The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most network applications such as pervasive computing, grid computing, P2P etc. can be viewed as multi-agent systems which are open, anonymous and dynamic in nature. Due to such nature multi-agent systems present potential threats in ensuring secured communication. One of the key feasible ways to minimize threats is to evaluate the trust and reputation of the interacting agents. Many trust models...
A Network-on-Chip (NoC) is a new paradigm in complex System-on-Chip (SoC) designs that provides efficient on-chip communication architecture. It offers scalable communication to SoC and allows decoupling of communication and computation. In NoC, design space exploration is critical due to trade-offs among latency, area, and power consumption. Hence, analytical modeling is an important step for early...
Even though BitTorrent-like file sharing is successful for P2P (peer-to-peer) content-sharing over Internet, it suffers from the content unavailability problem when the contents are not popular (i.e., the absence of seed). This content unavailability can be mitigated by using multi-swarm cooperation and/or by bundling popular/unpopular contents. In this paper, by employing user-driven virtualized...
Recent advancements in technology and computing environments have extended the scope of classification criteria for traditional grids to include wireless, mobile and ad hoc grids based on the criteria of Accessibility. The realization of the benefits of grids to a larger extent is based on the effective discovery of resources (which could be heterogeneous in nature) that are part of the grid. Thus...
Future networks require virtual network topology management method using distributed PCEs for multi-layer multi-domain path computations. Once a path is established within a lower layer, it can be used as a data link in an upper layer and it can be advertised as a Traffic Engineering Link and exploited in the path computation by an upper layer. This paper presents cross-layer provisioning system architecture...
This paper works on several methods to get sum of log-normal distribution to calculate CCI. We investigate the details of the Wilkinson's method and the Schwartz and Yeh's method. Those are applied to determine cell coverage probability for pilot signal in the IS-95 CDMA forward channel analytically. The cell coverage is also simulated by Monte Carlo simulation by computer generated random variable...
Voice over Internet Protocol (VoIP) is a technology that transports voice data packets across packet switched networks using the Internet Protocol (IP). The key research is to develop a new method for QoS determination and dynamic control of the network that is applicable to VoIP industry. The paper investigates the effects of packet loss, delay and jitter on speech quality for VoIP. It extends the...
The objective of the work is to propose an on-demand asynchronous check pointing technique for the fault recovery of a grid application in communicating process approach. The formal modelling of processes using LOTOS is done wherein the process features are declared in terms of possibilities of rollback and replicas permitted to accept the assigned tasks as decided by the scheduler. If any process...
Quantum Neural Network (QNN) can improve upon the inadequacies of the classical neural network (CNN). The CNN requires a huge memory and needs more computational power. A new field of computation is emerging which integrates quantum computation with CNN. A quantum inspired hybrid model of quantum neurons and classical neurons is proposed. This paper details an approach, perhaps the first attempt,...
Decoding low-density parity-check (LDPC) codes requires a lot of computation time, particularly when bit error rates as low as 10-9 are needed. In this paper, we improve the simulation speed by making use of an inexpensive graphics processing unit (GPU). A dedicated program is written to utilize the hardware resources in the GPU to decode LDPC codes in a parallel manner. Codes with rate 1/2 and length...
To equip a computer system with trust measurement capability, measurement mechanisms must be built into the system. Access Control is indispensable to ensure effective work of such mechanisms. Existing access control models are not good enough to support trust measurement because they were not devised with this goal in due consideration. Trust is often evaluated in term of integrity, which can be...
In simulation and computer game domains, pathfinding is an important capability for mobile and artificial agents. The problems of pathfinding have been widely studied for decades. The two significant aspect of pathfinding are related to search algorithm and search space. This paper mainly focuses on the search space generation aspect. Search space could be generated manually or automatically and the...
Ubiquitous city (U-city) is a city with ubiquitous information technology that enables citizens to access the converged information anywhere and anytime. A lot of compute power are required in U-city, because large amount of data should be processed in real-time. Cloud computing enables users to use the abstracted and virtualized computing resources and to process huge amount of information without...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.