The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should consider when building networks. We develop a heuristic algorithm that balances the centrality of networks by adding a set of links that minimizes the variance of graph centrality measures in a least costly fashion...
We consider the communication cost of computing functions when inputs are distributed among the vertices of an undirected graph. The communication is assumed to be point-to-point: a processor sends messages only to its neighbors. The processors in the graph act according to a pre-determined protocol, which can be randomized and may err with some small probability. The communication cost of the protocol...
Information-centric networking has been proposed to achieve efficient and reliable distribution of content. We propose a model to assign content locators to content names. Information routing decision is made based on geometric routing using the assigned locators. We consider a geometric routing scheme known as geodesic geometric routing. We demonstrate on the iLab.t virtual wall the successful operation...
The emerging Network Function Virtualization paradigm (NFV) is a disruptive change that creates new business opportunities for vendors and carriers. By exploiting virtualization technologies, it allows the dynamic creation of logically isolated infrastructures over abstracted physical networks. To be able to offer Virtualized Services efficiently, service providers need a new class of Management systems...
Reliability of the Vehicle-to-Vehicle (V2V) communication is one of the key factors towards ensuring large-scale deployment of the cooperative vehicular systems. From the communication perspective, urban intersection scenarios can be challenging due to a frequent absence of line-of-sight (LOS) conditions. It is often combined with highly dense network conditions due to high amount of traffic lights,...
Conventions are often used in multi-agent systems to achieve coordination amongst agents without creating additional system requirements. Encouraging the emergence of robust conventions via fixed strategy agents is one of the main methods of manipulating how conventions emerge. In this paper we demonstrate that fixed strategy agents can also be used to destabilise and remove established conventions...
Link prediction is a fundamental problem in social network analysis. The key technique in link prediction is to find an appropriate similarity measure between nodes of a network. Generally, external information besides the network topology is considered in many similarity measures. However, these external information is generally not available or not true. Usage of these external information may result...
Localized topology control is attractive for generating reduced topologies with desirable features such as sparser connectivity and reduced transmit powers. In this paper, we propose an energy efficient localized topology control algorithm called X-LMST in order to achieve prolonged network lifetime. In X-LMST, each node is required to keep its one-hop neighborhood topology. Moreover, in X-LMST, a...
The virtual network embedding problem is mainly concerned with assigning virtual networks onto the substrate network reasonably and efficiently. This paper proposes a virtual network mapping algorithm combining greedy virtual node mapping and virtual link mapping based on the weighted multi-commodity flow (WMCF). The cost coefficient of the multi-commodity flow problem is weighted by the ratio of...
The dynamic nature of space-based networks poses a significant challenge of visualizing and analyzing its topological structure and metrics. In this paper, a hybrid visual analytics approach is proposed to assist researchers to gain an insight into dynamic space-based networks. Three core components are integrated into the visual analytics approach: first, a visual model based on filmstrip metaphor...
With the growth of data center (DC) size, the network topology becomes complicated and the maintenance workload increases significantly. To evaluate the workload, this paper presents a metric named MNT, Maintainability of Networking Topology. MNT consists of numbers of definitions of DC network model, such as cost of maintaining a node, cost of maintaining a link and recursive level. They can quantify...
Hubs play important roles in scale-free networks. Existing hub search algorithms mostly assume the availability of the global network structure and use a variety of centrality metrics to search the hubs in the network. However, when it is very difficult to obtain the network topology in large-scale networks, how we can search the hubs? In this paper, a hub search method based on sampling with biased...
The so-called scale free property is a feature of many complex systems, including the Internet and World Wide Web, where most nodes have just a few links whereas the rest have a huge number of them. The traditional models conceived to reproduce the formation of these systems do not take into account the topological features of the growing network. Nevertheless, the resulting topology has a major influence...
Information-centric networking (ICN) is designed to decouple contents from hosts at the network layer, using in-network caching as a key feature to improve the overall performance. However, the en-route caching strategy used in many ICN implementations generally yields redundancies in the cached contents across different routers. There are also some recent works focusing on cache optimization by respectively...
Advances in data intensive computing and high performance computing facilitate rapid scaling of data center networks, resulting in a growing body of research exploring new network architectures that enhance scalability, cost effectiveness and performance. Understanding the tradeoffs between these different network architectures could not only help data center operators improve deployments, but also...
With the technological advances, there is an increasing attention on micro-UAVs in the military area as well as in the civilian domain. They are used as swarm (several UAVs) forming a UAS (Unmanned Aircraft System) since they are relatively cheap and offer better performance than one aircraft.
The article discusses topological properties of multihop wireless networks which are deployed as part of the advanced metering infrastructure (AMI). It proposes a network topology generator based on a real map. The generator imports topologies of buildings from a specific world area indicated by geographical coordinates. The described generator is used for analysis of statistical properties of AMI...
Distributed systems in which users consume and supply different types of services and resources are becoming ever more prevalent. For the matching of consumers and providers, preference-based two-sided matching algorithms can be used to improve the efficiency of the overall match outcome. In such systems, requesting (providing) users rank others based on preferences derived from feedback. Trust can...
Recently, Software Defined Networking (SDN) has gained a lot of attention, even for the use in core communication networks. When deploying SDN in large core networks, the number and location of controllers must be carefully planned. A first study on this topic by Heller et al. [3] was followed by more detailed publications that included resilience or dynamic controller provisioning. In our previous...
Information dissemination applications (e.g. weather, news, advertisements, traffic, and so on) are among the most promising ones for vehicular networks. However, disseminating information to all vehicles in vehicular networks is not a trivial task because of their specific characteristics like high dynamic topology and different density values along time and space. The proposals found in literature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.