The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer (P2P) simulation frameworks are excellent tools for developing and testing P2P algorithms, however there has been very little work done on validation of the models within these frameworks. Validation of these models is an important issue, as without knowing the models are valid we can not necessarily rely on the results generated using such models. In this work we provide an independent...
For smart traffic scenarios, communication between traffic participants is of high importance. Classical approaches (e.g. for information about congestions) employ a server-based architecture, which raises scalability and privacy concerns. In this paper, we propose OverDrive, a decentralized overlay-based geocast service that is applicable in smart traffic scenarios and not prone to the shortcomings...
In this paper, PAFusion, a power-aware framework for distributed data fusion applications in wireless sensor networks is proposed. It is designed for mapping distributed data fusion application into networks. We have evaluated the performances of PAFusion compared to DFuse and optimal solution through simulation. The simulation results show PAFusion has better performances than DFuse and PAFusion...
Traditional DHT structures provide very poor support for range queries, since uniform hashing destroys data locality. Several schemes have been proposed to overcome this issue, but they fail to combine load balancing, low message overhead, and low latency in search operations. In this article we present DRing, an efficient layered solution that directly supports range queries over a ring-like DHT...
In mobile ad hoc networks, the status of the network changes over time due to the movement of terminals, the battery level of terminals, and so on. To construct assurance networks, it is necessary to consider the requirements such as dependability, security, and adaptability against the change of the network. We have proposed a new routing method, which is referred to as MLR (Micro Loop Routing) for...
In this paper, a performance evaluation of the Routing Protocol for Low power and Lossy Networks (RPL) in a typical outdoor Smart Grid Substation Network is presented. Detailed simulations are carried out to produce several routing performance metrics using real-life scenarios. The real outdoor network was reproduced in simulation with the help of topology and link quality data gathered from the network...
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. It is the most challenging work in wireless networks and the routing layer attracts more eye than others. AODV is one of a typical kind of routing protocols among these. This paper labors the local repair mechanism of AODV. And two kinds of improved mechanism are presented. More important, an optimized...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.