The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we tackle the issues of exploiting the concepts of social networking in processing similarity queries in the environment of a P2P network. The processed similarity queries are laying the base on which the relationships among peers are created. Consequently, the communities encompassing similar data emerge in the network. The architecture of the presented metric social network is formally...
Flooding is an obligatory message dissemination technique for network-wide broadcast within mobile ad hoc networks (MANETs). The conventional blind flooding algorithm causes broadcast storm problem, a high number of unnecessary packet rebroadcasts – thus resulting in high contention and packet collisions. This leads to significant network performance degradation. Because of the highly dynamic and...
In this paper we present PLF (Promotion of Long Flows). PLF tries to promote web traffic using the Token Bucket Model in a DiffServ framework. This algorithm preserves the high priority for short flows but tries to allocate some long flows in the high priority class level, in order to improve some performance parameters of the long ones. Finally, we present PLFwp (Promotion of Long Flows with Penalization)...
Converged network seamlessly integrates different communications media such as data, voice and multimedia on a single platform. It refers to convergence both types of network and technologies as well as convergence between the different layers of network architecture. In this paper, we examine a priority-based queuing model and perform the mathematical analysis of different media calls processing...
We have witnessed rapid growth of mobile Internet capabilities in the mobile handsets. The penetration of the user life increases the need to establish a methodology to capture the user behavior patterns in order to improve satisfaction of the mobile web users. In order to cope with the design evaluation needs, the author proposes a long-term command transition probability analysis on mobile clickstreams...
In mobile ad hoc networks, most of on demand routing protocols such as DSR and AODV do not deal with traffic load during the route discovery procedure. To solve the congestion and achieve load balancing, many protocols have been proposed. However, existing load balancing schemes just avoid the congested route in the route discovery procedure or find an alternative route during a communication session...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.