The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates a specific NP-hard problem by comparing a depth-first search and a depth-first branch-and-bound algorithm as applied to network topology configuration in wireless ad hoc network planning. The vast amount of possible solutions in medium to large NP-hard problems makes algorithm methodology very important. State space algorithms are used to traverse through the solution space...
Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoretic framework where defensive measures are optimized with respect to threats posed by malicious attackers. The formulations are chosen to be abstract on purpose in order to maximize applicability of the models and solutions...
Network-on-Chip (NoC) has emerged as a solution for communication framework for high-performance nanoscale architecture. One important aspect, in addition to deadlock-free routing, is low power consumption. In view of varied communication requirements, application specific SoC design is increasingly important. Customized NoC architectures are more suitable for a particular application, and do not...
To continue the growth of the number of transistors on a chip, the 3D IC practice, where multiple silicon layers are stacked vertically, is emerging as a revolutionary technology. Partitioning a larger die into smaller segments and then stacking them in a 3D integration can significantly reduce latency and energy consumption. Such benefits emanate from the notion that inter-wafer distances are negligible...
A sort of shutting valves scheme was brought forward when heat-supply network failed and a kind of network recomposition system of topology was suggested here. Based on the normal condition topology structure, this system could automatically recompose fault conditions topology structure according to the way of shutting valves scheme. Validity and effectiveness of this method was verified by a real...
Routing delivery is one of the key techniques in mobile ad hoc network, which involves many aspects such as topology update, routing exchange and so on. In this paper, we firstly apply routing tree to describe the complete topology of ad hoc network, and then store the information of routing tree into every node's routing table. Sparse routing tree, as a pruned tree, is used to exchange topology information,...
Traditional network identification methods require cooperation of all nodes, thus they cannot identify the topology of the networks where some non-cooperative nodes exist. Although the tomography based network topology identification methods require no collaboration of intermediate nodes, they suffer from high algorithmic complexity and heavy network payload. In this paper we propose a novel tomography...
This paper introduces an approach which aims at improving information access (skills, services) in large networks. A self-organized multiagent analysis of the problem, reducing the number of messages transmitted for a skill search is proposed. The MWAC (Multi-Wireless-Agent Communication) model is extended here to take some specificities of social networks into account, like the information held by...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
In this paper we describe some new ideas to improve recommendations to groups of people. Our approach maximizes the global satisfaction for the group taking into account people personality and the social relationships among people in the group. We present some results with two cases of study based on the movie recommendation domain with heterogeneous groups. The first case study uses synthetically...
In this decade, peer-to-peer (P2P) applications have emerged as popular tools for sharing data and they have gained much attention. Such P2P applications build overlay networks on top of existing infrastructure networks and disseminate data in a peer-to-peer manner. How well the P2P overlay network maps onto the underlying physical network topology can significantly impact P2P application performances...
In IEEE 802.11 based Wireless LANs, the channel bandwidth is considered as a fixed parameter. Recently, the concept of adaptive bandwidth has been newly introduced, making it possible to allocate the channel bandwidth adaptively according to the interference type of users. Such a capability enables to enhance the previous way of channel usage where each Access Point (AP) is restricted to use a fixed...
Long Term Evolution (LTE) is the latest step towards the 4th generation (4G) of radio technologies designed to increase the capacity and speed of mobile communications. To support Multimedia Broadcast/Multicast Services (MBMS), LTE offers the possibility to transmit Multimedia Broadcast multicast service over a Single Frequency Network (MBSFN), where a time-synchronized common waveform is transmitted...
This paper discusses essential implementation aspects of simple amplify-and-forward type repeaters from the radio network planning point of view. Different RF-repeater configurations are assessed through numerical analysis and field measurements in WCDMA network. The target of this paper is to show the important factors regarding the repeater deployment, which have significant impact on the overall...
This paper proposes a topology management mechanism for hierarchical group oriented networks. The key innovative aspect of this paper is to consider different interest groups in the clustering formation process. For administrative or performance reasons sometimes it is required to organize nodes, located in the same geographical area, into different groups. This group-oriented topology management...
In this paper, we present a novel application of matrix game theory for optimization of link scheduling in wireless ad-hoc networks. Optimum scheduling is achieved by soft coloring of network graphs. Conventional coloring schemes are based on assignment of one color to each region or equivalently each link is member of just one partial topology. These algorithms based on coloring are not optimal when...
This paper deals with the effect of mesh and cluster-tree topologies (that are defined in 802.15.4/Zigbee or 802.15.4a standards) in the performance of cooperative and range-based localization algorithms. In this type of localization at least three reference or anchor nodes within range are needed for location estimation (two dimensions). Therefore the successful localization depends on the connectivity...
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal is to simplify the network deployment of such a mesh network, and towards that we are presenting procedures for automatic configuration and optimisation of the network. We first present an architecture framework that supports...
The self-installation nature of femtocells sharing the same frequency band can lead to harmful femto-to-femto interference levels. The possibility for operators to share its licensed spectrum allows femtocells of one operator to exploit the frequency resources of other operators. In this paper we propose and analyze the performance of two dynamic frequency selection algorithms that permit to the generic...
A joint power system state and topology estimator based on a combined Weighted Least Squares (WLS) and Weighted Least Absolute Value (WLAV) strategy is proposed. The resulting coestimation algorithm is devised to simultaneously provide estimates to the analog power system variables and validate the current topology of the electric network. This is accomplished by formulating state & topology coestimation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.