The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The assembly line balancing problem (ALBP) consists in finding the best assignment of tasks between several workstations. An evenly distribution reduces idle time and therefore results in more efficient production systems. Although several models have been proposed for ALBP, real lines present restrictions that usually violate simplifications assumptions. This paper presents a hybrid genetic algorithm...
A great number of open source projects are available for developers to reuse. During software development and maintenance, developers can leverage good interfaces in these open source projects and establish the framework of a new project quickly when reusing these open source projects. However, if developers want to reuse them, they need to read a lot of code files and learn which interfaces can be...
Hierarchical address allocation and hierarchical routing design has long been suggested to reduce the forwarding information base (FIB) size in the Internet core. However, the hierarchical design is not put into practice. We implemented the hierarchical and automatic number allocation (HANA) protocol for allocation of IPv4 and IPv6 address spaces to autonomous systems (ASes) and the FIB size reduction...
The new promising technologies in the network communication field bring the possibilities of faster and more safe information sending. However, the new technologies bring up new computation problems as well. The network flow may be organized in a better way with respect to different criteria. It is common that such problems are hard not only because of their size, but also due to their NP-complete...
Alice aims at transmitting Bob a message to be kept secret from Eve, with the assistance of relays operating in a decode-and-forward fashion. Each link between node couples comprises a set of parallel channels. Both Alice and relays knows all legitimate channel gains, while they only have a statistical knowledge of the channels to Eve. By fixing a secrecy outage probability per channel, we optimize...
We propose a linear transceiver scheme for the symmetric two-user multiple access channel with additive white Gaussian noise and quantized feedback. The quantized feedback link is modeled as an information bottleneck subject to a rate constraint. We introduce a superposition scheme that splits the transmit power of each user between an Ozarow-like code (designed for perfect rate-limited feedback)...
In distributed storage systems, a special sub-class of locally repairable codes, known as the availability codes, has been proposed to enable recovery of each data block from multiple, disjoint groups of nodes of small size. Availability codes, thus not only provide good fault tolerance and its efficient maintenance, but also allow access to data by simultaneous users. In this paper, we first analyze...
Relaying techniques are a well investigated subject in literature. The simplest relay channel is a 3-node network and the communication is split into broadcast phase and Multiple Access (MAC) phase. The focus of this paper lies on the MAC part of the relay channel which is a superposition of the source's and the relay's signals. From information theory it is known that a trade-off between distributed...
In this paper we propose a novel co-allocation scheme, called a Reliable Multicast Brute-Force co-allocation scheme (ReMBF for short), which employs a reliable multicast (RM for short) technique with the Brute-Force (BF for short) scheme to accelerate data retrieval and delivery, and reliably transmit data to its users for data grids. Several types of data access patterns, including Zipf-like, geometric,...
The application of video streaming is expected to shift to mobile broadband as soon as the Ultra-dense Networks (UDN) and High Efficiency WLAN (HEW) become popular. The motivation of this paper is to propose a distributed delivery scheme for streaming popular videos over UDN wireless environments. The H.264 SVC scalable source coding and the LT codes of rateless channel coding are both considered...
Scalable High Efficiency Video Coding (SHVC), a new ISO/ITU video compression Standard is an ideal candidate for delivering Ultra High Definition (UHD) or 4k resolution content to the rapidly growing high resolution clients, especially when there is a mix of clients of SD, HD and UHD resolutions. This is especially true for video streaming in overlay or over-the-top (OTT) networks using HTTP or adaptive...
As various types of Internets of Things (IoT) are deployed in a wide range of areas, the need arises to utilize various IoT resources dynamically to accomplish user tasks. We call this environment an urban-scale IoT environment, where various IoT resources that are necessary to accomplish user tasks are directly connected to each other via users' mobile devices, such as their smart phones. IoT resources...
In this paper, we introduce new solutions to handle real-time video traffic, such as video conferencing, in the future software-defined radio access networks. The real-time video is well-known for its high peak-to-mean rate ratio. This is a major challenge for traffic engineering and radio resource allocation, especially in small cell radio networks. We first propose an online method to dynamically...
For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities. Although many techniques have been proposed to address the problem, they mostly introduce a very high overhead while others assume the availability of a separate system to pinpoint attacks or provide detailed traces for defense generation, which is very slow in itself and requires considerable...
Survivable routing methods have been thoroughly investigated in the past decades in transport networks. However, the proposed approaches suffered either from slow recovery time, poor bandwidth utilization, high computational or operational complexity, and could not really provide an alternative to the widely deployed single edge failure resilient dedicated 1 + 1 protection approach. Diversity coding...
Recent studies observe that competing adaptive video streaming applications generate flows that lead to instability, under-utilization, and unfairness in bottleneck link sharing within the network. Additional measurements suggest there may also be a negative impact on users' perceived quality of service as a consequence. While it may be intuitive to resolve application-generated issues at the application...
We consider the real time transmission of scalable multimedia data with a constrained end-to-end Quality of Service. In the Rayleigh channel case, the resulting optimization problem is solved by the Flexible Transmission (FT) algorithm. This resources allocation strategy allows to transmit the sole layers with guaranteed QoS at the receiver. Here, we propose to extend the FT method to the OFDM case...
Video multicast exploits the wireless broadcast nature to transmit a video stream to multiple clients with a minimum bandwidth requirement. Scalable video coding (AMC) and Adaptive Modulation and Coding (AMC) are two key techniques for video multicast in broadband wireless networks. They improve the system utility value by dividing the video steam into different layers and assigning appropriate modulation...
This paper proposes a global rate control scheme to maximize the overall encoding quality of a network-based video composition system. The input video sources are encoded using HEVC. The rate-distortion function for each input video source is modelled based on the known PSNR and bitrates at two quantization points and the R-λ model in HEVC. By solving an R-D optimization problem, the proposed scheme...
Given the large investments in Enterprise Social Media technologies in organizational settings, this paper sets out to explore the challenges and opportunities that ESM technologies provide for organizational communication. Merging existing conceptual work on ESM with findings from thirteen appreciative interviews with professionals from a large multinational organization, our papers offers six areas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.