Carefully designed and managed services are essential for quality-demanding traffic, especially in large-scale IP networks where the aggregation of flows and the variety of traffic types are extensive. Although indivi...
详细信息
In this paper we present an efficient scheme for the multicast transmission of the data in the Universal Mobile Telecommunications System (UMTS). We take advantage of the tree topology of the examined network and we i...
详细信息
ISBN:
(纸本)1595934774
In this paper we present an efficient scheme for the multicast transmission of the data in the Universal Mobile Telecommunications System (UMTS). We take advantage of the tree topology of the examined network and we introduce the use of Routing Lists (RLs) in the nodes of the UMTS. The adoption of these lists leads to the decrement of the transmitted packets and the efficient use of network resources during the multicast transmission of the data. We describe in detail the necessary steps for the successful multicast transfer of data. Furthermore, we analyze the handling of special cases such as user mobility scenarios. Especially, the various handover types are examined along with the Serving Radio Network Subsystem (SRNS) relocation procedure. Copyright 2006 ACM.
Organization, scalability and routing have been identified as key problems hindering viability and commercial success of mobile ad hoc networks. Clustering of mobile nodes among separate domains has been proposed as a...
详细信息
Process Automation concentrates on automating structured processes of an organization in order to achieve excellent service delivery by enabling the employees to pay more attention to semi structured or unstructured p...
详细信息
We consider a security problem on a distributed network. We assume a network whose nodes are vulnerable to infection by threats (e.g. viruses), the attackers. A system security software, the defender, is available in ...
详细信息
Let M be a single s-t network of parallel links with load dependent latency functions shared by an infinite number of selfish users. This may yield a Nash equilibrium with unbounded Coordination Ratio [12, 26]. A Lead...
详细信息
ISBN:
(纸本)1595934529
Let M be a single s-t network of parallel links with load dependent latency functions shared by an infinite number of selfish users. This may yield a Nash equilibrium with unbounded Coordination Ratio [12, 26]. A Leader can decrease the coordination ratio by assigning flow αr on M, and then all Followers assign selfishly the (1 - α)r remaining flow. This is a Stackelberg Scheduling Instance (M, r, α), 0 ≤ α ≤ 1. It was shown [23] that it is weakly NP-hard to compute the optimal Leader's strategy. For any such network M we efficiently compute the minimum portion βM of flow r needed by a Leader to induce M's optimum cost, as well as his optimal strategy. Unfortunately, Stackelberg routing in more general nets can be arbitrarily hard. Roughgarden presented a modification of Braess's Paradox graph, such that no strategy controlling αr flow can induce ≤ 1/α times the optimum cost. However, we show that our main result also applies to any s-t net G. We take care of the Braess's graph explicitly, as a convincing example. Copyright 2006 ACM.
We consider the QoS-aware Multicommodity Flow problem, a natural generalization of the weighted multicommodity flow problem where the demands and commodity values are elastic to the Quality-of-Service characteristics ...
详细信息
ISBN:
(纸本)9783939897019
We consider the QoS-aware Multicommodity Flow problem, a natural generalization of the weighted multicommodity flow problem where the demands and commodity values are elastic to the Quality-of-Service characteristics of the underlying network. The problem is fundamental in transportation planning and also has important applications beyond the transportation domain. We provide a FPTAS for the QoS-aware Multicommodity Flow problem by building upon a Lagrangian relaxation method and a recent FPTAS for the non-additive shortest path problem.
The application of pattern recognition techniques, expert systems, artificial neural networks, fuzzy systems and nowadays hybrid artificial intelligence techniques in manufacturing can be regarded as consecutive eleme...
详细信息
ISBN:
(纸本)9781622766468
The application of pattern recognition techniques, expert systems, artificial neural networks, fuzzy systems and nowadays hybrid artificial intelligence techniques in manufacturing can be regarded as consecutive elements of a process started two decades ago. The paper outlines the most important steps of this process. Agent-based systems are highlighted as promising tools for managing complexity, changes and disturbances in production. Further integration of approaches is predicted.
This paper deals with a distributed bandwidth broker that we try to extend in order to perform inter-domain operation. The basic issues for inter-domain operation are discussed and we try to approach the most demandin...
详细信息
ISBN:
(纸本)1841021571
This paper deals with a distributed bandwidth broker that we try to extend in order to perform inter-domain operation. The basic issues for inter-domain operation are discussed and we try to approach the most demanding issues as the selection of the best inter domain routing path. Generally, we discuss three models for inter domain routing through bandwidth broker, analyzing their advantages. Also, a very important point that affects the interdomain operation is the SLAs between adjacent domains and the capability that a bandwidth broker should have to ask and perform dynamic negotiation. Finally, we analyze the best model and present how it should be incorporated in the existing distributed implementation.
The paper presents key aspects connected with modern access control based on behavioral patterns of human being. Two biometric techniques based on eye movement and keystroke dynamics were presented. Quantitative resul...
详细信息
暂无评论