Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresses the need for the efficient usage of ...
详细信息
ISBN:
(纸本)9781424415205
Multimedia Broadcast Multicast Services (MBMS), introduced in Third Generation Partnership Project (3GPP) Release 6, is a point-to-multipoint downlink bearer service that addresses the need for the efficient usage of the expensive radio resources. Power control is one of the most important aspects in MBMS due to the fact that Node B's transmission power is a limited resource and must be shared among all MBMS users in a cell. Consequently, the analysis of transmitted power plays a fundamental role in the planning and optimization process of Universal Mobile Telecommunications System (UMTS) radio access networks. This paper investigates several factors affecting Node B's transmission power levels such as, cell deployment, propagation models, Quality of Service (QoS) requirements, users' distributions and mobility issues. Finally different transport channels for the transmission of the multicast data over the UTRAN interfaces are considered.
We address the issue of measuring storage, or query load distribution fairness in peer-to-peer data management systems. Existing metrics may look promising from the point of view of specific peers, while in reality be...
详细信息
In this paper, we propose a new scheme for on demand reservation of capacity in OBS networks, emulating one-way signaling protocols. The proposed framework relies on the combination of a two-way reservation protocol a...
详细信息
ISBN:
(纸本)9783901882272
In this paper, we propose a new scheme for on demand reservation of capacity in OBS networks, emulating one-way signaling protocols. The proposed framework relies on the combination of a two-way reservation protocol and a burst assembly scheme with a burstification delay enforced to be the round-trip-time and which incorporates a Least Mean Square filter to predict burst length. Upon the arrival of the first packet in the burst queue, a control packet (setup message) is generated and transmitted to reserve resources, based on the prediction filter. In this way the reservation process starts/ends simultaneously with the burst assembly process. In this paper, we present the main features of the proposed scheme, evaluate its performance for both homogeneous and non-homogeneous traffic and we further propose an extension with aggressive overprovisioning of resources that can guarantee lossless operation even for extremely cases of bursty traffic.
In this work, we present a concrete framework, based on web services-oriented architecture, for integrating small programmable objects in the web of things. Functionality and data gathered by the Small Programmable Ob...
详细信息
Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, e...
详细信息
ISBN:
(纸本)1581139683
Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, efficiency is not our only concern in this study. The security and privacy issues over the extracted knowledge must be seriously considered as well. By taking this into consideration, we study the procedure of hiding sensitive association rules in binary data sets by blocking some data values and we present an algorithm for solving this problem. We also provide a fuzzification of the support and the confidence of an association rule in order to accommodate for the existence of blocked/unknown values. In addition, we quantitatively compare the proposed algorithm with other already published algorithms by running experiments on binary data sets, and we also qualitatively compare the efficiency of the proposed algorithm in hiding association rules. We utilize the notion of border rules, by putting weights in each rule, and we use effective data structures for the representation of the rules so as (a) to minimize the side effects created by the hiding process and (b) to speed up the selection of the victim transactions. Finally, we discuss the advantages and the limitations of blocking. Copyright 2004 ACM.
The efficient transmission of TCP traffic over OBS networks is a challenging problem, due to the high sensitivity of TCP congestion control mechanism to losses. In this paper, a traffic profiling scheme is proposed fo...
详细信息
In this paper we present an efficient system that processes HTML pages in order to extract the useful images from them. The proposed mechanism is template independent and is focalized on HTML pages that include news a...
详细信息
The efficient transmission of TCP traffic over OBS networks is a challenging problem, due to the high sensitivity of TCP congestion control mechanism to losses. In this work, we propose solutions to this problem, thro...
详细信息
ISBN:
(纸本)9789639799493
The efficient transmission of TCP traffic over OBS networks is a challenging problem, due to the high sensitivity of TCP congestion control mechanism to losses. In this work, we propose solutions to this problem, through the burst assembly and scheduling mechanism of OBS. We investigate and propose algorithms to achieve performance enhancements for TCP traffic by taking into account TCP state information. We prove our claims with references to well-established TCP models, and validate the proposed algorithms through simulations.
Orthogonal Frequency Division Multiplexing (OFDM) has recently been proposed as a modulation technique for optical networks, because of its good spectral efficiency, flexibility, and tolerance to impairments. We consi...
详细信息
The expansion of the World Wide Web has led to a state where a vast amount of Internet users face and have to overcome the major problem of discovering desired information. It is inevitable that hundreds of web pages ...
详细信息
暂无评论