The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of high-speed transit systems, such as High Speed Rail (HSR), is putting considerable pressure on TCP-based data transmission. It is well known that TCP is suffering from severe throughput degradation in high-speed mobility scenarios. The root cause at the transport layer however remains unclear and largely undetermined to date. In this paper, we aim to pinpoint the throughput bottlenecks...
The growing number of scientific publications and the availability of information in online repositories enable researchers to discover, analyze and maintain an updated state of the art bibliography. Indeed, few works explore this scenario in order to support researchers on the literature review step. Literature reviewing comprises a fundamental part of the scientific writing, in which publications...
The evolution of the harmonized set of ISO/IEC/IEEE 15288-12207 related standards and technical reports that are discussed in this International Standardprovides detailed requirements and guidance on the application of system life cycle processes. This International Standard unifies technical and managementrequirements and guidance from several of these sources to specify the requirements for the...
In this paper, we consider Heterogeneous Cloud Radio Access Network (H-CRAN) with non-uniform Device-to-Device (D2D) communication. Specifically, D2D transmission are only utilized outside a prescribed distance from any high power node (HPN). Based on the analytical framework provided in this paper, the average ergodic rate of a typical user equipment (UE) is characterized. Through appropriate definition...
In order to deal with performance of software systems, it is important to introduce approaches and tools that work in the early phases of the software life-cycle, even before the code is developed. In fact, if performance requirement violations are discovered too late, then there may be significant impacts on project costs. Some work has been done in the last few years to tackle the problem of automatically...
An analytical approach is developed to evaluate the performance of a hybrid base station (BS) location model which considers the location regularity of macro BSs and topological randomness of small BSs, where the coverage probability and spectral efficiency are derived and verified by simulation. When both tiers have the same BS intensity, the tier of tessellated macro BSs achieves a 50% advantage...
This paper presents a space mapping approach to parametric modeling of the gain and sidelobe level in blocked aperture reflector antenna systems. The well-known aperture field integration method is used to provide a fast coarse model of the main beam responses, while full wave or multi-reflection physical optics simulations provide the accurate fine model responses. A formal implicit space mapping...
Traditional coverage metrics in verification focus on controllability without taking observability into account, which may result in an artificially high coverage and a false sense of confidence. In this paper, we present a path constraint solving based test generation method at register-transfer level (RTL) for observability-enhanced branch coverage. The branches executed but not observed by a test...
The fast expansion of Internet-based multimedia services like Netflix, Skype or YouTube -- the so-called Over-The-Top Services (OTT) -- have increased the quality requirements of these services from the point of view of the user. In this sense, it is important not only to ensure a good Quality of Service (QoS) level -- technical metrics -- but also a high level of Quality of Experience (QoE) -- subjective,...
The Routing Protocol for Low power and lossy network (RPL) is recommended by Internet Engineering Task force (IETF) for IPv6 based Low Power Personal Area Network (6LoWPAN). RPL is a proactive routing protocol for Internet of Things (IoT) that has applications in smart homes, smart cities and smart world. RPL creates a Directed Acyclic Graph (DAG) of the network topology. Rank in a primitive construct...
Electric distribution planning and research have been focused on the reliability and flexibility of electric supply at the consumer end. Due to increase in weather related outages, natural disaster like hurricanes, earthquake etc. in recent years, ample research has been sprouted to enhance the resilience of the power grid. This paper presents the concept of resilience in Infrastructure systems, measuring...
Production yield of SRAM cells is a key bottleneck for supply voltage scaling in low power circuits. Yield-driven design for such circuits are difficult as yield analysis for such circuits are usually very expensive. In this paper we proposed a hybrid performance model that can map the process parameters as well as design parameters to performance metric such as SNM, WNM and read/write speed. Once...
Due to drastic growth of mobile customers in recent days, mobile business has brought a paradigm shift and expanded its application areas with mass production of various mobile business fields. Consequently, diverse attempts are being made in order to analyze the mobile business for its successful performance. In this work, we propose performance metrics to measure the performance of mobile business...
Virtual machines (VMs) are used in cloud computing systems to handle user requests for service. Failure of VMs cause that the user's request not being completed. Replication mechanisms can be used to mitigate the impact of VM failures. In this paper, we are primarily interested in characterizing the failure-recovery behavior of a VM in cloud with different replication schemes. We use a service-oriented...
Reverse logistics networks are designed and implemented by companies to collect products at the end of their useful life from end users in order to remanufacture products or properly recycle materials. In this paper, we present a simulation framework for comparing alternative reverse logistic network configurations based on productivity and sustainability performance metrics. The resulting decision...
Performance engineers are beginning to explore software-level optimisation as a means to reduce the energy consumed when running their codes. This paper presents POSE, a mathematical and visual modelling tool which highlights the relationship between runtime and power consumption. POSE allows developers to assess whether power optimisation is worth pursuing for their codes. We demonstrate POSE by...
Intrusion detection in a wireless sensor network (WSN) has drawn intensive attentions recently due to its wide applications. Many issues in intrusion detection, such as sensor deployment, mobility of sensors and data fusion have been investigated extensively. However, the behavior of the intruder has rarely been investigated. In this paper, we introduce a novel situation where the intruder can destroy...
Web Service is always subject to change. As more enterprises choose to migrate to Service-oriented Architecture (SOA), the Web services and their stakeholders are facing a more distributed and dynamic environment. The evolution ofWeb services consumer requirements and the competitive pressures encourage web service providers to always make efforts to improve and update services by publishing continuously...
Cascading failures is a new vulnerability to the emerging of interdependent networks where two networks are depending on one another. In this paper, we propose an analytical model based on centrality and distance measures to calculate the size of cascades. The betweenness centrality is a topological metric that can be used to identify node criticality. The hopcount is a distance related topological...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.