The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Locks have been widely used as an effective synchronization mechanism among processes and threads. However, we observe that a large number of false inter-thread dependencies (i.e., unnecessary lock contentions) exist during the program execution on multicore processors, thereby incurring significant performance overhead. This paper presents a performance debugging framework, PerfPlay, to facilitate...
It is crucial to guarantee content integrity in Named Data Networking(NDN), where copies of the contents are distributed over the network. NDN adopts digital signatures, and contents are verified whenever they are stored in caches. However, the current scheme is not practical in practice since its operations incur too much overhead. In this paper, we suggest a simple but effective solution for content...
Current intra-domain routing protocols computes only shortest paths for any pair of nodes which cannot provide good fast reroute when network failures occur. Multipath routing can be fundamentally more efficient than the currently used single path routing protocols. It can significantly reduce congestion in network by shifting traffic to unused network resources. This improves network utilization...
The Internet is playing an increasingly crucial role in both personal and business activities. Handling link failures is an important task in designing routing protocols. To enhance the network availability without incurring significant extra overhead, we propose a novel link protection algorithm, Hybrid Link Protection Scheme (HLP) to achieve failure resilient routing.
Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in network topology occurs at a comparable time scale to nodal dynamics. Coevolutionary modeling offers the possibility to better understand how and why network structures emerge. For example,...
Jobs scheduling and load balancing functionalities are crucial for best Grid performance and utilization. In this paper, we present a dynamic and adaptive polyhedron topology-aware Grid load balancing method which we called Tun Grid. Its main objective is the extreme decentralization of the scheduling and the load balancing processes at the lowest processing and networking cost. It ensures load balancing...
It is well-known that locative prepositions are used to make temporal expressions, and that they have been intensively studied in theoretical, cognitive and psycho-linguistics. However, there have been few attempts to develop a theoretical framework to deal with linguistic data on the locative prepositions (see Piñón (1997), Zwarts and Winter (1997) and Zwarts (2000) for a vector semantics to capture...
Bond percolation is a network process that traditionally addresses the question when there is a path between two sites or two clusters in a network. This has been used to study the circulation of goods or flows in networked structures as well as network resilience. This paper proposes and analyzes a dynamic bond percolation model where bonds (i.e., edges) open (i.e., form) or close (i.e., terminate)...
This work studies how to take the advantage of the centralized network control and management (NC&M) provided by OpenFlow-controlled software-defined elastic optical networks (SD-EONs) for online spectrum defragmentation. We design a control plane framework, and conduct control plane experiments in an SD-EON testbed to demonstrate the effectiveness of the framework. Experimental results indicate...
Micro-inverters are widely used in for power conversion from photovoltaic panels and fuel cells. The flyback based differential inverter is a good candidate for micro-inverters as it provides the necessary isolation required for safety. In this paper, an active power decoupling control method is adopted in order to minimize the pulsating power between the renewable energy source and the grid. The...
The proposed architecture of the Advanced Metering Infrastructure (AMI), presented in this paper, introduces new hierarchical layers in the Smart Metering System. This implies distributed implementation of the traditional data-concentrator functions as basic functionalities and advanced Smart Metering functions in the form of Transformer Station Data Concentrator (TSC) and Local Metering Concentrator...
A novel high step-up three-port converter is proposed in this paper. By utilizing coupled-inductor technique, voltage lift technique and multi-winding technique of coupled-inductor. However, main switch suffer from high voltage spike during the turned-off period. Hence, for suppressing and recycling the energy, the clamp circuit technique is applied. Finally, the prototype of the proposed converter...
SQL injection attack poses a serious security threats among the Internet community nowadays and it's continue to increase exploiting flaws found in the Web applications. In SQL injection attack, the attackers can take advantage of poorly coded web application software to introduce malicious code into the system and/or could retrieve important information. Web applications are under siege from cyber...
The desire to move the applications from on-premise to cloud or to move it between the clouds gives a precious freedom to the clients and enables them to freely change the cloud service provider. The ability to move the application is a hot research topic and is not solved completely yet, neither by the vendors, since they prefer client lock-in, nor by cloud providers, that have great challenges to...
Communication networks are prone to failures due to targeted attacks or large-scale disasters. Networks can be improved to withstand challenges using mechanisms such as diversity, which can simply be improved by adding links, however achieving maximum resilience is not feasible due to limited budget. Therefore, algorithms that improve the diversity of networks cost-efficiently are necessary. In this...
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should consider when building networks. We develop a heuristic algorithm that balances the centrality of networks by adding a set of links that minimizes the variance of graph centrality measures in a least costly fashion...
An effective voltage regulation circuit for inductive power transfer systems was proposed in this paper. The circuit takes the advantage of the secondary coil and a switch component and a capacitor was added. The relationship between output voltage and duty cycle of switches was analyzed and verified by simulation.
The efficiency of communication between devices in low-speed networks is very important for their period of performance and life expectancy. In addition, development, simulation and optimization of new researching models before their practical realization leads to reduction of time and considerable financial resources. Here we explore energy efficiency of low-speed network configurations based on...
Adaptive networks are common in real world, describing networks whose links change adaptively with respect to its states, resulting in a dynamical interplay between the state and the topology of the network. Recently, it is demonstrated that the diversity in the interaction intensity is also the crucial feature that reflects the complexity. In fact, when topology alters, the strengths of the connections...
Growing performance gap between processors and main memory has made it worthwhile to consider off-chip data accesses in multi-query processing [2], [1], [3]. Exploiting data-sharing opportunities among concurrent queries can be critical for effective utilization of the underlying shared memory hierarchy. Given a set of queries, there may be a common retrieval operation for several cases to the same...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.