The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Notice of Violation of IEEE Publication Principles"A Simple Subspace-Based Blind Channel Estimation Technique for OFDM Systemsby Shi Biao, Tang Zhen-jun, Li Xian-hua, Jiang Shi-jin, and Yu Xin-huain the Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007, pp.236-241, Sept. 2007After careful and considered review of the content...
Computer Network has great effect on improving the efficiency of the communication system and application requirements in our life. In order to establish transmission path with movement characteristics and improve the efficiency of information transmission in Computer Network, the optimized clustering routing protocol based on node position using the minimum distance routing competition mechanism...
Large-scale systems use distributed data processing systems in their work. An important problem in the design of such systems is the optimal allocation of data files by the nodes of the computer network. The article deals with the problem of the optimal allocation of files and their copies over the nodes of an unreliable large-scale distributed system.
As a shared economy platform, Airbnb provides collaborative practices for customers and guides them to match with hosts' rooms. Based on the records and ratings, there is great significance attached to inferring the satisfaction between users and rooms. Several essential problems arise when evaluating satisfaction and matching. Data confidence and prediction bias influence the inference performance...
Content-Centric Networking (CCN) is a recently proposed Internet paradigm that focuses on scalable, secure and efficient content distribution. The main abstraction is named and addressable content. A consumer requests desired named content by generating a so-called interest, which is then routed by the network towards an in-network cached copy, or the authoritative producer, of that content. Since...
The IEEE 802.11 MAC protocol uses Distributed Coordinated Function (DCF) as the main element to determine the efficiency in sharing the limited resources of the wireless channels in wireless local area networks (WLANs). For analyzing 802.11 DCF networks, one of the key assumptions commonly used is that every station always has a packet to transmit (saturated state). However, in practice it may not...
With increase in size of wireless mesh networks so are problems on interference, load-imbalance, and congestion that lowers throughput significantly. Proposals to solve issues related to this problem include accurate accounting of the channel load so that traffic can be directed along calmer regions of the networks reaching destination in time. Load aware routing metrics have been proposed for this...
This paper describes the use of learning by teaching (LBT) as an instructional strategy to promote standards education in an undergraduate computer science course. The main objective of this instructional strategy is to make students understand how standards and computer network technologies are fundamental resources to create and use both internet infrastructure and services in a multitude of devices...
Machine learning has become one of the go-to methods for solving problems in the field of networking. This development is driven by data availability in large-scale networks and the commodification of machine learning frameworks. While this makes it easier for researchers to implement and deploy machine learning solutions on networks quickly, there are a number of vital factors to account for when...
The association of wireless clients based on the Received Signal Strength Indication (RSSI) does not necessarily result in better network performance. An Access Point (AP), even presenting high signal level to clients, can be so congested that a new association degrades network performance. By using the Software Defined Wireless Networking (SDWN) paradigm, this work presents a centralized solution...
This paper studies routing performance loss due to traffic split ratio granularity constraints. For any given fineness of traffic splitting capability, we provide upper bounds on the loss of performance. Based on tight convex relaxation, we further develop an efficient approximation algorithm to compute a good routing solution that satisfies given constraints on traffic splitting. The results can...
Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these...
The emergence of new networking paradigms like Cloud Computing and the Internet of Things has introduced new security challenges that deserve new mechanisms to guarantee the integrity, availability and confidentiality of information and services to the users. One of the currently most studied strategies to satisfy these necessities is the use of hybrid Machine Learning techniques to automatize the...
This article deals with developed device for adaptive management of traffic flow. It is shown that due to the use of the proposed adaptive management method average coefficient efficiency of node equipment in the transmission of packets increased by 10–12 %. The experiments were illustrated by graphs.
The present work is devoted to research the influence of impulse noise on data transmission in computer networks employing Power Line Communication (PLC) technology. Electrical interference in such networks is regarded as a kind of solar interference. In this interpretation, the source of interference (an analogue of the Sun) is on the same axis with the Sender-Receiver communication line. This approach...
CLARAs backbone (Latin Americas Consortium for Advanced Networks) was stagnated in 2013 with just one 10 Gbps links and ten backbone nodes. In 2016 CLARAs backbone was updated having nine 10 Gbps links ant thirteen backbone nodes. Following CLARA s backbone evolution, simulation as first approach and emulation as a second approach were developed for connectivity and management for each node of the...
Today's data center topologies mostly comprise multi-rooted trees with many equal-cost paths between the (source, destination) node pairs. Equal Cost Multi-Path (ECMP) forwarding is extensively used to leverage the multipath diversity in data center networks. However, ECMP forwarding might reduce the overall throughput significantly because of the random hash collision between multiple large flows...
The operation and maintenance of large distributed systems that are subject to high QoS conditions has led to the need of designing and developing advanced monitoring tools that facilitate the administration of the critical services required by the user communities. RASSMon is a portable, reliable, secure software platform able to collect monitoring data from multiple sources in heterogeneous environments...
Distributed computing system consists of number of independent computers located at different locations. These computers may become faulty or unresponsive at any point of time. Such failures will affect the overall performance of the distributed system. Thus, it becomes necessary to detect such faulty computers or nodes. This paper proposes a new adaptive fault diagnosis algorithm namely, Coordinator-based...
Anomaly detection for cyber-security defence hasgarnered much attention in recent years providing an orthogonalapproach to traditional signature-based detection systems.Anomaly detection relies on building probability models ofnormal computer network behaviour and detecting deviationsfrom the model. Most data sets used for cyber-security havea mix of user-driven events and automated network events,which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.