The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considerable effort has been spent on collecting all the information of routers by using traceroute-like probes in the router-level topology measurements. This method has been argued to introduce uncontrolled sampling biases on statistical properties of the sample graph and heavy load to the network being measured. In order to improve the quality of the maps induced by the method, researchers are...
Establishing a clear and timely picture of Internet topology is complicated by many factors including the vast size and dynamic nature of the infrastructure. In this paper, we describe a methodology for estimating an important characteristic of Internet topology - the hop distance between arbitrary pairs of end hosts. Our goal is to develop an approach to pairwise hop distance estimation that is accurate,...
Distributed application (e.g., grid-enabled application) performance can be improved by complementing the computational resource information advertised to the clients with network information (e.g., topology and link capacity). In this way, clients may choose the jointly optimal resources. This study focuses on how to provide clients with network information. The proposed method, namely the Recursive...
Many proposed solutions employ distributed depth-first-searching (DFS) approach to implement positioning in application layer multicast. In DFS-based delivery tree building approaches, the newcomer need not know the information of other members except the root, and positioning can be easily implemented. However, the DFS approach cannot effectively position a host in some cases because it usually selects...
In contrast with most Internet topology measurement research, our concern here is not to obtain a map as complete and precise as possible of the whole internet. Instead, we claim that each machine's view of this topology, which we call ego-centered view, is an object worth of study in itself. We design and implement an ego-centered measurement tool, and perform radar-like measurements consisting of...
Most research on Internet topology is based on active measurement methods. A major difficulty in using these tools is that one comes across many unresponsive routers. Different methods of dealing with these anonymous nodes to preserve the connectivity of the real graph have been suggested. One of the more practical approaches involves using a placeholder for each unknown, resulting in multiple copies...
An important and fundamental issue in designing structured P2P systems is the tradeoff between the number of logical links and the number of hops. This paper presents K-Chord (KC), a flexible protocol based on Chord and the idea of proportional search. We conduct an in-depth study on KC. Let D denote any given number, in order to guarantee that each query can be resolved in 0(D) hops, it is necessary...
Hard guarantees on message delivery timeliness and recovery delay from network equipment failures are required by several distributed real-time applications such as video conferencing. In order to meet these requirements many schemes have been proposed to provide solutions by reserving additional resources a priori along a disjoint backup path. One of the approaches in the literature proposes segmented...
The operational lifetimes of SoC and microprocessors face growing threats from technology scaling and increasing device temperature and power density. In-field (or on-line) testing of NoC-based SoC is an important technique in ensuring system integrity throughout this potentially shorter lifetime. Whether in-field testing is conducted concurrently with normal applications or executed in isolation,...
Since ad hoc network does not rely on existing infrastructure and is self-organized, the nodes on such network act as hosts and routers to transmit packets. With its intense change in topology ad hoc network does not relay on pre-established cable network, but it requires special routing algorithm. We provide a specific shortest routing protocol based on distance vector and adjacency matrix and compare...
Network-based and distributed intrusion detection system is aroused by the burst-outs of large-scale abnormal events. How to place detection instruments is the key to the detections. The paper turned the problem of detector placement to that of the clustering of topology graph. A novel bidirectional hierarchical clustering algorithm is put forward, which decreases the amount of result clusters by...
This paper studies identification of linear shift-invariant systems from closed-loop time series. Identification (or modelling) error is measured here by distance functions which lead to the weakest convergence notions for systems such that closed-loop stability, in the sense of BIBO stability, is a robust property. Thus the identification methodology developed here is compatible with the requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.