The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to overcome the phenomenon that the existence of end-to-end path is no longer guaranteed because of intermittent connection in the opportunistic network, it is desirable to employ a special node called ferry, which moves in a specific trace and forwards data for disconnected nodes, to provide communication opportunities. In this paper, Global Ferry Scheme (GFS), which exploits multiple local...
The essence of spectrum allocation is to find an appropriate distribution of spectrum bands among users so that they can coexist. Thus, spectrum allocation can avoid interference that caused by two interference SUs using the same channel. Different spectrum allocation can lead to different network topologies and consequently have effect on the network connectivity. The aim of this paper is twofold:...
Relay node (RN) plays a key role in cooperative communications and RN selection may substantially affects the performance gain. In this paper we address the issue of RN selection while taking into account Medium Access Control (MAC) overhead, which is incurred by not only handshake signaling but also frame retransmissions due to transmission error. We use a theoretical model to analyze the cooperation...
The prior studies setup the churn model by measuring the historical logs or records of a P2P network, and treat it as one whole black-box without understanding the inside of peer's population. The metrics used to characterize the churn is distributions of the node session lengths and arrival intervals. We investigate churn in a higher level point of view, and find that modeling it based on the global...
Intermittently Connected Wireless Networks (ICWN) or Delay/Disruption Tolerant Networks (DTN), have attracted attention from researchers because of their inherent characteristics, including long latency, low data rate, and intermittent connectivity. Extensive research has been conducted on ICWN, including the architecture, and routing. However, few researchers have investigated the performance of...
In wireless sensor networks (WSNs), providing source-location privacy through secure routing is one of the most prosperous techniques. In this paper, we propose a routing technique to provide adequate source-location privacy with low energy consumption. We introduce this technique as the Sink Toroidal Region (STaR) routing. With this technique, the source node randomly selects an intermediate node...
IEEE 802.16 supports both single-hop and multi-hop mesh modes. It defines several traffic and service categories and offers differentiated quality of service (QoS) through scheduling algorithms. In IEEE 802.16, a three-way handshaking mechanism is given to reserve the slots hop-by-hop for mesh networks, which is called Hop-by-hop Bandwidth Reservation Protocol (HBRP). However, HBRP can not assure...
Cognitive radio has been proposed as the means for secondary users to promote the efficient utilization of spectrum. Meanwhile, Cooperative relay is well known as a powerful technology to combat signal fading in a wireless medium. In this paper, we discuss a new relay selection algorithm for cognitive radio ad-hoc networks by utilizing cooperative relay to improve spectrum diversity and transmission...
The dynamics of peer participation, or churn, is critical for design, implementation and evaluation of Peer-to-peer (P2P) systems. The metrics used to characterize the churn is distributions of the node session lengths and arrival intervals. The prior studies setup the model by measuring the historical logs or records, and treat the churn as one whole black-box without understanding the inside of...
Wireless sensor networks (WSNs) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
Cooperative communication can obtain spatial diversity without using multiple antennas, and thus achieve more reliable transmission or consume less power. Accordingly, a new cooperative MAC mechanism in wireless networks, the DCMAC, is proposed in this paper. The DCMAC makes full use of the broadcasting characteristics of wireless channel to obtain channel information, chooses the most suitable cooperative...
The extensive application of tree model has made tree mining become a hot field in data mining research. As an important branch of tree mining, tree cluster plays a fundamental analysis role in many areas. In this paper, a tree cluster algorithm was proposed based on least closed tree, which effectively solved problems in large amount of data in practical application. The basic method is bringing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.