The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With each technology improvement, parallel systems get larger, and the impact of interconnection networks becomes more prominent. Random topologies and their variants received more and more attention lately due to their low diameter, low average shortest path length and high scalability. However, existing supercomputers still prefer torus and fat-tree topologies, because a number of existing parallel...
Routing is an essential part of wireless sensor network and there are several methods proposed to make the scheme more energy efficient and optimal. Nowadays, many researchers are fascinated towards this topic and they have proposed typical hierarchical routing, cluster based routing, grid based routing, etc. This paper tries to make an attempt to provide a review of various hierarchical routing methodologies...
The electric grid is a critical cyber-physical infrastructure that serves as lifeline for modern society. With the increasing trend of cyber-attacks, electric grid security has become a significant concern. System operators have the difficult task of reducing the risk exposure and maintaining operational reliability under the constant threat of cyber-attacks. Good security metrics for assessing and...
This paper presents methods to compare high order networks using persistent homology. High order networks induce well-founded homological features and the difference between networks is measured by the difference between the homological features. This is a reasonable approximation to a valid metric in the space of high order networks modulo permutation isomorphisms. The approximations succeed in discriminating...
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social networks. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we characterize...
In this paper, we consider the problem of adding links into an undirected connected network. The objective is to achieve a trade-off between maximizing the algebraic connectivity of the resulting network (which defines the convergence speed of the consensus protocol) and minimizing the increase of the largest eigenvalue of its adjacency matrix, namely, maintaining the network to be secured against...
Unlike sporadic node failures, coverage holes emerging from multiple temporally-correlated node failures can severely affect quality of service in a network and put the integrity of entire wireless sensor networks at risk. Conventional topology control schemes addressing such undesirable topological changes have usually overlooked the status of participating nodes in the recovery process with respect...
Security issues for Wireless sensor network (WSN) is always crucial due to its nature. The limitation of computing resources and distributed properties in WSN makes the traditional security mechanisms no longer as feasible in protecting WSN as in wired networks. There is an emerging research area to discover the alternative solutions on trust and reputation mechanisms for WSNs nowadays. The recent...
Physical topology design (PTD) of networks is frequently accomplished by combining several solutions in a iterative way, specially if meta-heuristics are deployed. Suitable operators to recombine network topologies aiming at creating novel options for network design that preserve desired properties can improve the quality of algorithms developed to solve the PTD problem. In this paper we propose to...
Capacity, survivability and power efficiency are properties of wireless networks that designers strive to increase. These goals, however, may oppose one another. This paper introduces a method in which all three goals may be pursued simultaneously in ad hoc networks through the use of a multi-objective cross entropy optimisation operating on the placement of additional nodes and transmission power...
Generating synthetic network graphs that capture key topological and electrical characteristics of real-world electric power systems is important in aiding widespread and accurate analysis of these systems. Classical statistical models of graphs, such as small-world networks or Erdos-Renyi graphs, are unable to generate synthetic graphs that accurately represent the topology of real electric power...
MANET (mobile ad hoc network) technology has become increasingly attractive for real-world applications in the past decade. Dynamic and intermittent connectivity caused by node mobility poses a huge challenge to the operation of MANETs that require end-to-end paths for communication. The attacks against critical nodes could result in a more degraded network service. In this paper, we evaluate the...
Regionally-correlated failures or attacks pose a great challenge to the normal network communication for physical backbone networks. When the same intensity of challenges occur at different physical locations, the damage to the network connectivity varies greatly. In this paper, we propose a critical region identification model and demonstrate its effectiveness in finding critical regions for fiber-level...
Multicore embedded systems have evolved to appear in different domains. In this paper, we explore and compare various on-chip architectures with respect to a number design metrics. Unlike earlier published works that majorly concern with optimizations in processor, memory and cache hierarchies, in this paper, we aim to ascertain the best on-chip architectures for given processor cores, Level 1-2-3...
The dynamic environment of hybrid mobile and fixed wireless networks used in military operations poses significant challenges in the efficient provisioning of software functionality to application clients. With their transient topology, the software services hosted on mobile nodes may become temporarily unavailable or the cost of transferring data across the network may become too high. To address...
Recently, IETF standardised a powerful and flexible Routing Protocol for Low Power and Lossy Networks (RPL). It selects the ideal routes from a source to a destination node based on certain metrics injected into the Objective Function (OF). In this study, the performance of RPL has been investigated in terms of two OFs (i.e. Minimum Rank with Hysteresis Objective Function (MRHOF) and Objective Function...
Minimizing the energy consumption and hence extending the network lifetime is a key requirement when designing an efficient sensor network protocol. QoS-aware routing in Wireless Sensor Network (WSN), aims to take into account other networks performance aspects as minimizing end-to-end delay (as well as jitter), reducing packet loss rate and minimizing the energy consumption of the network during...
Recent years have seen the advent of energy conservation as a key engineering and scientific challenge of our time. At the same time, most IP networks are typically provisioned to 30%-40% average utilization, leading to a significant waste of energy. Current approaches for creating more frugal networks rely on instantaneous and global knowledge of the traffic matrix and network congestion levels -...
Numerous topology control algorithms for wireless sensor networks exist. Typically, these algorithms optimize general network metrics like the transmission range of sensors. Being of general nature, they suit application-specific requirements insufficiently; e.g., application-specific communication patterns may favor links that the general algorithm will remove.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.