The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WiMAX is one of the most interesting solutions for broadband wireless access, offering QoS features for multimedia traffics and applications. However, without the definition of a mandatory scheduling algorithm for the assignment of channel resources, WiMAX standard is open to enhancements by QoS research groups and developers. In this paper, BS uplink scheduling algorithms are considered and an innovative...
Besides avoiding inter-symbol interference and leading to high capacity, wireless orthogonal frequency division multiplexing (OFDM) provide fine granularity for resource allocation since they are capable of dynamically assigning sub-carriers to multiple users and adaptively allocating transmit power. The current dominate layered networking architecture, in which each layer is designed and operated...
Processor cores in a chip multiprocessor (CMP) typically share a large last-level cache and the off-chip memory bandwidth. Previous studies demonstrate that explicit cache capacity and off-chip bandwidth partitioning can yield better overall system performance than without partitioning. However, little work has been done to study the interaction between cache capacity partitioning and off-chip bandwidth...
Some current Internet applications (e.g., Grid/Cloud computing storage, video-conference) demand service differentiation, not only in terms of packet forwarding, but also at the connection level. To satisfy the demands for delay-sensitive and low-blocking applications, immediate reservation (IR) and advance reservation (AR) can be performed. Independent resource reservation of each type of network...
Location-based channel access protocols have been proposed as a means to broadcast safety related messages through inter-vehicle communications. The protocols divide the road into fixed-size cells and assign a channel to each cell. To broadcast, a vehicle would use the channel assigned to the cell it is currently traveling within. To improve bandwidth utilization, a vehicle may acquire channels dynamically...
The growing use of virtualization technologies in settings such as multi-tenant compute and storage clouds challenges us to both specify and enforce the isolation of clients sharing network and compute resources. In this paper we propose a novel analytical measure of performance isolation for shared resource systems serving multiple traffic flows or computing workloads. By basing our measure on well-known...
We present an algorithm to assign time slots to nodes in a TDMA network that minimizes the jitter in time slot assignments. By reducing the jitter in time slots around the TDMA frame, we can provide more consistent network access and reduce the overall delay seen by an application with time-varying traffic patterns, such as normal web traffic. Our algorithm can reduce the average delay seen by all...
The paper presents work-in-progress on the cloud service provisioning across multiple cloud providers. The work assumes the emergence of Cloud Brokers between customers and cloud providers. The brokers split user requests and ensure provisioning from multiple providers. An exact splitting algorithm is developed to efficiently split the cloud requests among the multiple cloud platforms with the aim...
Cooperative wireless networks supporting multiple services necessitate the application of a robust bandwidth allocation policy to ensure Quality of Service (QoS) provision to different applications. In this work, a load dependent bandwidth allocation technique is presented considering traffic priority and buffer load in the relay nodes of a cooperative communication network. An analytical approach...
The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising concern of fairness amongst various...
By supporting advanced multimedia applications and multitasking, recent Smartphone operation systems offer great flexibility to the users but make these devices even more difficult to serve. Now, operators of cellular networks face a situation where many applications and services generate highly heterogeneous and bursty traffic patterns. To cope with this challenge, we introduce Context-Aware Resource...
With the rapid advance in the technology area of data storage, storage capacities have increased substantially while the price has been dropping fast. Motivated by this trend, it has been proposed in the Cache-and-Forward architecture that storage is incorporated into each intermediate CNF router. Content can be cached at CNF routers when they flow through the network, and therefore, routers can serve...
Bursty workloads are often observed in a variety of systems such as grid services, multi-tier architectures, and large storage systems. Studies have shown that such burstiness can dramatically degrade system performance because of overloading, increased response time, and unavailable service. Computing grids, which often use distributed, autonomous resource management, are particularly susceptible...
Long Term Evolution (LTE) is considered one of the main candidate to provide wireless broadband access to mobile users. Among main LTE characteristics, flexibility and efficiency can be guaranteed by resorting to suitable resource allocation schemes, in particular by adopting adaptive OFDM schemes. This paper proposes a novel solution to the sub-carrier allocation problem for the LTE downlink that...
This paper focuses on the berth allocation problem in the container terminal, considering fuel consumption and vessel emissions. By regarding the arrival times of vessels as decision variables and introducing the relationship between the fuel consumption rate and the sailing speed in the form of general power functions, we obtain a more elaborate model on the berth allocation, considering fuel consumption,...
Distributed spatial diversity systems, such as multi-relay and multi-user networks, have drawn significant attention from the research community. However, their feasibility in a practical environment remains an open concern. Most notably, how to optimize cooperation between multiple users with individual interests and how practical systems issues can erode diversity gains. Whilst existing information...
In this paper, we proposed a rate-allocation based congestion control approach, called multi-path-congestion control method (MUCON for short), which enforcing high path availability of packet delivery for event-driven Wireless Sensor Networks (WSNs) consists of two parts. The first is constructing a spanning tree to connect all sensor nodes of a WSN to the sink for initial routing. The second is establishing...
We address the problem of minimum average packet delay of Multi-hop Wireless Networks (MWN) which uses network coding. Our objective is to allocate capacities to different wireless nodes in a way that the average packet delay in the network is minimized under the assumption that the network topology, the traffic matrix in the network, and routing are given. Exploiting queueing theory as well as wireless...
This paper proposes an analytical framework for engineering a star wireless infrastructure for smart power grids based on OFDMA access technology (e.g., WiMax or LTE technology). The considered network model can represent the last-mile (i.e., local area networks) or high speed backhaul part of the power grid communications infrastructure. This proposed analytical framework would be useful in designing...
The emerge and development of assurance of internal control are aimed at improving the quality of accounting information, reducing information asymmetry of capital market and then protecting the benefits of investors. From the standpoint of disclosure, this paper objectively inspects the effect of assurance of internal control on the quality of accounting information, based on the empirical analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.