As a cognitive network is forward looking and gains from current and previous information on the network to achieve an intended goal, a routing algorithm, Minimum Workload Routing Algorithm (MWL) in cognitive networks...
详细信息
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all th...
详细信息
ISBN:
(纸本)9781424499199
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all the data from all the sensors. This paper studies the capacity of computing and transporting the specific functions of sensor measurements to the sink node, called aggregation capacity, for WSNs. It focuses on random WSNs that can be classified into two types: random extended WSN and random dense WSN. All existing results about aggregation capacity are studied for dense WSNs, including random cases and arbitrary cases, under the protocol model (ProM) or physical model (PhyM). In this paper, we propose the first aggregation capacity scaling laws for random extended WSNs. We point out that unlike random dense WSNs, for random extended WSNs, the assumption made in ProM and PhyM that each successful transmission can sustain a constant rate is over-optimistic and unpractical due to transmit power *** derive the first result on aggregation capacity for random extended WSNs under the generalized physical model. Particularly, we prove that, for the type-sensitive perfectly compressible functions and type-threshold perfectly compressible functions, the aggregation capacities for random extended WSNs with n nodes are of order Θ ((log n) -β/2-1 ) and Θ (((log n) -β/2 )/(log log n)), respectively, where β >; 2 denotes the power attenuation exponent in the generalized physical model.
Increasing transmission power is an effective way to improve real-time data delivery in wireless sensor networks. On the other hand, increased power will also incur more interference though it can improve the link qua...
详细信息
A new method is proposed to measure software system security. Each component can be characterized by a composite net which combines the features of Finite State Machine and Operation Diagram. A fuzzy number is introdu...
详细信息
ISBN:
(纸本)9789881701282
A new method is proposed to measure software system security. Each component can be characterized by a composite net which combines the features of Finite State Machine and Operation Diagram. A fuzzy number is introduced to this net to represent uncertain elements that might affect the software security, and thus we construct Security Function for each component. The whole system Security Index is calculated based the Reliability Graph and the Security Function for each component, where Reliability Graph is used to reconstruct the component relationship of the system.
The paradigm of Service Oriented Architecture (SOA) has been gathering significant momentum in both academia and industry in recent years. SCA, which describes a model for building applications and systems using a SOA...
详细信息
ISBN:
(纸本)9789881701282
The paradigm of Service Oriented Architecture (SOA) has been gathering significant momentum in both academia and industry in recent years. SCA, which describes a model for building applications and systems using a SOA, extends and complements prior approaches to implementing services. However, it is very difficult to test if the service components integration satisfies the requirements. In this paper we propose a formal service component architecture model according to the specification of service component issued as a standard in Mar. 2007. A formulism, called Port Algebra, is developed to describe architecture. Test generation formulas are created to generate test cases for each service component. Based on the interactions of the components, SYN-sequences are derived to test the integration as a whole. Since the test generation is based on formulas, the test process could be in a systematical and automatical way.
XML has been widely applied in kinds of areas and applications as a data exchange format. Recently, plenty of of languages based on XML emerge. There are many constraints specified by natural language in these XML-bas...
详细信息
The prior studies setup the churn model by measuring the historical logs or records of a P2P network, and treat it as one whole black-box without understanding the inside of peer's population. The metrics used to ...
详细信息
Hardware/software (HW/SW) partitioning is one of the crucial steps of co-design systems. It determines which components of the system are implemented in hardware and which ones are in software. As hardware of larger a...
详细信息
The shortest path problem in network has been studied widely and intensively over years, both in theoretical and in computational viewpoints. Many speed-up techniques for Dijkstra's algorithm have been developed. ...
详细信息
In the paper, we describe a lattice vector quantization model based on scalable and high order codebook extension scheme. In the scheme, we expand the basic codebook so that the expanded codebook contains the point to...
详细信息
暂无评论