The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Diagnosing a large-scale sensor network is a crucial but challenging task. Particular challenges include the resource and bandwidth constraints on sensor nodes, the spatiotemporally dynamic network behaviors, and the lack of accurate models to understand such behaviors in a hostile environment. In this paper, we present the Sensor Anomaly Visualization Engine (SAVE), a system that fully leverages...
The increasing growth of the global Internet making the shortcomings of its unstructured topology and distributed routing algorithm are exposed more rapidly. To design a controllable, scalable and manageable backbone network with a simple, efficient architecture is very imperative. Among many topologies, Tree topology which has a natural hierarchical structure and explicit end-to-end transmission...
Today's Internet is facing many problems which did not take into account in its initial design, such as routing scalability, mobility and security. No matter evolutional or revolutionary solutions that are proposed in recent years, a recognized promising direction is to separate customer network from core network and separate identification from location. In this paper, we sketch out an architecture...
In mobile ad-hoc networks, the data tends to be intercepted by malicious node when using a single path for transmission. In this paper, we propose a secure routing protocol based on multipath routing technology, namely AODVsec, which divides a data unit into several data pieces and transmits these pieces through different paths. By setting security level on each node, AODVsec limits the maximum number...
This paper proposed an algorithm of radius restrained distributed breadth first search flooding for call routing in multimedia communication. By knowing the information of neighbor nodes in finite scope, this algorithm does breadth first search and selects the least number of next forwarding neighbor nodes to reduce redundant information in broadcasting routing information. Simulation results demonstrate...
Drawbacks such as agglutination between call process and call routing, heavy routing overhead, poor scalability and control complexity, exist in current large-scale multimedia communication. To overcome these disadvantages, we proposed a hybrid hierarchical call routing architecture based on agent. In this layered architecture, instructed by the goal of condensation and flat, and improving transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.