The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Adopting high-degree topologies is a promising way to reduce end-to-end latency in a network-on-chip (NoC). However, some high-degree topologies are not used in practice due to their complex layout on a chip. In this work we explore the way to systematically obtain the quasi-optimal mapping of those topologies onto a chip by modelizing the mapping problem as a quadratic assignment problem. Results...
In this paper we propose an efficient scheme for supporting multi-path based in-network content caching by leveraging Loop-Free Alternate (LFA) in IP routing. The purpose is to enable clustered distribution of cached content chunks at en-route routers between the content source and the requester. In order to achieve caching localization, we also introduce policies that limit the maximum allowable...
Recently, the demands of resource sharing and cooperation across multiple HPC centers are growing rapidly. Such multi-cluster HPC systems provide much more computing resources than single cluster. It challenges the scalability and performance of current parallel computing tools, especially the collective communication of parallel applications. This paper focuses on the optimization of collective communications...
The Content Centric Networking (CCN) architectural framework is designed with the central abstraction of content distribution rather than host-to-host connectivity. CCN has several advantages such as inherent router caching, lower content retrieval time and network load reduction. However, it also faces various challenges such as scalability, deployment and storage issues. In particular, the routing...
It is a common view that users' browsing behaviors reflect their true interest in commodities at an e-commerce site. With the development of E-commerce, users' detailed navigating and purchasing behaviors can be completely stored. Clickstream data are records of users' browsing behaviors, which provide information about the path viewed by users and their access time on each page. Usually, personalized...
Ensuring efficient and fast data aggregation technique is the challenging task when it is considered for the large-scale wireless sensor network (WSN). The problems of presence of single sink, the distance between sink and cluster, as well as type of presence of dynamic task to be performed within different cluster is extremely difficult to address for reliable data aggregation technique in WSN. Therefore,...
Distributed mutual exclusion is a basic building block of distributed systems that coordinates the access to critical shared resources. This work introduces a novel permission-based k-mutual exclusion algorithm for distributed systems with crash faults. Processes monitor each other and organize themselves on an adaptive virtual topology that is based on the hypercube and presents several logarithmic...
Wireless sensor networks (WSNs) are used to continuously monitor certain area of interest and send data back to the base station for processing. In many applications, WSNs serve in inhospitable environments where multiple node failure may take place causing the network to be divided into disjoint segments. Also, multiple standalone WSNs in some applications may need to be federated to collectively...
The identification of vessel collision risk for a Maritime Intelligent Transport System (MITS) is crucial for maritime safety and management. This paper considers the identification of the Systematic Collision Risk (SCR) for an MITS based on AIS data, which is obtained by wireless communication among vessels and between vessels and shore-based stations. SCR is modeled as a function of the collision...
Disjoint Wireless Sensor Networks (WSNs) can be reconnected by placing additional relay nodes in the damaged areas. However, in some cases there may not be enough relays to reconnect all the partitions with the sink node. In such a case, some of the relays can exploit their motion capabilities and temporarily act as a mobile data collector (MDC) between partitions providing intermittent connectivity...
Wireless Sensor Networks (WSN) that operate unattended in harsh environments are susceptible to large scale damage, where many nodes fail simultaneously and the network gets partitioned into several disjoint segments. Restoring connectivity of structurally damaged WSN's segments may be urgent considering that they are employed to assist in risky missions. To deal with these scenarios, Mobile Data...
Because of the limited energy of sensor node in the wireless sensor network, this paper proposes a clustering algorithm of wireless sensor network based on maximal weighted minimal domain set. Considering the efficiency of energy, the algorithm begin from the Sink node, and flood each node in the network, select the node with high residual energy as the cluster head node and relay node, and finally...
One of the main challenges of network virtualization is the mapping of virtual network demands to physical network resources, commonly known as the virtual network embedding (VNE) problem. This paper introduces DPVNE, a distributed, parallel and generic VNE framework. DPVNE can be used 1) to run various cost-reducing embedding algorithms 2) in a distributed way. Thereby, computational load for embedding...
The aim of this paper is to demonstrate the feasibility of using Self Organizing Map for hyperspectral image classification. Self organizing maps are widely used for dimension reduction, clustering techniques and classification. This paper describes a modified SOM algorithm for learning process, and its use for hyperspectral classification.
As technology scaling, three-dimensional integrated circuits (3D-ICs) are emerging as a promising solution to address the challenges in system on chips (SoCs). Moreover, it's a necessity to design an efficient Network-on-Chip (NoC) topology for the interconnection issues of 3D SoCs. In this paper, we propose a topology-aware floorplanning method to determine the power-performance efficient 3D NoC...
The network topologies enhancements are necessary in correspond to the growing of data networks. In this paper, large network problem is described. It includes the routing update cost. The concept of hierarchical network is explained as a considered solution. The hierarchical routing algorithms working methodology and protocols are presented and compared. In addition, it provides a sufficient description...
Wireless sensor nodes are severely constrained by energy consumption as they are battery powered. Most topology control techniques that are used for energy conservation assume that the sensor nodes are uniformly deployed, mostly in form of grids. In a real world scenario a grid based deployment presents its own set of problems and limitations. The current paper proposes improvement over a block cellular...
Understanding network structure and having access to realistic graphs plays a central role in computer and social networks research. In this paper, we propose a complete, practical methodology for generating graphs that resemble a real graph of interest. The metrics of the original topology we target to match are the joint degree distribution (JDD) and the degree-dependent average clustering coefficient...
In this paper we review state-of-the-art botnet detection algorithms that reveal the control traffic of malicious peer-to-peer (P2P) networks by targeting topological properties of their interconnectivity graph. This class of detection methods does not rely on the exchanged content and therefore is also applicable to encrypted control traffic. However, in practice, an ISP monitoring customer traffic...
Wireless Sensor Networks (WSNs) consume a lot of energy in infrastructure creation and maintenance which also include topology control, i.e., coverage and connectivity. Several sleep-based topology control protocols have been proposed for better performance. While the existing protocols serve their purpose, they still consume high energy. We propose an energy-efficient protocol for Coverage, Connectivity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.