The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile edge computing (MEC) has risen as a promising technology to augment computational capabilities of mobile devices. Meanwhile, in-network caching has become a natural trend of the solution of handling exponentially increasing Internet traffic. The important issues in these two networking paradigms are computation offloading and content caching strategies, respectively. In order to jointly tackle...
The Tactile Internet will be able to transport touch and actuation in real-time. The primary application running over the Tactile Internet will be haptic communications. Design efforts for both the Tactile Internet and the haptic communications are at a nascent stage. It is expected that the next generation (5G) wireless networks will play a key role in realizing the Tactile Internet. On the other...
The Tactile Internet will be able to transport touch and actuation in real-time. The primary application running over the Tactile Internet will be haptic communications. Design efforts for both the Tactile Internet and the haptic communications are at a nascent stage. It is expected that the next generation (5G) wireless networks will play a key role in realizing the Tactile Internet. On the other...
Download delay, as a commonly experienced problem on the Internet, has become a significant impediment to the rapid development of online business. Extant researches focus on how such delays can be decreased and how much delay online users could put up with, but sparse study has adopted a theoretically grounded approach to managing the perception of the online wait. Some research results show that...
Existing virtual network mapping algorithms does not consider resource consumption of intermediate node on communication path usually. Minimum resource consumption or shortest path of physical network is regarded as objective, thereby leading to bottleneck due to insufficient resource of intermediate node on communication path, and affecting performance of the whole physical network and subsequent...
Shaping subscriber traffic based on token bucket filter (TBF) by Internet service providers (ISPs) results in waste of network resources in shared access when there are few active subscribers, because it cannot allocate excess bandwidth in the long term. New traffic control schemes have been recently proposed to allocate excess bandwidth among active subscribers proportional to their token generation...
In this paper, a new adaptive resource allocation and grouping scheme is proposed to enhance the capacity of device-to-device (D2D) systems underlaying cellular networks. In order to increase resource utilization, we propose to divide the outer region of the cell into multiple parts and the corresponding D2D pairs located in the symmetrical parts are designed to reuse the same cellular user equipment's...
Computational grids have the potential for solving large scale scientific problems using heterogeneous and geographically distributed resources. Before this potential is realized, there are several technical overheads that must be overcome. This paper introduces PRAG — a resource allocation technique that is pre-emptive in nature. The critical problem for grid users is efficient allocation of resources...
Network virtualization is considered to be not only an enabler to overcome the inflexibility of the current Internet infrastructure but also an enabler to achieve an energy-efficient Future Internet. Virtual network embedding (VNE) is a critical issue in network virtualization technology. This paper explores a joint power-aware node and link resource allocation approach to handle the VNE problem with...
We study the problem of maximizing the average hourly profit earned by a Software-as-a-Service (SaaS) provider who runs a software service on behalf of a customer using servers rented from an Infrastructure-as-a-Service (IaaS) provider. The SaaS provider earns a fee per successful transaction and incurs costs pro-portional to the number of server-hours it uses. A number of resource allocation policies...
One of the goals of information security education is to develop students' skills to solve unseen security vulnerability with contemporary methodologies. This paper presents the teaching of a new algorithm on resource allocation of network attack and defense with mathematical programming for evaluating the network survivability. Adopting a scaffolding technique, students take up a role of a defender...
For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the...
The resource locating efficiency is the core issue of P2P systems. The unstructured P2P systems adopt the flooding mechanism, which causes huge network burden. The Structured P2P systems, however, employs routing based on DHT, which results in an expensive topology maintenance. This paper will propose a semi-construct P2P model. Based on the research of the small world theory, this model combines...
The following topics are dealt with: vehicle detection; discrete time queueing system; CBMLAD; linear programming model; surface water quality assessment; fuzzy subgroups; computer aided optimum design; aerodynamic modeling; fuzzy logic controller; adaptive neural network; trajectory planning; nurbs model; XML data safety; sparse signal estimation; condition monitoring information model; ECG extraction;...
A large university usually has many units that may locate far apart, and there are many proxy servers installed to give web access services to those units individually. However, some proxies may face the performance bottleneck when many users access the Internet simultaneously since such servers have limited capacity and could not handle high workload whereas the workload cannot be transferred to...
While multiple access links enhance the availability and utilization of multicast service nodes, the resource allocation balancing needs to be performed on a link basis, which is usually not considered in most overlay multicast routing algorithms. To accurately represent the bandwidth consumption of each overlay node, we need not only a multihomed proxy model to describe the overlay multicast routing...
Internet access networks in general and wireless mesh access networks in particular, are the bottleneck of today's communication networks and consequently most strongly responsible for determining the user satisfaction. The limited bandwidth and the fact that access network are most often used as mere bit pipes are however unfavorable for the users' quality of experience (QoE). The lack of application-specific...
Recently, Cloud computing has emerged as a new computing paradigm on the Internet. Cloud computing facilitates flexible and efficient computer resource management via virtualization technologies at anytime and from anywhere, so that users can add and/or delete IT resources. Users can set up and boot the required resources and they have to pay only for the required resources. However, they have to...
The motivation for network signalling has traditionally aroused from the need to offer quality of service (QoS) to applications. To meet this need architectures and protocols like IntServ and RSVP had been developed and extended over the last decade. Generally speaking, the signaled portion of the network comprises the path along the sender and receiver of a session. Recently, signalling protocols...
We consider a class of constrained queuing network called switched networks, important sub-class of the stochastic processing network (cf. Harrison (2000)), in which there are constraints on which queues can be served simultaneously. Such networks have served as effective models for understanding various types of dynamic resource allocation problems arising in communication networks like the Internet,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.