Welcome to Cluj-Napoca, Romania, at the 2015 IEEE 11thinternationalconference on Intelligent Computer Communication and Processing. the main goal of this conference is providing an international forum and discussion...
详细信息
A synchronization algorithm is proposed which uses one of two probabilistic techniques to estimate remote clock values, and uses an interactive convergence algorithm on the resulting estimates to adjust the local cloc...
详细信息
ISBN:
(纸本)0818621443
A synchronization algorithm is proposed which uses one of two probabilistic techniques to estimate remote clock values, and uses an interactive convergence algorithm on the resulting estimates to adjust the local clock. the algorithm does not require master/slave clocks and reduces the number of messages needed. As a result it is suitable for use in large distributed systems.
We present in this paper an overview of current problems withthe Internet from the architectural view point, and we identify and forecast trends for future developments. Our study includes perspectives from different...
详细信息
ISBN:
(纸本)9780769528106
We present in this paper an overview of current problems withthe Internet from the architectural view point, and we identify and forecast trends for future developments. Our study includes perspectives from different stakeholders of the Internet as well as from the technological development point of view. We conclude that current and future requirements vary greatly between, and even within, different stakeholders, which implies that a successful future network architecture mustprovide maximum flexibility with a minimal set of "hard-wired" properties. In specific, a revised version of the TCP/IP layered architecture would only suffice to address some of the current issues, but would not provide a long term solution. We then show that an autonomic network- architecture with afew simple architectural building blocks is enough to address a great deal of the requirements today and in thefuture.
Blockchain is the core technology at the heart of cryptocurrency such as Bitcoin and Ether. Due to its characteristics, e.g., immutability, decentrality, and consensus, it is now applied in several fields such as comm...
详细信息
ISBN:
(数字)9781665486279
ISBN:
(纸本)9781665486279
Blockchain is the core technology at the heart of cryptocurrency such as Bitcoin and Ether. Due to its characteristics, e.g., immutability, decentrality, and consensus, it is now applied in several fields such as communications, e-health, and supply chains. Nevertheless, its integration to communication networks is facing several challenges related to power consumption, unreliable communication channels, and limited computing capacity of devices. In this paper, we focus on blockchain consensus optimization in edge computing wireless networks. Specifically, we propose a novel consensus mechanism adapted to the heterogeneity and dynamicity, e.g., mobility, of edge computing nodes. We call it adaptive blockchain for edge computing (ABEC). through experiments, we demonstrate the superiority of ABEC over baseline consensus, in terms of block addition/confirmation latency and robustness to the edge nodes' unreliable behaviour. Finally, the impact of several network parameters, e.g., data rate of master ruler/block's owner, and number of transactions per block, is investigated.
Apache Hadoop is a widely used distributedcomputing framework and its file system is Hadoop distributed File System (HDFS), which assumes that DataNodes in a system are homogeneous in nature. When a cloud system scal...
详细信息
ISBN:
(纸本)9781509033157
Apache Hadoop is a widely used distributedcomputing framework and its file system is Hadoop distributed File System (HDFS), which assumes that DataNodes in a system are homogeneous in nature. When a cloud system scales up, DataNodes are very likely to become heterogeneous. thus, extensive research has been placed on improving performance for heterogeneous Hadoop systems, but little attention has been placed on security improvements. this motivates us to investigate a data allocation scheme called the Secure HDFS (SecHDFS) by integrating the secret sharing technique to improve storage security in a heterogeneous Hadoop system.
this is a position paper on the current state of the art in distributed Model Predictive Control (M PC) and our view on its future potential. We present results from a recent survey of 35 distributed MPC approaches. F...
详细信息
ISBN:
(纸本)9781479931064
this is a position paper on the current state of the art in distributed Model Predictive Control (M PC) and our view on its future potential. We present results from a recent survey of 35 distributed MPC approaches. For this, we propose a way in which distributed MPC approaches can be categorized for comparison. We also link the potential that these approaches have to the domain of other fields such as integrated environmental optimal decision making and cyber-physical systems. Many challenges for realizing these links have to be faced. We present our views on how the advances in several highly active research domains could be used to overcome these challenges. As such, this paper is intended as a starting point for the exploration of various novel research cooperations.
Algorithms for solving the processor membership problem in asynchronous distributed systems that are subject to processor and communication faults are presented. these algorithms are based on the placement of a total ...
详细信息
ISBN:
(纸本)0818621443
Algorithms for solving the processor membership problem in asynchronous distributed systems that are subject to processor and communication faults are presented. these algorithms are based on the placement of a total order on broadcast messages. the types of systems for which each of these algorithms is appropriate are characterized in terms of the properties of the communication mechanisms and the availability of stable storage. In the absence of stable storage or a mechanism for distinguishing promptly delivery messages, it is shown that no membership algorithm exists.
the rapid increase in the global availability and use of the Internet has made it the most effective platform for the distribution of product information and advertising when compared to the traditional media such as ...
详细信息
ISBN:
(纸本)9781467377010
the rapid increase in the global availability and use of the Internet has made it the most effective platform for the distribution of product information and advertising when compared to the traditional media such as print, television and radio. In addition, in the case of Online Social Networks (OSN), one can take advantage of the influences that one's actions has on other users and, in particular, one's friends. Even if a user does not purchase a product, their online mention of the product can have positive or negative influences. this social behavior can be used to improve advertising strategies. For example, if a user is given an advertisement impression (a linked icon) and clicks on it then it is more likely that their friends (if told of the action) will also click if they are subsequently given the impression. In this paper we provide a Stochastic Dynamic Programming formulation of this problem together with its solution. Because of the computational complexity of the solution we provide a simple heuristic that we show to be computationally much faster.
Two principles are proposed for proving and tracing distributed programs: it is necessary to assert in proofs only what can be readily traced, and trace just what can be asserted in the proofs. A proof system and trac...
详细信息
ISBN:
(纸本)0818621443
Two principles are proposed for proving and tracing distributed programs: it is necessary to assert in proofs only what can be readily traced, and trace just what can be asserted in the proofs. A proof system and tracing strategy are described for CSP programs based on these principles, using vector time and control variables, not auxiliary variables, to represent control state, and stressing local rather than global reasoning.
Dynamic spectrum access through Cognitive Radio Networks (CRNs) and exploiting multiple radios on a single node are two different well accepted techniques for enhancing network performance. However, simultaneous usage...
详细信息
ISBN:
(纸本)9781467377010
Dynamic spectrum access through Cognitive Radio Networks (CRNs) and exploiting multiple radios on a single node are two different well accepted techniques for enhancing network performance. However, simultaneous usage of boththe techniques, i.e., augmenting dynamic spectrum access with multiple radios, is yet to be investigated in the literature. therefore, in this paper, we investigate simultaneous usage of boththe techniques. In our investigation, we perform rigorous ns-2 simulation. Simulation results reveal a key finding - augmenting spectrum harvesting with multiple radios makes throughput worse, however, can improve delay. Besides, as the simulation results do not reveal micro-level aspects of the improved delay performance, we perform mathematical modeling of the delay to do so. Further, we present numerical results based on the models to demonstrate the micro-level aspects.
暂无评论