The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless networks’ applications are increasing gradually necessitating their performance to enhance. Evolution of these networks over time indicates the need for algorithms which can operate based on their dynamic nature. Wireless mesh networks provide Intranet and Internet access for different applications in various environments. It is expected that the traffic load will be high on these networks...
As a special kind of public-key encryption, attribute-based encryption (ABE) is able to achieve fine-grained access control mechanism by offering one-to-many encryption. Due to such unique characteristic, this primitive is widely employed in the cloud computing environment to provide flexible and secure data sharing. However, how to revoke the access privilege of a user to access encrypted data stored...
Devices in Internet of Things (IoT) often offer services that allow tenants to access data of different metrics collected from sensors. These sensors can be built-in or remotely connected to such devices. Given that such monitoring services are usually invoked within devices that have limited IT resource capacities, it is impossible to collect data of all metrics in the application’s context with...
Network virtualization is widely considered as a mainstay for overcoming the Internet’s ossification problem, and virtual network embedding (VNE) is a critical issue. Over recent years, growing energy costs and increased ecological awareness have stimulated the interest in reducing energy consumption by Internet service providers (ISP). Dependability is also an important requirement, as it involves...
Thinning algorithms have been widely applied in many applications such as computer graphics, computer vision and medical imaging. The performances of thinning algorithms are hampered by the increase of image’s size and image’s content. By employing graphics processing units (GPUs), the calculation of thinning algorithms can be accelerated. In this paper, we present GPU parallel versions of well-known...
Physarum polycephalum is an amoeba-like organism and is able to find the shortest path in a labyrinth. Inspired by P. polycephalum, recently, a mathematical model and an algorithm (Physarum Solver) was developed. There are, however, only sequential implementations of this algorithm. In this paper, a fast and efficient parallel Physarum Solver is proposed. The proposed algorithm requires the solution...
In recent years, notable number of research studies have been conducted on the analysis of diffusion process in complex networks. One fundamental problem in this domain is to find the most influential spreader nodes. For achieving a successful spreading process, nodes having high spreading ability should be selected as spreaders. Many centrality measures have been proposed for determining and ranking...
Efficient scheduling is critical for achieving improved performance of distributed applications where an application is to be considered as a group of interrelated tasks and represented by a task graph. In this work, we present a clustering-based scheduling algorithm called effective critical path (ECP) to schedule precedence constrained tasks on multiprocessor computing systems. The main aim of the...
We analyzed the performance of a multi-node OpenStack cloud amid different types of controlled and self-induced network errors between controller and compute-nodes on the control plane network. These errors included limited bandwidth, delays and packet losses of varying severity. This study compares the effects of network errors on spawning times of batches of instances created using three different...
This study elucidates the dynamic behaviour of the two competing mutually exclusive epidemic (meme) spreading model with the alert of memes over multiplex social networks. Each meme spreads over a distinct contact networks $$(CN_1,CN_2)$$ ( C N 1 , C N 2 ) of an undirected multiplex social network. The behavioural responses of agents (alerts) to the spread of competing memes is disseminated...
While modern parallel computing systems offer high performance, utilizing these powerful computing resources to the highest possible extent demands advanced knowledge of various hardware architectures and parallel programming models. Furthermore, optimized software execution on parallel computing systems demands consideration of many parameters at compile-time and run-time. Determining the optimal...
Current developments in information and electronic technologies have pushed a tremendous amount of applications to meet the demands of personal computing services. Various kinds of smart devices have been launched and applied in our daily lives to provide services for individuals; however, the existing computing frameworks including local silo-based and cloud-based architectures, are not quite fit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.