameters to influence the hypervisor's behavior. Specifically, an application's performance on the popular open-source Xen virtualization platform can...
This paper proposes multiple access procedures to transport real-time traffic over IEEE 802.11 wireless local area networks (LANs). As currently defined, the IEEE 802.11 standard supports real-time traffic by switching from its normal, distributed access mode — carrier sense multiple access/collision avoidance (CSMA/CA) — to a centralized one. The centralized mode severely constrains the operation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.