The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, computer and information science has joined mathematics and physics as the disciplines with profound and pervasive impact across all other science and engineering fields. In fact, advances in these fields, including physics and mathematics, is intertwined with advances in computer and information sciences and with the ensuing information technologies. Synergistic advances are profoundly impacting...
Global warming and climate change trends call for urgent action to manage information and communication technologies (ICT) in a sustainable manner by minimizing energy consumption and utilizing resources more efficiently. Distributed computing environments (clusters, grids, clouds, data centers, etc.) have become the de facto platforms for many applications. These systems bring a range of heterogeneous...
The newly emerging many-core-on-a-chip designs have renewed an intense interest in parallel processing. By applying Amdahl's formulation to the programs in the PARSEC and SPLASH-2 benchmark suites, we find that most applications may not have sufficient parallelism to efficiently utilize modern parallel machines. The long sequential portions in these application programs are caused by computation as...
Many routing protocols have been proposed for wireless sensor networks (WSNs). However, only few of them addressed secure routing. This work contributes in solving secure and reliable routing problems by presenting a secure and reliable multipath routing protocol (MSR) for WSNs. MSR consists of three key components: on-demand multipath routing, enhanced passive acknowledgment, and erasure coding....
Fat-tree topology has drawn a considerable interest because it offers a rich connectivity among source and destination nodes. Routing in fat-trees is composed of a routing function and a selection function. The selection function was shown to have a great impact on the performance [2]. In this paper, we study the performance of fat-trees in case of hot-spot traffic. First, we propose a new selection...
In recent years most of the cloud computing community adopt an infrastructure centric approach to optimize the cost of cloud resources considering both Cloud Computing Service Users(CCSU) and Cloud Computing Service Providers(CCSP). In this paper we have brought up the concept of Application-centric Cloud. With Application-centric Cloud we propose an architecture to provide a generalized framework...
In this work we study cache peak temperature variation under different cache access patterns. In particular we show that unbalanced cache access results in higher cache peak temperature. This is the result of frequent accesses made to overused cache sets. Moreover we study cache peak temperature under cache access balancing techniques and show that exploiting such techniques not only reduces cache...
This paper presents a novel approach, Fuzz-SSVS, to improve the secondary structure prediction of proteins. In this work, a Sugeno based Fuzzy System is trained to act as a voting system to combine results of several secondary structure prediction techniques and produce superior answers. Fuzz-SSVS is tested with three of the well-known benchmarks in this field. The results demonstrate the superiority...
The process of text categorization has been used in many applications and areas. Classifying of Arabic texts is different than classifying of English texts because Arabic is highly inflectional and derivational language which makes monophonical analysis a very complex task. This short paper has made a review of some researches in Arabic text categorization, and recent works for adopting rough sets...
Reliable, fast, and power aware communication is needed for Ad-Hoc wireless networks. Current techniques based on client-server and Publish/Subscribe communication models are not suitable in multi-robot systems and generally for mobile applications. For this we propose a reliable peer-to-peer protocol based on a UDP Broadcast and Token Passing (UBTP). The protocol is implemented on a WLAN using the...
Wireless Sensor Networks (WSNs) are vulnerable to attacks due to their limited software and hardware capabilities. Energy efficient link layer jamming attacks have proven to be a real threat to wireless sensor networks. This type of attacks is able to prevent network communication for relatively long periods as it does not spend a lot of power while jamming. This paper proposes and evaluates two modifications...
Strategies of defending a computer network against random attacks are modeled by probabilistic methods. A single-stage model is introduced to find the optimal allocation of the resources of the administrator when the network has multiple possible targets. The location of the actual attack is random, the probability of which can be assessed by the administrator from previous interactions with the attacker...
Rapid advances in technology and design tools enabled today engineers to design system-on-chip containing large number of cores. These systems have limited resources and should be implemented with very little silicon area overhead. Several studies have demonstrated that buffers inside switches of the on-chip interconnect take a significant portion of the system silicon area that can affects the performance...
In mobile IPv6, packet transfer is interrupted due to the handoff of a mobile node, which results in burst packet loss. This transient behavior decreases the required quality of services for time-critical streaming media applications. This paper introduces an analytical model of streamed video over mobile IP networks considering the effects of handoff. The proposed model focuses on the effect of the...
Network security, especially application layer security has gained importance with the rapid growth of web-based applications. Anomaly based approaches that profile the network traffic and look for abnormalities are effective against zero-day attacks. The complex nature of the web traffic, availability of multiple applications, privacy concerns and its own limitations make the development of such...
A new satellite image classification method using a classifier integration model(CIM)is proposed in this paper. CIM does not use the entire feature vectors extracted from the original data in a concatenated form to classify each datum, but rather uses groups of features related to each feature vector separately. In the training stage, a confusion table calculated from each local classifier that uses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.