Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It is crucial to develop feasible methodologies and techniques for accurately analyzing, predicting end-to-end delay performance over multi-hop network communication paths. In this work, we develop a multi-hop packet delay bound violation model to predict the packet loss probability and end-to-end video distortion for video streaming over multi-hop networks. To this end, we extract salient features...
The primary goal of this research is to discussed the behavior of the group of patentees in the problem of "delay" during the process of technology transaction. By considering bounded rationality of the patentees, a model of evolutionary game is founded to analyze the strategy choice of individual patentees, regarding the probability of infringement by purchasers as exogenous variable. Results...
In this paper, we develop a performance analysis framework for wireless mesh network(WMN) based on stochastic network calculus(SNC). Consider that WMN has the characteristic of traffic self-similarity, we use Fractional Brownian Motion(FBM) model to describe the input traffic as a self-similar input process, and we derive statistical traffic envelope and statistical service curve. Then we provide...
The exact Markov modeling analysis of erasure networks with finite buffers is an extremely hard problem due to the large number of states in the system. In such networks, packets are lost due to either link erasures or blocking by the full buffers. In this paper, we propose a novel method that iteratively estimates the performance parameters of the network and more importantly reduces the computational...
Delay and Tolerant Networks (DTNs) have been proposed to address data communication challenges in network scenarios, where no instantaneous end-to-end path is guaranteed because of frequent and long duration network partitions. Typical protocols forward a message to multiple nodes to improve message delivery rate. However, a large number of replications of original messages consume a large amount...
In a Multi-Processor System-on-Chip (MPSoC)-based embedded system with Network-on-chip (NoC) as the communication architecture, routing of the communication traffic among the Processing Elements (PEs) contributes significantly to the overall latency, throughput and energy consumption. Design of an efficient routing algorithm for NoC requires a thorough understanding of the role of individual components...
In this paper, we investigate the design and performance of multi-path routing in optical wavelength division multiplexed (WDM) networks, that support traffic grooming. A circuit-switched network is considered, where connection requests arriving to the network have to be allotted an end-to-end path carrying the requested bandwidth. Traffic grooming implies that the capacity of a wavelength on a fiber...
A novel method is proposed in order to calculate the probability of an SET resulting into SEU. The method is proposed to calculate the propagation of SET to the output gate at any time instant within the latching window. The method uses symbolic simulation and disjoint covers of appropriately formulated functions to take into consideration re-convergent paths and therefore more accurate calculations...
Recently, Vehicular ad hoc networks (VANETs) have started receiving significant attention from both academia and industry. In order to support safety related applications in delay tolerant networks, the design of an efficient routing protocol for VANETs is extremely crucial. The main requirement for all routing protocols is to achieve minimum delay with minimum consumption of network resources. In...
In this paper a new approach for predicting the project duration is introduced. Fuzzy values with beta shape memberships are used - Instead of using the pessimistic, most likely and optimistic values - for estimating the durations of activities. Also the possibility of performing any activity in estimated duration is taken to account by using beta shape memberships for a reliable estimating of activity...
As the number of requiring multimedia streaming and broadcasting such as IPTV through wireless access network, to provide efficient mobility in access network can be important issue. Proxy Mobile Internet Protocol (PMIP) is aimed for network side mobility support without Mobile Node side processing. In this paper, we extended our previous work by developing mathematical analysis which contains 2 state...
The delay-probability-distribution-dependent robust stability problem for a class of uncertain stochastic system with time-varying delay is investigated. The information of probability distribution of the time delay is considered and transformed into parameter matrices of the transferred stochastic model. Based on the Lyapunov--Krasovskii functional and stochastic stability theory , a delay-probability-distribution-dependent...
We propose RBLA2, a Bi-directional RPROB-based Location Anonymizer system for location-based services. Our proposed system provides location privacy not only when users are forwarding requests to location-based services but also when these services deliver messages to the users using two similarly structured components that are based on a RPROB framework and global dummy generation. The system overcomes...
This paper analyzes the loss process distribution of a finite buffer queue. In contrast to the previous work that assumed the buffer can merely store finite number of packets, our model adopts the bounded delay policy where only the packet arrival finding its delay not exceeding a preset value is admitted into the buffer. The quantity of interest is the probability distribution of the number of lost...
We propose a Petri-net-based approach for reliability prediction of composite service built on WS-CDL. To quantitatively investigate the reliability of composite services, we first give a set of translation rules to map WS-CDL elements into generalized-stochastic-petri-nets (GSPN). Based on the GSPN representation, we introduce the prediction algorithm to calculate the process-normal-completion probability...
This paper proposes new MAC layer based back-off and retransmission strategies for throughput enhancement, in broadcast transmissions of inter vehicular communication. We present adaptive back off strategy which is based on the concept that there exists an optimum contention window (CW) period in a broadcast CSMA/CA system, given the fixed number of users. We also propose a simple probabilistic approach...
We develop an accurate analytical model for a dedicated short range communication (DSRC) network that uses the IEEE 802.11 distributed coordination function (DCF) MAC protocol, as adopted by the forthcoming IEEE 802.11p specification for DSRC. The specific focus is on broadcast vehicle-to-vehicle safety messages. We derive explicit expressions for the mean of the total packet delay and the packet...
In this paper we present a novel black box testing method for the performance validation of systems implementing a communication protocol. Our method solves the main problem of this kind of performance testing, namely its ad-hocness, by proposing a theoretical background for it. As a part of the presented methodology, we show how to map two kinds of performance requirements to a performance model...
Fractional Brownian motion (fBm) became known as a useful model for Internet traffic incorporating its self-similar and long-range dependent properties. In this paper we derive end-to-end performance bounds for a through flow in a network of tandem queues under fBm cross traffic. We build on a previously derived sample path envelope for fBm, which possesses a Weibullian decay of overflow probabilities...
A social-based routing protocol for opportunistic networks considers the direct delivery as forwarding metrics. By ignoring the indirect delivery through intermediate nodes, it misses chances to find paths that are better in terms of delivery ratio and time. To overcome this limitation, we propose to incorporate transitivity, which considers the indirect delivery through intermediate nodes, as one...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.