The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Balancing the load in content addressing schemes for route-restricted networks represents a challenge with a wide range of applications. Solutions based on greedy embeddings maintain minimal state information and enable efficient routing, but any such solutions currently result in either imbalanced content addressing, overloading individual nodes, or are unable to efficiently account for network dynamics...
The backpressure algorithm has been widely used as a distributed solution to the problem of joint rate control and routing in multi-hop data networks. By controlling a parameter V in the algorithm, the backpressure algorithm can achieve an arbitrarily small utility optimality gap. However, this in turn brings in a large queue length at each node and hence causes large network delay. This phenomenon...
Network providers now want to enable users to define their own flow priorities, and commercial devices already implement this ability. However, it has been shown that directly applying arbitrary user-defined priorities can fundamentally destabilize a network. In this paper, we show that it is possible to apply user-defined priorities while keeping the network stable. We introduce U-BP, a scalable...
Load balancing is an important activity in distributed systems. At a high-level of abstraction, this problem assumes processes in the system begin with a potentially uneven assignment of “work” which they must then attempt to spread evenly. There are many different approaches to solving this problem. In this paper, we focus on local load balancing — an approach in which work is balanced in an iterative...
In this paper, we study how to perform traffic engineering at an extremely-small time scale with segment routing, addressing a critical need for modern wide area networks. Prior work has shown that segment routing enables to better engineer traffic, thanks to its ability to program detours in forwarding paths, at scale. Two main approaches have been explored for traffic engineering with segment routing,...
Cache policies to minimize the content retrieval cost have been studied through competitive analysis when the miss costs are additive and the sequence of content requests is arbitrary. More recently, a cache utility maximization problem has been introduced, where contents have stationary popularities and utilities are strictly concave in the hit rates. This paper bridges the two formulations, considering...
Learning distributed representations of symbolic data were introduced by Hinton[1], and first developed in modeling networks for learning the node vectors by Perozzi et al (2014). In this work, we proposed Dnps, a novel nodes embedding approach for acquiring distributed representations of large-scale dynamic social networks. Dnps is suitable for many types of social networks: dynamic/static, directed/undirected,...
Network Function Virtualization (NFV) has the potential to significantly reduce the capital and operating expenses, shorten product release cycle, and improve service agility. In this paper, we focus on minimizing the total number of Virtual Network Function (VNF) instances to provide a specific service (possibly at different locations) to all the flows in a network. Certain network security and analytics...
The objective of this paper is to propose the rule-based algorithmic approach for solving problems of faults influence on the service quality in access networks. In this paper the graph oriented model for network and communication services representation, the rule-based system and corresponding output mechanism, the algorithms for the faults impact analysis based on graph traversal schemes are proposed...
Next generation (5G) mobile communication systems has a goal of ultra-high peak data rate. Ultra-Dense Network (UDN) is viewed as one of the key technologies to meet this challenge. The trend of network densification brings more complex interference. To solve this problem, a novel user-centric virtual cell design is proposed. Considering the changes of virtual cell load, we propose a load-aware virtual...
The app repackaging has became one of the most serious problems on Android platform nowadays. In the past, most of studies focus on the code detection, which deals with the billion opcodes, thus time consumption is expensive. Besides, it lacks the resistance to code obfuscation and hardening technology thus accuracy will easily be affected. Recently, UI-based detection was proposed. Some dynamic UI-based...
In this paper, we present a dynamic power adjustment (DPA) scheme for a reader to speed up the tag identification (ID) time in a RFID system. By using TDMA frames, the proposed DPA can adaptively increase or decrease the transmission power of a reader. A factor is designed to adjust the transmission power of a reader by considering two aspects. The first aspect increases the power to read more tags,...
In recent years, Wi-Fi based indoor localization using received signal strength (RSS) gets considerable attention. However, RSS based Wi-Fi localization at 2.4GHz is highly susceptible and unstable. We proposed dynamic machine learning approach (DMLA) at 5GHz to effectively localize Wi-Fi users by means of feed-forward neural network algorithm. The simulation result shows that 90% of tested result...
In today's technology, the data collection processes have to deal with simultaneous data sources. In order, for the data to be examined or used by artificial learning methods, the data incoming from different sources must be aligned with each other. In this research, participants have worn eye tracker devices and all watched segments in the prepared experimental environment have been recorded as a...
Survivability of contents/files in data centers, when a disaster occurs, is becoming a major challenge in designing cloud-based services. To handle such a situation, a robust communication protocol is needed, so that provisions can be made to allocate an alternative fault-free path, when a disaster disrupts the path used for data communication before the disaster occurs. In this work we have presented...
New approaches in image and video processing fields need a synthetic dataset for testing the performance of their algorithms in order to improve their outcomes. Many of these approaches depend on a fixed lighting assumption. In the real world, video surveillance may be exposed to different illumination or lighting conditions. In this paper, an algorithm for generating a dynamic blurry video dataset...
Robust response to crisis situations involving complex, large-scale networks with rapidly changing operational conditions is a fundamental task to be addressed in various task domains, including power systems, computer networks, public health, and many other areas. There are many manifestations of rapid, flexible responses to sudden changes in biological systems, from which we can derive basic principles...
Gesture recognition is one of the emerging fields in industry and a hot research topic in academia. It is commonly used in smart devices to assist the owners in their day-to-day life. But it is also important in facilitating processes in any kind, that involves people. In our attempt at improving life quality for disabled people below the neck, an assistive autonomous powerchair is developed. To ease...
Coordinated Multi-Point (CoMP) systems appear as advanced promising strategies to improve user throughputs, especially in interference limited regions, at cell edge. Whether CoMP consists in jointly processing data from multiple transmission points, or in smartly coordinating the allocation of resources, CoMP implementation requires significant computation effort, signaling exchange that may impact...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.