The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
TCP Retransmission Timeouts (RTOs) related to non-congestion have been reported as one of the main reasons of the performance degradation of TCP in multi-hop wireless networks. In this paper, we introduce an efficient algorithm called TCP NRT (Non-congestion Retransmission Timeouts) which is capable of recovering packets by detecting, differentiating and reacting to congestion as well as non-congestion...
Active Queue Management (AQM) algorithm, as a typical router based congestion control strategy, has been the focus of researchers in the past few years and widely used in congestion control. There are a few drawbacks such as large queuing delay and queue jitter, which cause data retention drop and oscillation. It means that the existing AQM algorithms under high bandwidth can not meet the Quality...
Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only partly connected. In this harsh environment,...
There is little understanding about how network applications can benefit from mathematical/heuristic optimization techniques, such as cross-layer design. We propose CLASS, a component-based framework for evaluating and comparing network optimization techniques, such as cross-layer design. CLASS uniquely integrates network optimization with high-fidelity simulation to provide an “optimize-and-verify”...
Covering both theoretical and practical interest in different networks layers, multicast routing remains an important topic. In network layer, there are several multicast routing protocols using different multicast routing trees in the literature. However PIM-SM and CBT protocols remains the most used multicast routing protocols; they propose using a shared tree (ST). This kind of tree provides efficient...
In MANETs (Mobile Ad-hoc NETworks), communicating nodes are powered by batteries which could not be re-charged in many practical usage scenarios. Hence, maximizing network lifetime is a critical optimization objective in routing protocols design for MANETs. To meet this objective, energy-consumption should be balanced among all mobile nodes. In this paper, we formulate the energy-aware route discovery...
Implementing a variable fractional delay (VFD) filter in Farrow model is costly as each coefficient of a VFD filter is a polynomial rather than a numerical scalar as in a conventional digital filter. This paper presents a method for the design of VFD filters with sparse coefficients which admits efficient implementation. The design is accomplished in two phases with the first phase identifying locations...
Dual threshold voltage (dual-Vth) assignment is recognized as a useful technique to reduce the leakage power. However, as the process technology shrinks to the deep sub-micron regime, the negative bias temperature instability (NBTI) effect becomes a serious concern. The NBTI effect may cause the degradation of threshold voltage over a period of months or years. Since previous dual-Vth assignment techniques...
A novel non-iterative circuit for computing integer square root based on logarithm is proposed in the paper. Mitchell's methods are used for the logarithmic and antilogarithmic conversions. The proposed method merges two conversion stages into a single one to achieve better accuracy with a compact architecture. Hence, the circuit size and latency are reduced. Compared to an existing design based on...
We consider algorithms for a multicore environment in which each core has its own private cache and false sharing can occur. False sharing happens when two or more processors access the same block (i.e., cache-line) in parallel, and at least one processor writes into a location in the block. False sharing causes different processors to have inconsistent views of the data in the block, and many of...
Current trends in multicore research suggest that hundreds of cores will be integrated on a single chip in the near future for increased performance. This new trend presents a set of challenges, one of which is cache distribution among the cores. Network on chip with homogeneous cache distribution among the routers has become mainstream in literature. In this paper, we propose having a heterogeneous...
We revisit the loss reduction problem for network reconfiguration in power distribution systems in this paper. Besides the conventional line power loss (LPL), in our model, we introduce a new concept - the transient power loss (TPL), which is mainly induced by the communication asynchronization and response delay. TPL is often overlooked in previous works because it's hard to measure in the conventional...
Montgomery modular multiplication is widely applied to public key cryptosystems like Rivest-Sharmir-Adleman (RSA) and elliptic curve cryptography (ECC). This work presents a word-based Booth encoded radix-4 Montgomery modular multiplication algorithm for low-latency scalable architecture. The data dependency resulting from the inherent right shifting of the intermediate results in the conventional...
Long Term Evolution (LTE) has been proposed as a promising radio access technology to bring higher peak data rates and better spectral efficiency. However, scheduling and resource allocation in LTE still face huge design challenges due to their complexity. This paper divides the complex problem into three sub-problems: scheduling pattern, scheduling priority and quantity of scheduled data. Based on...
In this paper, we dynamically select the transmission rate and design wireless network coding to improve the quality of services such as delay for time critical applications. With low transmission rate, and hence longer transmission range, more packets may be encoded together, which increases the coding opportunity. However, low transmission rate may incur extra transmission delay, which is intolerable...
Wireless networks possess significant limitations in bandwidth. Additionally, real-time networks cannot tolerate high latency. While some good XML compression algorithms exist, there remains a need for methods that reduce latency and bandwidth usage further in real time wireless applications. This paper presents a new compression scheme which reduces bandwidth while minimizing latency of XML data...
We present a highly available system for environments such as stock trading, where high request rates and low latency requirements dictate that service disruption on the order of seconds in length can be unacceptable. After a node failure, our system avoids delays in processing due to detecting the failure or transferring control to a back-up node. We achieve this by using multiple primary nodes which...
The recent advent of cloud computing technologies has enabled agile and scalable resource access for a variety of applications. Content distribution services are a major category of popular Internet applications. A growing number of content providers are contemplating a switch to cloud-based services, for better scalability and lower cost. Two key tasks are involved for such a move: to migrate their...
The results of packet delay variation analysis for 32×32 crosspoint queued switch with unbalanced arrival traffic are presented in this paper. We analyzed switches with various buffer lengths for fixed-size packet lengths at switch inputs using several scheduling algorithms, i.e., longest-queue-first, round-robin, exhaustive-round-robin and frame-based-round-robin-matching. The results have shown...
This paper investigates the performance on a class of DTCWTs based on the common factor technique. The common factor technique was first proposed in [6] by Selesnick, where two corresponding scaling lowpass filters are required to satisfy the half-sample delay condition, and then was modified to improve the analyticity [9] and frequency selectivity [8]. The analyticity of complex wavelet can be improved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.