The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we focus on the problem of result integrity verification for outsourcing of frequent item set mining. We design efficient cryptographic approaches that verify whether the returned frequent item set mining results are correct and complete with deterministic guarantee. The key of our solution is that the service provider constructs cryptographic proofs of the mining results. Both correctness...
An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have...
The objective of the standard parts optimal control problem is to find a number, m, of control inputs to a given input-output system that can be used in different combinations to achieve a certain number, n, of output objectives and to do this in such a way that a specified figure-of-merit measuring the average cost of control is minimized. The problem is especially interesting when m is significantly...
This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.
Brain-computer interfaces (BCI) are emerging as a powerful tool for providing an alternative way of communication and environment control to severely disabled people. Among these systems, P300-based BCIs are widely diffused as they are easy to manage and do not require a training for the subjects. These systems, however, are still too slow so that they are actually used only by those patients that...
Wireless sensor networks (WSN) have been noticed and researched nowadays. These new type of networks have unique characteristics. These characteristics make them different rather than other networks. WSNs composed of set of nodes that collect and transmit information about their environment. They have different constraints such as computational power, storage capacity, energy and etc. Of course the...
Computing capacity bounds of ad hoc networks, as well as optimizing radio resource allocation in order to approach those bounds is a hard task that have recently attracted the interest of the research community. In this paper we address the problem of jointly optimizing the routing of flows, the transmission scheduling over wireless links along the path, and the emitted power for bandwidth guaranteed...
A simple and effective composition of software services into higher-level composite services is still a very challenging task. Especially in enterprise environments, quality of service (QoS) concerns play a major role when building software systems following the service-oriented architecture (SOA) paradigm. Inthis paper we present a composition approach based on a domain-specific language(DSL) for...
Gossip, or epidemic, protocols have emerged as a highly scalable and resilient approach to implement several application level services such as reliable multicast, data aggregation, publish-subscribe, among others. All these protocols organize nodes in an unstructured random overlay network. In many cases, it is interesting to bias the random overlay in order to optimize some efficiency criteria,...
In recent years peer-to-peer (P2P) systems gain much attention. Growing popularity in P2P based protocol implementations for file sharing purposes caused that the P2P traffic exceeds Web traffic, once of the dominant traffic on the Internet. In fact of that, the use of P2P systems introduce many new problems related to traffic engineering or network optimization. In accordance to our previous works...
FlexRay is an automotive communication protocol that combines the comprehensive time-triggered paradigm with an adaptive phase that is more suitable for event-based communication. We study optimization of average response times by assigning priorities and frame identifiers to tasks and messages. Our optimization approach is based on immune genetic algorithms, where in addition to the crossover and...
Given a fixed network of routers, a set of multicast sources and their corresponding receivers, we investigate the problem of constructing multicast sessions that maximize the multicast throughput of all sessions under fairness constraints. It is known that for problems with only one source node, heuristic algorithms based on packing maximum-rate Steiner trees may achieve throughput close to network...
This paper introduces a new consensus protocol whose features are different from known consensus protocols available in the literature. The relation between discrete coverage algorithms over a convex polygon for solving a facility location problem (n-median problem) along with some notions in agreement over acyclic digraphs have been used to establish a novel constrained consensus protocol. Its convergence...
In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper,...
This paper argues in favor of introducing a standardized distributed pilot channel to improve spectrum sharing between heterogeneous technologies in unlicensed and possibly licensed bands with incumbent users. The main features of such a distributed pilot channel are sketched and a simple distributed algorithm for optimization of spectrum sharing is introduced. The pilot channel serves as a supplement...
Cognitive radio networks are envisioned to solve the problem of spectral scarcity in wireless networks; through providing highly configurable radios and protocol stacks to support the application of a variety of efficient and possibly cross-layered solutions. However, the large numbers of hardware and software modules involved in realising these goals raises a fundamental design problem. Specifically,...
Proxy Mobile IPv6 has been developed from the concept of network-based mobility support protocol in the IETF. The recently published specification of proxy mobile IPv6 only focuses on the mobility support. Then, route optimization issues are left in the basket for further works. In this paper, we provide the performance analysis in where the recently proposed route optimization is evaluated in terms...
The perceptron problem (PP) appeared for the first time in the learning machines and is very useful for zero-knowledge identification schemes in cryptology. The problem is NP-complete and no deterministic algorithm is known to date. In this paper we develop a deterministic method based on DC (Difference of Convex functions) programming and DCA (DC optimization Algorithms), an innovative approach in...
Ethernet is becoming a preferred technology to be deployed in metro domain due to its low cost, simplicity and ubiquity. However, spanning tree based Ethernet protocol does not meet the requirement for Metro Area Networks in terms of network resilience, despite the advancement of Ethernet standardization and commercialization. In this paper, we propose a fast spanning tree reconnection (FSTR) mechanism...
This document covers the adaptive ARQ proposal for WiMAX wireless broadband networks, including problem area identification (TCP over ARQ), analysis and solutions proposed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.