The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using beam forming antennas and ULB modulations in ad hoc networks have been recently focused on, as they allow to drastically improve ad-hoc network performances. This new technological context implies revisiting common network algorithms. When considering an multi-sector antenna uncommon with an uncommon high switch delay, packets have to be efficiently scheduled on beams at the MAC layer level,...
An area of knowledge extraction is mobile user data mining. It is concerned with methods and algorithms on extracting interesting knowledge from mobile users through the data they have generated. These data are such as their user movement database and communication history. In group pattern mining, group patterns from a given user movement database is found based on spatio-temporal distances. Static...
MIS (mobile Internet services) architecture is designed for secure connection and fast handover with wireless LAN. This architecture consists of three protocols, MISP (mobile Internet services protocol), MISAUTHP (mobile Internet services authentication protocol) and MIS MobilelP, and two kinds of servers, authentication servers and home agent, base routers and mobile nodes. MISP is a protocol designed...
QoS provisioning for user application requires not only the evaluation of performance on end-station but also the evaluation of network parameters on intermediate routers. These network parameters were observed under the condition of self-similarity, and evaluated focusing on first-order performance measures. Second-order performance measures such as jitter are of significance for multimedia data...
Due to the growth of unresponsive UDP traffic in the Internet, it becomes increasingly important for ISPs to amply shape the traffic that leaves their network. Ideally, flows should be forced to be TCP-friendly; to this end, knowledge about certain end-to-end path characteristics is needed. We present a suitable mechanism (the Burst-PiggyBack (BPB) technique) that obtains the necessary information...
In H.264, motion estimation algorithm plays a significant role in computational cost and coding efficiency. In this paper, we proposed a novel fast adaptive statistical genetic motion search algorithm for H.264/AVC.In our algorithm, we first make an early termination based on the estimation of stationary blocks by the predetermined thresholds with different block sizes. Based on the spatiotemporal...
Active queue management (AQM) with multiple thresholds is an effective mechanism of buffer allocation for differentiated quality-of-service (QoS) of heterogeneous traffic. This paper develops an original analytical model for a finite buffer queueing system with AQM under two heterogeneous classes of traffic which are modeled, respectively, by the non-bursty Poisson process and bursty Markov-modulated...
The purpose of this paper is to study the packet loss effect on MPEG video transmission quality in wireless networks. First, we consider the distribution of packet losses in wireless network, including distributed and burst packet losses. Besides, we also discuss the additional packet drops by the play-out buffer at the received end, and the effect of the transmission packet size on the video delivered...
This paper presents adaptive resource sharing model that uses a revenue criterion to allocate network resources in an optimal way. The model ensures QoS requirements of data flows and, at the same time, maximizes the total revenue by adjusting parameters of the underlying scheduler. Besides, the adaptive model eliminates the need to find the optimal static weight values because they are calculated...
In order to reduce network congestion and fully use link bandwidth, when there are equal-cost-multi-paths (ECMPs) between a forwarding node and a destination subnet, traffic load should be balanced among ECMPs and packets of the same TCP flow should reach destination host in the same order. An algorithm called LRU-based caching with counting (LCC) is proposed. Packet length differentiation is considered...
As there is a lack of central management in an e-commerce interaction carried out based on peer-to-peer architecture, it is obvious for the trusting peer to analyze the risk beforehand that could be involved in dealing with a trusted peer in these types of interactions. Another characteristic of peer-to-peer architecture interactions is that the trusting peer might have to choose a peer to interact...
Transaction commit protocols have widely been used to ensure the correctness and reliability of distributed applications. This paper investigates into the performance of such protocols within the context of composite Web services. It presents a new commit protocol which aims to improve the performance of composite Web services transactions. The proposed protocol is tested through various analytical...
Sim proposed a market-driven negotiation agent model that makes adjustable amounts of concession by reacting to different market situations and trading constraints, and it was improved with an enhanced market-driven strategy by taking opponent eagerness into consideration. In both Sim's original model and improved model, however, it was implied that a negotiation agent has same behaviors and actions...
Many routing and wavelength assignment algorithms have been proposed for optical networks, but they lack the refinement of being able to further share the gigabit bandwidth in each wavelength. Obviously, TDM wavelength routing networks can offer better network throughput than traditional wavelength routed networks. However, with the advancement of optical technology, it is possible to divide a wavelength...
Object placement is an importance issue in object-based storage system. A dynamic object placement algorithm is presented to minimize the blocking probability in heterogeneous storage systems. To address the online problem without a priori knowledge of workload parameters, or with changing workload, the algorithm employs an adaptive mechanism to estimate the characteristics of workloads. Due to a...
According to the analysis of MBC (meteor burst communication) mechanism, a model of signal processing based on the structure of data frame is suggested for adaptive modulation and coding (AMC) of MBC system in this paper. There are two distinct modes of operation for signal processing: acquisition and tracking. The acquisition mode is a training period to initialize the channel estimation by frame...
Employing effective buffer management schemes at Internet routers has been an increasing important issue in order to guarantee quality of service (QoS) to diverse Internet services. One of its primary goals is to control jitter and latency required by real-time and interactive traffic. Therefore, effectively constraining delay to a specified value is a key QoS requirement. This paper presents a new...
A newly emerging protocol for storage networking, iSCSI, was recently ratified by the Internet Engineering Task Force. The iSCSI protocol is perceived as a low cost alternative to the FC protocol for networked storages. It allows block level storage data to be transported over the popular TCP/IP network that is widely understood. This paper presents a new storage architecture allowing parallel processing...
In sensor routing algorithms, energy efficiency is considered as the main concern since every node is battery-powered. However, some sensor applications require high priority feature like delay-guaranteed data deliveries if it is critical to notice important events within a predefined deadline such as in surveillance systems. In this paper, we set up a data delivery scheme making use of variable transmission...
In this paper, we study the problem of data gathering in multi-hop wireless sensor networks. To tackle the high degree of channel contention and high probability of packet collision induced by bursty traffic, we introduce a novel model based on random channel access scheme for data gathering. In our model, both data delivery reliability and latency are considered, and our goal is to tune the attempt...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.