Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Peer-to-peer (P2P) simulation frameworks are excellent tools for developing and testing P2P algorithms, however there has been very little work done on validation of the models within these frameworks. Validation of these models is an important issue, as without knowing the models are valid we can not necessarily rely on the results generated using such models. In this work we provide an independent...
For smart traffic scenarios, communication between traffic participants is of high importance. Classical approaches (e.g. for information about congestions) employ a server-based architecture, which raises scalability and privacy concerns. In this paper, we propose OverDrive, a decentralized overlay-based geocast service that is applicable in smart traffic scenarios and not prone to the shortcomings...
In this paper, PAFusion, a power-aware framework for distributed data fusion applications in wireless sensor networks is proposed. It is designed for mapping distributed data fusion application into networks. We have evaluated the performances of PAFusion compared to DFuse and optimal solution through simulation. The simulation results show PAFusion has better performances than DFuse and PAFusion...
Traditional DHT structures provide very poor support for range queries, since uniform hashing destroys data locality. Several schemes have been proposed to overcome this issue, but they fail to combine load balancing, low message overhead, and low latency in search operations. In this article we present DRing, an efficient layered solution that directly supports range queries over a ring-like DHT...
In mobile ad hoc networks, the status of the network changes over time due to the movement of terminals, the battery level of terminals, and so on. To construct assurance networks, it is necessary to consider the requirements such as dependability, security, and adaptability against the change of the network. We have proposed a new routing method, which is referred to as MLR (Micro Loop Routing) for...
In this paper, a performance evaluation of the Routing Protocol for Low power and Lossy Networks (RPL) in a typical outdoor Smart Grid Substation Network is presented. Detailed simulations are carried out to produce several routing performance metrics using real-life scenarios. The real outdoor network was reproduced in simulation with the help of topology and link quality data gathered from the network...
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. It is the most challenging work in wireless networks and the routing layer attracts more eye than others. AODV is one of a typical kind of routing protocols among these. This paper labors the local repair mechanism of AODV. And two kinds of improved mechanism are presented. More important, an optimized...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.