The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite ??airborne network (AN) topology design?? and careful planning of AN trajectories, unexpected disruptions (from hardware failures to changes in mission requirements and hostile attacks) may cause nodes not to connect to one another directly or indirectly either because they are out of one another's range or because nodes do not meet one another according to their preplanned trajectories. Since...
Network graphs, in general, successfully model a wide variety of interactions and relationships among entities, including both physical and logical connections. In this work, we study the problem of mapping a logical network on to a physical network; such a problem arises in various scenarios, for example, assignment of virtual machines on to physical servers in cloud computing, assignment of services...
Hard guarantees on message delivery timeliness and recovery delay from network equipment failures are required by several distributed real-time applications such as video conferencing. In order to meet these requirements many schemes have been proposed to provide solutions by reserving additional resources a priori along a disjoint backup path. One of the approaches in the literature proposes segmented...
There has been considerable research interest in the design of survivable grooming capable networks in recent years. For such networks, protection may take place at the lightpath level or at the connection level. The vast majority of the current work can be classified into one of two categories (i) static grooming, where the demands are allocated for the entire duration of the network and (ii) dynamic...
There are many fields at where ad hoc networks are used, but applications like mission critical and commercial production or broadcasting which mostly contain real time audio and video streams and require absolute end to end guarantee for QoS. The key attribute these applications for guarantying for QoS is, they need routing path for connectivity like virtual leased line that is very difficult in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.