The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) consist of multiple, distributed nodes each with limited resources. With their strict resource constraints and application-specific characteristics, WSNs contain many challenging trade-offs. This paper proposes a bio-inspired load balancing approach, based on pheromone signalling mechanisms, to solve the trade-off between service availability and energy consumption...
We consider the problem of estimating the size of dynamic anonymous networks, motivated by network maintenance. The proposed algorithm is based on max-consensus information exchange protocols, and extends a previous algorithm for static anonymous networks. A regularization term is accounting for a-priori assumptions on the smoothness of the estimate, and we specifically consider quadratic regularization...
A fundamental aspect of many multiplayer online games is the ability to trade items between players. This might take the form of items that were found in the virtual environment or of purchased assets, but in either case, any multiplayer game that supports trading or exchanging items in the game must do so in a secure manner. We have developed a protocol to solve the problem of secure, peer-to-peer...
A fundamental problem for the development of Massively Multiplayer Online Games (MMOGs) is the definition of a mechanism supporting interest management, i.e. determining all the entities of the virtual world that are relevant for a given peer. To this end, we propose a hybrid architecture combining centralized and P2P solutions. Our proposal exploits a P2P gossip-based approach supporting a best-effort...
Traditional C/S structure mode faces the problems such as overloaded server, system hard to expand and high operation cost in the process of building streaming media server, which seriously hinder the further development of streaming media application. However these problems may be effectively solved by introducing P2P technology into streaming media application. On the basis of analysis of defects...
As the most crucial Inter-domain protocol in the Internet, BGP undertakes indispensable responsibility in exchanging routing information across multi-domain networks, consequently it becomes one of the focuses for network attackers. Though there has been existed various schemes to solve the troublesome thing, no one can indeed become the final solution used in real life. As the earliest and comprehensive...
Ensuring security and privacy of content in a mobile ad-hoc network (MANET) is a challenging problem, especially when that content is distributed over the network using some form of peer-to-peer dissemination scheme. Since cooperation among nodes is vital in MANETs, the capture or compromise of a single node not only exposes locally cached content, but also allows an adversary to interrogate the network...
In the area of network performance and discovery, network tomography focuses on reconstructing network properties using only end-to-end measurements at the application layer. One challenging problem in network tomography is reconstructing available bandwidth along all links during multiple source / multiple destination transmissions. The traditional measurement procedures used for bandwidth tomography...
This paper elicits and models the requirements of a decentralized carbon emissions trading platform (CarboCoin). CarboCoin platform is based on the Bit coin, a peer-to-peer digital currency with no central authority. CarboCoin is focused on providing high privacy protection for participants in order to encourage more engagement in carbon emissions reduction process. CarboCoin requirements are elicited...
Peer to Peer (P2P) computer networks rely on direct connections between participants instead of conventional centralized resources. These networks are useful for many purposes, but the killer application nowadays is file sharing. BitTorrent is a very popular protocol for this matter. In this paper, we use a multi-agent model of a BitTorrent network. In it, each BitTorrent client is an agent that interacts...
Replicas of multimedia objects are distributed to peers in overlay networks. Multimedia objects are characterized in terms of not only data structure parameter but also quality of service (QoS) parameters like frame rate. Replicas have to be synchronized to be mutually consistent. Each parameter of a replica is read and written by transactions. Thus, the data structure and QoS parameters of a replica...
In recent years, BitTorrent traffic accounts for a substantial percentage of Internet traffic in the world. However, the current BitTorrent protocols disregards traffic cost at the underlying network and generate a large amount of inter-AS traffic. As a result, BitTorrent peers may suffer from slow download of files due to long delays. Moreover, ISPs may limit BitTorrent traffic to reduce inter-AS...
P2P systems have shown useful to many types of distributed systems due to their features of efficient direct communication among peers. Although initially motivated by the need for efficient file sharing among large amount of peers, P2P techniques have found wide applicability to many domains within large scale distributed systems such as solving complex problems from science and engineering, data...
Peer to Peer (P2P) computer networks rely on direct connections between participants instead of conventional centralized resources. These networks are useful for many purposes, but the killer application nowadays is file sharing. BitTorrent is a very popular protocol for this matter. In this paper, we use a multi-agent model of a BitTorrent network. In it, each BitTorrent client is an agent that interacts...
Botnets denote collections of compromised computers under adversary control and, although early botnets using centralized command and control (C&C) structures were fairly easily defeated, botnets remain a serious global security threat. in part, this is due to the evolution within the adversarial communities using highly diffuse decentralized peer-to-peer (P2P) based C&C...
Lower echelon forces face significant barriers in utilizing increasingly available networked resources. Network access at the tactical edge continues to present significant problems of limited bandwidth, disruption, and other constraints. Simultaneously, there is an ever-increasing set of video streams, imagery, intelligence, and live reports available on both tactical edge and upper echelon networks...
Service Oriented Architectures allow for seamless integration of heterogeneous systems and extensive service reuse; characteristics that led to a wide adoption of this paradigm in the enterprise and military environment. While SoAs are currently deployed in tactical environments mainly at higher-echelon levels, it is necessary to allow for the exchange of information all the way down to the edge nodes...
The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs a system of geographically distributed peer nodes, which are independently administered yet united by the adoption of common federation protocols and...
Military networks can be divided into two main areas. The strategic network, usually made up of fixed locations, is typically the main collection point for information and subsequent analysis. The other primary network, the tactical network, is the dynamic environment that our front line warfighters use in the changing battlefront. There is critical need for information to pass between any given sets...
Although the Internet achieved tremendous success in the recent decades, several limitations have emerged from recent technical advancement and challenging requirements of diverse applications. For overcoming these limitations, the future Internet can be redesigned in the “clean slate” basis. This paper proposes a novel architecture that considers both horizontal and vertical separations called, Domain-Insulated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.