The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Infrastructure as a service (IaaS) is a form of cloud computing, which converts physical machines (PMs) to various types of resources by virtualization technology, and delivers these resources to customers by a on-demand way. However, different customer requirements complicate the usage of resources. In this paper, we employ a high level formalization way, Performance Evaluation Process Algbra (PEPA),...
Wireless sensor network (WSN) is energyconstrained, the data fusion techniques used in wireless sensor network can significantly reduce energy consumption and prolong the lifetime of network. In this paper, we study the optimization of performance data fusion in sensor network as a network utility maximization (NUM) problem, and we argue that energy need to be allocated for data transmission and fusion...
The FCC new regulation for cognitive use of the TV white space spectrum provides a new means for improving traditional cellular network performance. But it also introduces a number of technical challenges. This paper studies one of the challenges: given the significant differences in the propagation property and the transmit power limitations between the cellular band and the TV white space, how both...
In wireless communication, the transmitter (Alice) can send artificial noise (AN) to interfere with the eavesdropper (Eve). This letter considers the AN MIMO scenario, i.e., both Alice and the legitimate receiver (Bob) are equipped with multiple antennas. A closed-form expression for the lower bound of secrecy capacity is obtained. It is proved that water-filling is the optimal power allocation scheme...
While multiple access links enhance the availability and utilization of multicast service nodes, the resource allocation balancing needs to be performed on a link basis, which is usually not considered in most overlay multicast routing algorithms. To accurately represent the bandwidth consumption of each overlay node, we need not only a multihomed proxy model to describe the overlay multicast routing...
Compared with traditional IP Multicast, overlay multicast is not only flexible in functionality but also compatible with current network infrastructure. Therefore it is emerging as an effective solution for most group communications over the Internet. Affected by end-host overlay systems, the overlay multicast routing problem is studied under a single homed model in most literatures. Under this model...
In this paper we propose a scalable admission control scheme for the QoS sensitivity traffic in core-stateless networks. In our scheme, the ingress routers perform admissibility test in a fully distributed and parallel fashion for requests by dint of our bandwidth dividing based virtual link mechanism. Then, we introduce a novel two phase token passing mechanism to adaptively optimize the proportion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.