The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the problem of two identical machines scheduling that jobs are processed under a grade of service (GoS) provision. The jobs arrive over time and the two machines can be idle at the same time only when all the jobs arrived are completed. To our best knowledge, this problem has never been studied so far. For the problem with objective makespan minimization, we prove that any...
Geographical load balancing (GLB) is widely established by cloud providers, to exploit the differences in electricity price, local green energy generation, transmission delay and cost etc across geographically dispersed data centers (DCs). With GLB, a cloud provider can achieve reduction of electricity cost or/and bandwidth cost or/and delay cost. However, these objectives are not independent from...
The rapid development of intelligent terminals and mobile Internet industry has brought many challenges and opportunities to the mobile network. Mobile Network Open Services can provide users and developers with the open resources consisted of network infrastructure, network data and diversified services, so as to build an open, flexible, collaborative Internet ecosystem. The ability to open the mobile...
This paper presents an innovation in the implementation of RFID in terms of authentication and offline intelligent payment system in public transport, Bus Rapid Transit (BRT), for the academicians. The authentication is conducted using a contactless smart card as an e-ticket as well as an identity card. Contactless smart cards can be obtained through the registration process on the administrator to...
Multi-Tenant Data Center (MTDC) operators can increase their profits by oversubscribing their power infrastructure. However, without an appropriate power control mechanism, oversubscription can lead to expensive unplanned service outages. We propose a new power control mechanism, LOCAP (LOCAl Price for power), as a means of 1) incentivizing tenants to reduce power use to save energy and 2) controlling...
Smart-home is becoming increasingly popular in recent years, and it introduces a new content retrieval paradigm - delay-insensitive downloading. In this new paradigm, users do not require the content retrieval task to finish as soon as possible, but only set a deadline for it. We study the role of this paradigm in the traffic engineering of a chunk-based cloud storage service. We propose that it could...
Content-Centric Networking (CCN) is a promising framework for the next generation Internet architecture, by exploiting ubiquitous in-network caching to minimize content delivery latency and reducing the network traffic. In this paper, we introduce a neighborhood aware mechanism for content caching, named Neighborhood Aware Caching and Interest Dissemination (NACID) that accounts for the popularity...
This paper investigates the unknown input estimation for a large class of linear systems with commensurate delays. A Luenberger-like observer plus a high order sliding mode differentiator are proposed by involving only the past and actual values of the system output. Sufficient conditions are given to guarantee the existence of such an unknown input estimator.
The offers on cloud computing infrastructure have focused on providing computing and storage resources, and consider the network mostly as a required add-on and not truly as a resource itself. However, the need to have more robust solutions is becoming clearer. This paper argues that cloud infrastructure services will evolve and allow the definition of complete infrastructures that comprise both computing...
The trend of producing energy from Renewable Generation (ReGen) plants is greatly increasing. This leads to the objective of building future power generation system entirely based on renewable sources. Since the power output of ReGen plants, such as wind power plants (WPP), varies continuously and thereby the voltages in the distribution grid, an effective control system is required, to govern the...
Software applications contain valuable assets that, if compromised, can make the security of users at stake and cause huge monetary losses for software developers. Software protections are applied whenever assets' security is at risk as they delay successful attacks. Unfortunately, protections might have recognizable fingerprints that can expose the location of the assets, thus facilitating the attackers'...
Recently, various research projects have focused on developing remote vehicle control based on Mobile Edge Computing (MEC). In these projects, the number of vehicles connected to the edge server, which affects vehicle control performance, and computational resources of the edge server are not considered. We have proposed a remote vehicle control system that controls vehicles coordinated with edge...
Rehabilitation robotic systems may afford better care and telerehabilitation may extend the use and benefits of robotic therapy to the home. Data transmissions over distance are bound by intrinsic communication delays which can be significant enough to deem the activity unfeasible. Here we describe an approach that combines unilateral robotic telerehabilitation and serious games. This approach has...
In flexible functional split, functions of a virtualized evolved NodeB (eNB) can be disaggregated in distributed computational resources. One of the main constraints for their placement is the latency experienced by the communication between the Virtual Machines (VM) hosting the functions. This paper evaluates experimentally the latency limits for different functional splits providing insights on...
Today, in the cloud computing context, the network is starting to arise as a true resource itself and not just as a required connectivity add-on. The ability to define network resources (e.g. routing/switching elements, bandwidth) in this context is still scarce, but there are clear evidences that this is a future reality. In this article, we consider that cloud infrastructure services will allow...
Low Power Wide Area Networks (LPWAN) is a new solution for the Internet of Things (IoT). This type of networks already has several specific implementations like LoRa, Sigfox, Weightless, RPMA and others. Due to long wireless range, low power consumption and numerous nodes low speed overlay networks can be organized on top of LPWAN. Small pieces of data like text messages, low-quality photographs,...
Traditionally, network core devices are simple and the complexity is in the end-hosts. With the rise of Software- Defined Networking, this changes and complex functions are moved into the network core. This paper presents Transparent Transmission Segmentation (TTS), which is able to improve performance by executing parts of network functions at the core. An implementation for segmenting TCP connections...
Datacenter networks are becoming crucial foundations for our information technology based society. However, commercial datacenter infrastructure is often unavailable to researchers for conducting experiments. In this work, we therefore elaborate on the possibility of combining commercial hardware and simulation to illustrate the scalability and performance of datacenter networks. We simulate a Datacenter...
Throughput starvation, which occurred under well-known exposed/hidden terminal problem in CSMA/CA based channel access mechanisms, will be a critical problem for future wireless LAN systems. This paper describes new schemes that identify starved access points (APs) and user equipments (UEs). One scheme identifies starved APs by observing the delay of beacon signals periodically transmitted by APs...
With the Internet of Things (IoT) becoming a major component of our daily life, understanding how to improve quality of service (QoS) in IoT networks is becoming a challenging problem. Currently most interaction between the IoT devices and the supporting back-end servers is done through large scale cloud data centers. However, with the exponential growth of IoT devices and the amount of data they...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.