The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer (P2P) streaming systems rely on that peers voluntarily share their bandwidth to maintain high performance. Credit-based incentive mechanisms are widely used to encourage peers to share more bandwidth. However, in credit-based mechanisms, how to set a suitable bandwidth price is a critical issue. In this paper, we propose a new dynamic bandwidth pricing mechanism based on Stackelberg game...
The Ultra Dense Network (UDN), as a key enabler for future wireless networks (such as 5G), is comprised of a massive number of small cells in the network. Nonetheless, energy consumption will be non-negligible when a large number of smallcell Base Stations (BSs) are densely deployed. One practical and effective approach to reduce the energy consumption of the UDN is through dynamically controlling...
To achieve high availability, fault tolerance is desirable for most networks, including Software Defined Networks (SDNs). Link and switch failures are commonly observed in SDN, severely affecting the network performance and even making the whole system break down. In this paper, we propose a protection-based recovering method for link failures using vlan-tag, which is fast with low memory consumption...
Distributed dataflow systems like Spark or Flink enable users to analyze large datasets. Users create programs by providing sequential user-defined functions for a set of well-defined operations, select a set of resources, and the systems automatically distribute the jobs across these resources. However, selecting resources for specific performance needs is inherently difficult and users consequently...
This paper initiates a new study on online partitioning algorithms that are sequentially optimized for a query sequence. As queries arrive one at a time, given the option to reconfigure the partition after each query so that it can best serve the next query, the objective is to minimize the query read cost and data migration cost. This is an online problem without an optimal solution; online heuristics...
Driven by the high sensing resolution provided by advanced nano technologies, Electromagnetic-based Wireless Nano Sensor Networks (EM-WNSNs) operating in the terahertz (THz) band is becoming an integral part of the Internet of Things (IoT). Data acquisition for EM-WNSNs face two challenges: the dynamic IoT backhaul bandwidth and THz channel conditions that jointly impact resource utilization efficiency...
In this paper, we present a novel Multipoint Video Conferencing (MVC) architecture based on Peer-to-Peer (P2P) platform, such as Gnutella where the Multipoint Control Unit (MCU) is dynamically migrated among the participating peers. The proposed architecture minimizes network traffic and delays by choosing Weighted Center of Graph (WCG) as MCU using an election protocol. We optimize frequency of MCU...
This paper presents the design, implementation, and evaluation of an energy-efficient handover algorithm for the wireless sensor networks (WSNs) that are the main building block in the creation of the Internet of Things (IoT). Our low-power handover design is based on a careful breakdown and analysis of the potential power consumption of different components of the handover process. With the scanning...
In this work we propose to design and implement a secure one-time password (OTP) system to provide a better method of enforcing a stricter set of policies, that bypass natural human habits of choosing passwords that do not abide by the policies of an organization, leaving systems vulnerable to security threats. We would then perform static and dynamic analysis of our OTP system to ensure it is not...
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
Nowadays, replication technique is widely used in data center storage systems for large scale Cyber-physical Systems (CPS) to prevent data loss. However, side-effect of replication is mainly the overhead of extra network and I/O traffics, which inevitably downgrades the overall I/O performance of the cluster. To effectively balance the trade-off between I/O performance and fault tolerance, in this...
Large off-die stacked DRAM caches have been proposed to provide higher effective bandwidth and lower average latency to main memory. Designing a large off-die DRAM cache with conventional block size requires a large tag array which is impractical to fit on-die. Placing the large directory off-die prolong the latency since a tag access is necessary before the data can be accessed. This additional trip...
In this paper, we present a hardware controlled on-chip memory called Local Memory Store (LMStr) that can be used either solely as a scratchpad or as a combination of scratchpad and cache, storing any variable specified by the programmer or extracted by the compiler. LMStr is different than a traditional scratchpad in that it is hardware-controlled and it stores the same type of variables in a block...
This paper introduces a new memory scheduling policy called LAMS, which is inspired by a recently proposed memory architecture and targets for future high capacity memory systems. As memory capacity increases, the bit-lines connected to memory row buffers become much longer, dramatically lengthening memory access latency, due to increased parasitic capacitance. Recent study has proposed to partition...
Cyber-physical systems are slowly emerging to dominate our world. Cyber-physical systems (CPS) are systems that tightly integrates users, devices and software. Whereas many of these systems are obviously safety-critical systems, some of them become so under special circumstances. This is the case with our focus CPS, i.e. building management systems (BMS), which are not always safety critical per se,...
The use of spread spectrum underlay signals has been widely proposed in cognitive radio contexts as a means to provide available spectrum for secondary users. Underlay signals are generally transmitted on a minimal interference basis to prevent disruption of the primary user(s). This paper proposes concepts for integrating the use of arbitrary, digitally modulated signals (primary) with time- and...
We are living in a cyber space with an unprecedented rapid expansion of the space and its elements. All interactive information is processed and exchanged via this space. Clearly a well-built cyber security is vital to ensure the security of the cyber space. However the definitions and scopes of both cyber space and cyber security are still not well-defined and this makes it difficult to establish...
Heterogeneous multicore processors with integrated CPU and GPU cores on the same chip pose new challenges and opportunities for time-predictable resources sharing, which is crucial for hard real-time and safety-critical systems. The shared last-level cache (LLC) can result in a large number of interferences between CPU and GPU (Graphic Processing Units) LLC accesses with diverse patterns and characteristics,...
Classification of imbalanced datasets has become one of the most challenging problems in big data mining. Because the number of positive samples is far less than the negative samples, low accuracy and poor generalization performance and some other defects always go with learning process of traditional algorithms. Ensemble construction algorithm is an important method to handle this problem. Especially,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.