The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
Data replication is a well-known strategy to achieve the availability, scalability and performance improvement goals in the data management world. However, the cost of maintaining several database replicas always strongly consistent is very high. The CAP theorem shows that a shared-data system can choose at most two out of three properties: consistency, availability, and tolerance to partitions....
State monitoring is widely used for detecting critical events and abnormalities of distributed systems. As the scale of such systems grows and the degree of workload consolidation increases in Cloud data centers, node failures and performance interferences, especially transient ones, become the norm rather than the exception. Hence, distributed state monitoring tasks are often exposed to impaired...
A Service-Based Application (SBA) is built by defining a workflow that composes and coordinates different Web services available via the Internet. In the context of on-demand SBA execution, suitable services are selected and integrated at runtime to meet different non-functional requirements (such as price and execution time). In such dynamic and distributed environment, an important issue is to guarantee...
Considering physical sensors with certain sensing capabilities in an Internet-of-Things (IoT) sensory environment, in this paper, we propose an efficient energy management framework to control the duty cycles of these sensors under quality-of-information (QoI) experience in a multi-task-oriented IoT sensory environment. Contrary to past research efforts, our proposal is transparent and compatible...
Service providers are experiencing a challenge that is caused by the explosive growth in demand for high-speed connections to and across metropolitan, regional and core networks. Operators are under pressure to increase the capacity of their networks to meet these ever growing requirements. To improve service agility and network efficiency and reduce costs throughout their entire infrastructures,...
HTTP Adaptive Streaming (HAS) is rapidly becoming a key video delivery technology for fixed and mobile networks. However, today there is no solution that allows network operators or CDN providers to perform network-based QoE monitoring for HAS sessions. We present a HAS QoE monitoring system, based on data collected in the network, without monitoring information from the client. To retrieve the major...
Network resources are often limited, so how to use them efficiently is an issue that arises in many important scenarios. Many recent proposals rely on a central controller to carefully orchestrate resources across multiple network locations. The central controller gathers network information and relative levels of usage of different resources and calculates optimized task allocation arrangements to...
In order to access to the time-Delay Performance of the Wireless Sensor Network, respectively preformed the time-delay experiment, simulation and theoretical analysis from the following aspects: the hops and hop spacing, MAC dormancy mechanism, back-off time and transmitted power, etc. Obtained the relations between the time-delay and the above factors. Systematically summed up the time-delay rules...
In this paper, we present the use of a system aimed at improving the productivity of equipment, piloted at an Intel production facility for 300mm 45nm high volume manufacturing. We show that true toolset utilizations may be significantly lower than what is recorded, owing to various process and tool-related delays that occur during the tool ‘busy’ or ‘running’ state. We then demonstrate through a...
Sensor networks are exposed to hostile environments that may cause failures of single nodes and communication links which affect the whole network. Localizing the cause of the problem in space and time requires to collect diagnostic data from the network. Due to resource and energy constraints, however, it is not possible to continuously collect detailed diagnostic data from all nodes. We therefore...
Abstract: In view of using symmetrical normalization for smaller deviation than standard normalization for the multi-tau photon correlator in the whole delay time range but need more monitor channels. We suggest employing symmetrical normalization when the lag time larger than 16384 and standard normalization smaller than 16384. Deviation of symmetrical normalization and standard normalization was...
An important characteristic in trust management frameworks is how nodes obtain information about the trustworthiness of other nodes. Some trust management models are based on local information, while others use both information of neighbors and remote nodes. Despite the wide of information used, the existing trust monitoring approaches are mainly based either on passive monitoring mechanisms or on...
Body Area Networks (BANs), targeting everywhere anytime health monitoring, operate in license-exempt frequency bands. They require a cross layer design that jointly considers the requirements of (1) access delay to the medium and (2) packet delivery ratio (PDR). In this paper, we experimentally evaluate the PDR of a BAN under static and dynamic scheduling schemes. Investigations show that static multi-hop...
Today's competitive business climate and the complexity of IT environments dictate efficient and cost effective service delivery and support of IT services. This is largely achieved through automating of routine maintenance procedures including problem detection, determination and resolution. System monitoring provides effective and reliable means for problem detection. Coupled with automated ticket...
Many applications process data in which there exists a ``conservation law'' between related quantities. For example, in traffic monitoring, every incoming event, such as a packet's entering a router or a car's entering an intersection, should ideally have an immediate outgoing counterpart. We propose a new class of constraints -- Conservation Rules -- that express the semantics and characterize the...
Power, especially that consumed for storing data, and cooling costs for data centers have increased rapidly. The main applications running at data centers are data intensive applications such as large file servers or database systems. Recently, power management of the data intensive applications has been emphasized in the literature. Such reports discuss the importance of power savings. However, these...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
As process technology continues to shrink, Negative Bias Temperature Instability (NBTI) has become a major reliability issue in CMOS circuits. NBTI degrades the threshold voltage of the PMOS transistor and, over time, causes the operating speed of the circuit to become slower (also known as the aging effect). In this paper, we introduce a new aging-aware Flip-Flop (FF) that is based on accurate, run-time...
In IEEE 802.16 e/m mobile broadband wireless systems, mobile subscriber stations (MSSs) are encouraged to enter the sleep mode for energy saving when end users do not have downstream or upstream traffic. To avoid service disruption of an MSS which stays in the sleep mode, IEEE 802.16 e/m specifies a two-way handshake protocol between the base station (BS) and an MSS. After performing the handshake...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.