The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large scale cloud applications may require users to get multiple resources (e.g., VMs, storage) from different sites and simultaneously connect each pair of resources by a path that can satisfy certain Quality-of-Service (QoS) requirements. Finding such paths with the bandwidth constraint is known as the unsplittiable flow problem, which is shown to be NP-hard. Accordingly, various approximations...
We employ network metrics on relational variables of interest to control for econometric estimation bias, inefficiency and inferential problems from non-spherical, network induced disturbances in sampled, unknown behaviorally driven networks. Our analysis follows a two-step procedure to establish a conceptual baseline and then integrate real-world data and questions pertinent for statistical inference...
Energy consumption has been brought to the forefront in the past decade. Energy efficiency is being considered in all phases of hardware and software design and implementation. High energy consumption is becoming an increasingly large burden for organizations and institutions hosting large-scale computing systems. The major problem with I/O systems is that hard drive disk consumes a large amount of...
In the past decades, various concepts of peer-to-peer (P2P) systems have been realized in desktop applications for stationary PCs. Last recent years show that computers have evolved to handy devices which can be used nearly everywhere, not only at home. For this reason, location-based services which allow to associate peers in a network with geographical positions, e.g. to track a device in emergency...
Empowered by the orthogonal frequency division multiplexing (OFDM) technology, elastic optical networks (EONs) have emerged as a promising solution for future high-speed networks. Routing and spectrum allocation (RSA) is one of the key challenges to the design of EONs. An adaptive RSA is required to meet the robustness objective of EONs. The relative cost concept can be used to implement an adaptive...
This paper proposes an enhanced decision feedback equalizer (DFE) for filter bank multicarrier (FBMC) systems over offset quadrature amplitude modulation (OQAM) based on a minimal mean square error (MMSE) criterion. For each subcarrier, besides one feedforward (FF) filter and one feedback (FB) filter, we add two intercarrier interference (ICI)-suppressing filters, which feed back detected precursors...
In this paper, we propose LEACH-CCH as a clustering algorithm aimed at improving wireless sensor network lifetime in the case of mobile sensor nodes. LEACH-CCH is a modification of the LEACH algorithm, which was developed for stationary networks. An analysis of energy consumption for the LEACH algorithm is presented to identify which data transmissions are most energy expensive for a node throughout...
Nowadays, natural disasters become more and more frequent. In this paper we propose a communication for flood disaster scenario. In our system, nodes can directly demand a specific type of data without knowing its source. Our approach differs from classic Content Centric Network one by allowing to establish a direct communication with groups of nodes. A group of nodes to contact is identified by its...
In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].
Mobile automated video surveillance systems deployed in mobile environments are used to monitor and analyze numerous situations and take necessary actions in real time. These systems include various mobile nodes equipped with numerous sensors and involve application of sophisticated image and video processing algorithms. The execution of these algorithms requires a vast amount of computing and storage...
This paper presents algorithms that find the optimal number of sensor nodes and the optimal location of nodes to achieve more efficient estimation in a wireless sensor network under power constraints. The network consists of sensors that are optimally placed over an area. Sensors' observations are noisy measurements of an underlying field. Each sensor processes its observation prior to transmitting...
This paper tackles the discovery issue in device-to-device (D2D) networks. Quick discovery is a fundamental step to realize low latency D2D communications. Assuming a synchronized superframe structure among peer devices, we propose to introduce and use common channel and group channels. Rules and procedures are defined for the purpose of enabling quick discovery. Computer simulations are performed...
In this paper queue stability in a single-hop wireless multicast networks over erasure channels is analyzed. First, a queuing model consisting of several sub-queues is introduced. Under the queueing stability constraint, we adopt Lyapunov optimization model and define decision variables to derive a network coding based packet scheduling algorithm, which has significantly less complexity and shorter...
In this paper we evaluate metrics specified in 3GPP to characterize trade-offs between delay and quality of Voice over LTE (VoLTE) mobile phones in various network conditions. We report test results on clock accuracy, terminal delay in uplink and downlink under error-free conditions, as well as delay and quality in the presence of packet losses and network jitter. We discuss how the underlying methodology...
In multi-hop wireless networks (MWNs), interference and connectivity are two key factors that affect end-to-end network throughput. Traditional omni-directional antennas and directional antennas either generate significant interference or provide poor network connectivity. Reconfigurable antenna (RA) is an emerging antenna technology that can agilely switch among many different antenna states including...
To ensure long network life-time, the duty-cycle of wireless sensor networks is often set to be low. This brings with itself the risk of either missing a sent packet or delaying the message delivery and dissemination depending on the duration of the duty-cycle and number of hops. This risk is increased in wireless sensor applications with hybrid architecture, in which a static ground wireless sensor...
A Wireless Sensor Network (WSN) uses a larger number of low-power sensor nodes to gather environmental information which is then wirelessly forwarded to a base station. However, sensor nodes have very limited communication ranges. Thus, relay nodes are required to ensure reliable connectivity throughout the WSN. On the other hand, relay nodes are typically more sophisticated and expensive than sensor...
Network traffic monitoring is a core element in network operations and management for various purposes such as anomaly detection, change detection, and fault/failure detection. In this paper, we introduce a new approach to online monitoring using a pattern-based representation of the network traffic. Unlike the past online techniques limited to a single variable to summarize (e.g., sketch), the focus...
Rate limiting is a fundamental function for managing quality of network service. Unfortunately, the poor scalability of today's rate limiting approaches restricts the performance on multi-core platform. In this work, we present CORAL, a lock-free framework that effectively implements high performance rate limiting on multi-core platform. The key idea is that CORAL uses virtual class queues to isolate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.