Delay requirement becomes a key problem for the time sensitive applications in wireless sensor networks besides the power conservation issue. This paper proposes a novel Network Utility Maximization (NUM) model with c...
详细信息
ISBN:
(纸本)9781424436927
Delay requirement becomes a key problem for the time sensitive applications in wireless sensor networks besides the power conservation issue. This paper proposes a novel Network Utility Maximization (NUM) model with constrained delay for real-time applications in wireless sensor networks. By using dual decomposition techniques, we present a distributed iterative price and rate adaption algorithm which converges to the global optimal solution. The presented algorithm can jointly control congestion and contention while meeting the delay requirement of each flow in the network. Numerical results validate our arguments.
The group mutual exclusion problem is a generalization of mutual exclusion problem such that a set of processes in the same group can enter a critical section simultaneously. In this paper, we propose a distributed al...
详细信息
ISBN:
(纸本)9781615676606
The group mutual exclusion problem is a generalization of mutual exclusion problem such that a set of processes in the same group can enter a critical section simultaneously. In this paper, we propose a distributed algorithm for the group mutual exclusion problem in asynchronous message passing distributed systems. To reduce message complexity, it uses quorums as a communication structure when a process sends a request message. Our algorithm is a modification of Maekawa's algorithm and the message complexity is O(n|Q|) in the worst case, where |Q| is a quorum size that the algorithm adopts, and n is the total number of processes.
Cloud computing is a term applied to large, hosted datacenters, usually geographically distributed, which offer various computational services on a "utility" basis. Most typically the configuration and provi...
ISBN:
(纸本)9781424443727
Cloud computing is a term applied to large, hosted datacenters, usually geographically distributed, which offer various computational services on a "utility" basis. Most typically the configuration and provisioning of these datacenters, as far as the services for the subscribers go, is highly automated, to the point of the service being delivered within seconds of the subscriber request. Additionally, the datacenters typically use hypervisor based virtualization as a technique to deliver these services. Providers who construct these datacenters run into a variety of challenges which are not common in ordinary-scale datacenters. Of specific interest is the unique demand placed on the underlying network. Many unique approaches are utilized to address these networking challenges, several of which are discussed in this paper.
This paper investigates beamforming with limited feedback in regenerative cooperative networks where relays demodulate and forward the received symbols .We propose an optimal beamforming vector maximizing the received...
详细信息
A hierarchical algorithm to solve the group mutual exclusion problem has been proposed. We consider a hierarchical arrangement where the nodes are divided in to clusters. The algorithm uses a token-based protocol to h...
详细信息
ISBN:
(纸本)9783540922940
A hierarchical algorithm to solve the group mutual exclusion problem has been proposed. We consider a hierarchical arrangement where the nodes are divided in to clusters. The algorithm uses a token-based protocol to handle inter-cluster requests and a centralized protocol for intra-cluster requests. The algorithm also uses a two-level priority scheme in order to assign relative weights to fairness and concurrency. Unlike other algorithms, the message complexity of our algorithm is proportional to the number of clusters rather than the number of nodes. Also, a new metric has been proposed to measure the level of coherence. The proposed algorithm is the first hierarchical solution to the group mutual exclusion problem.
Conventional collaborative filtering(CF) recommendation applies the user-based centralized architecture. This architecture has some problems of sparsity and scalability, in addition to not fit the current popular P2P ...
详细信息
ISBN:
(纸本)9783642033537
Conventional collaborative filtering(CF) recommendation applies the user-based centralized architecture. This architecture has some problems of sparsity and scalability, in addition to not fit the current popular P2P architecture. Therefore, this paper proposes a distributed model to implement the CF algorithm by maintaining the user's record information distributedly in each nodes throughout the network, constructing a DHT, applying the Chord algorithm to realize locating of the record and designing the corresponding communication policy to obtain data needed.
Jamming style Denial-of-Service attack is the transmission of radio signals that disrupt communications by decreasing the signal to noise ratio. This kind of attack can be easily launched by jammer through either bypa...
详细信息
Given a time-varying face image object, or only a sub-part of the image, the question of whether the template object image exists in a given image database is an important problem our days, which still remains in its ...
详细信息
ISBN:
(纸本)9781424438198
Given a time-varying face image object, or only a sub-part of the image, the question of whether the template object image exists in a given image database is an important problem our days, which still remains in its infancy, due to the many challenges it involves. With the advantage of distributedcomputing, such as computation sharing and data storage sharing, the limitations of image retrieval in a centralized image database can be eliminated. In this paper, we present an efficient method and architecture to determine whether a given face, of sub-part (s) of it, with time-varying features, disguises, and facial expressions is stored in a collection of known faces stored in nominal configurations. We demonstrate If such image exists, a match report is presented and the image position and rotation are derived as well. We show here how by combining a distributedcomputing and image sub-patch correlation technique in the image pattern recognition phase, the performance of the image searching is significantly improved.
Scheduling is one of the core steps to efficiently exploit the capabilities of heterogeneous distributedcomputing systems and it is also an appealing NP-complete problem. There is a number of heuristic and meta-heuri...
详细信息
ISBN:
(纸本)9781424451654
Scheduling is one of the core steps to efficiently exploit the capabilities of heterogeneous distributedcomputing systems and it is also an appealing NP-complete problem. There is a number of heuristic and meta-heuristic algorithms that were tailored to deal with scheduling of independent jobs. In this paper we investigate the efficiency of differential evolution on the scheduling problem.
Cloud computing has been the most prevalent technology in the past few years and many prominent enterprises have prompted their cloud systems, preparing for the coming age of cloud computing. We can predict that the m...
详细信息
暂无评论