The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power line communication (PLC) is playing a more and more important role in the smart grid (SG). In this paper, in addition to conveying information, sensing topology of the network based on PLC is proposed to expand the area of PLC applications, which further improves the smart property of the grid. By assuming each endpoint of the grid is equipped with a PLC device, we model the grid as an edge-node...
Content Centric Networking (CCN) is a new architecture for a future Internet. CCN relies on in-network caching capabilities of nodes and the efficiency of this architecture depends drastically on performances of caching strategies. Thus, there have been a lot of studies proposing new caching strategies to improve the performances of CCN. However, among all these strategies, it is still unclear which...
In this paper we consider several problems regarding the optimal placement of storage servers in content delivery networks with tree-like topologies (paths, trees and cacti). We present several novel algorithmic solutions for locating (k+p)-centers and connected k-centers (and k-medians) in these networks, both in the continuous and the discrete cases. We comment both on the theoretical and the practical...
Given a network of N nodes with the i-th sensor's observation xi isin RM, the matrix containing all Euclidean distances among measurements ||xi - xj || foralli, j isin {1,..., N} is a useful description of the data. While reconstructing a distance matrix has wide range of applications, we are particularly interested in the manifold reconstruction and its dimensionality reduction for data fusion and...
Network diameter is one of the important parameters of a network, until now, however, there has not been a perfect algorithm which has a lower time complexity than O(n2) to deal with this problem. As increasingly expanding of network scale and increasing number of nodes and edges, it would spend a lot of time that using Floyd algorithm whose time complexity is defined O(n3) or Breadth-first Search(BFS)...
In this paper the self-localization problem for sensor networks is addressed. Given a set of nodes deployed in an environment, self-localization consists of finding out the location of all nodes in regard to any topology or metric of interest. Nodes are assumed to be equipped with a sensor board able to provide these inter-node distances. In addition, a few nodes are assumed to be equipped with some...
Controlled greedy sleep (CGS) is a recent k-coverage algorithm based on one-hop neighboring knowledge. This paper presents the controlled greedy Sleep algorithm and highlights its best use cases thanks to performance analysis. Studies have been performed within a ring topology. This specific topology enables CGS validation and the design of an energetic model. They are used to compare CGS performance...
This paper presents a novel method of contour reconstruction from dexel data solving the shape anomalies for the complex geometry in virtual sculpting. Grouping and traversing processes are developed to find connectivity between dexels along every two adjacent rays. After traveling through all the rays on one slice, sub-boundaries are connected into full boundaries which are desired contours. The...
The downsizing of transistor dimensions enabled in the future nanotechnologies will inevitably increase the number of faults in the complex ULSI chips. To maintain the production yield at acceptable level, several levels of protection mechanisms will have to be implemented to tolerate the permanent and transient faults occurring in the physical layers. In this paper, we study fault tolerance at the...
The simultaneous segmentation of multiple objects is an important problem in many imaging and computer vision applications. Various extensions of level set segmentation techniques to multiple objects have been proposed; however, no one method maintains object relationships, preserves topology, is computationally efficient, and provides an object-dependent internal and external force capability. In...
A major issue in software testing is the automatic generation of the inputs to be applied to the programme under test. To solve this problem, a number of approaches based on search methods have been developed in the last few years, offering promising results for adequacy criteria like, for instance, branch coverage. We devise branch coverage as the satisfaction of a number of constraints. This allows...
Bluetooth standard allows the creation of piconets, with one node serving as its master and up to seven nodes serving as slaves. A Bluetooth ad hoc network can also be formed by interconnecting several piconets into a scatternet. Given a set of Bluetooth nodes which are positioned so that their unit disk graph is connected, the Bluetooth scatternet formation (BSF) problem is to select piconets, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.