Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 04 Sep 2024Bibliometrics
Skip Table Of Content Section
article
An Effective and Feasible Congestion Management Technique for High-Performance MINs with Tag-Based Distributed Routing

As parallel computing systems increase in size, the interconnection network is becoming a critical subsystem. The current trend in network design is to use as few components as possible to interconnect the end nodes, thereby reducing cost and power ...

article
An Extended Compression Format for the Optimization of Sparse Matrix-Vector Multiplication

Sparse matrix-vector multiplication ($({\rm SpM}\times{\rm V})$) has been characterized as one of the most significant computational scientific kernels. The key algorithmic characteristic of the $({\rm SpM}\times{\rm V})$ kernel, that inhibits it from ...

article
Collaborative Data Collection with Opportunistic Network Erasure Coding

Disruptive network communication entails transient network connectivity, asymmetric links, and unstable nodes, which pose severe challenges to data collection in sensor networks. Erasure coding can be applied to mitigate the dependency of feedback in ...

article
Conditional Edge-Fault Hamiltonicity of Cartesian Product Graphs

A graph $(G)$ is conditional $(k)$-edge-fault Hamiltonian if it remains Hamiltonian after deleting at most $(k)$ edges and each vertex incident to at least two nonfaulty edges. A graph $(G)$ is $(k)$-edge-fault Hamiltonian-connected if it remains ...

article
Defending against Unidentifiable Attacks in Electric Power Grids

The electric power grid is a crucial infrastructure in our society and is always a target of malicious users and attackers. In this paper, we first introduce the concept of unidentifiable attack, in which the control center cannot identify the attack ...

article
Distributed Data Query in Intermittently Connected Passive RFID Networks

This paper focuses on distributed data query in intermittently connected passive RFID networks, which are characterized by extraordinarily limited communication capacity and asynchronous and opportunistic communication links. To address such unique ...

article
Does Wireless Sensor Network Scale? A Measurement Study on GreenOrbs

Sensor networks are deemed suitable for large-scale deployments in the wild for a variety of applications. In spite of the remarkable efforts the community put to build the sensor systems, an essential question still remains unclear at the system level, ...

article
Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique

Peer-to-peer streaming has witnessed a great success thanks to the possibility of aggregating resources from all participants. Nevertheless, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus ...

article
Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties

Voice over Internet Protocol (VoIP) applications based on peer-to-peer (P2P) communications have been experiencing considerable growth in terms of number of users. To overcome filtering policies or protect the privacy of their users, most of these ...

article
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks

The performance of wireless networks can be enhanced by performing network coding on the intermediate relay nodes. To enhance the throughput of large wireless networks, we can decompose them into a superposition of simple relay networks called two-hop ...

article
Modeling and Optimal Design of Linear Network Coding for Secure Unicast with Multiple Streams

In this paper, we will address the modeling and optimal design of linear network coding (LNC) for secure unicast with multiple streams between the same source and destination pair. The objectives include 1) satisfying the weakly secure requirements, 2) ...

article
Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing

In the emerging environment of the Internet of things (IoT), through the connection of billions of radio frequency identification (RFID) tags and sensors to the Internet, applications will generate an unprecedented number of transactions and amount of ...

article
mPath: High-Bandwidth Data Transfers with Massively Multipath Source Routing

The capacity of access links has increased dramatically in recent times, and bottlenecks are moving deeper into the Internet core. When bottlenecks occur in a core (or AS-AS peering) link, it is possible to use additional detour paths to improve the end-...

article
Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support

To cope with challenging problems faced by traditional multicast routing protocols, many branching-router (BR)-based multicast routing schemes with desirable features have been proposed. However, the current BR-based methods still lack efficient ...

article
Sociality-Aware Access Point Selection in Enterprise Wireless LANs

Well-balanced workload among wireless access points (APs) in a wireless local-area network (WLAN) can improve the user experience for accessing the Internet. Most load balancing solutions in WLANs focuses on the optimization of AP operations, assuming ...

article
STARS: Static Relays for Remote Sensing in Multirobot Real-Time Search and Monitoring

Mobile surveillance and sensing systems need a networking infrastructure that enables the mobile systems to transmit information gathered to a base station. We consider the problem of an efficient use of mobile robots to sense not only the region but ...

article
Stochastic Evaluation of QoS in Service-Based Systems

WS-BPEL language has become the industrial standard to design and orchestrate modular applications, formalizing service compositions and business relationships among providers and consumers. Once service level agreements (SLAs) among the parties are ...

article
TDoA for Passive Localization: Underwater versus Terrestrial Environment

The measurement of an emitter's position using electronic support passive sensors is termed passive localization and plays an important part both in electronic support and electronic attack. The emitting target could be in terrestrial or underwater ...

article
Topology-Aware Adaptive Routing for Nonstationary Irregular Mesh in Throttled 3D NoC Systems

Three-dimensional network-on-chip (3D NoC) has been proposed to solve the complex on-chip communication issues in future 3D multicore systems. However, the thermal problems of 3D NoC are more serious than 2D NoC due to chip stacking. To keep the ...

Comments