Filters








1,376 Hits in 8.9 sec

ASH: Tackling Node Mobility in Large-Scale Networks

Andrei Pruteanu, Stefan Dulman, Koen Langendoen
2010 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems  
A preliminary evaluation by means of simulation shows that ASH succeeds in tackling node mobility, while consuming only minimal resources.  ...  The main contribution of this paper is the introduction of a novel mechanism (called ASH) for the creation of a quasi-static overlay on top of a mobile topology.  ...  In this paper we propose a novel mechanism (called ASH) for handling mobility in large-scale networks; in essence we "slow down" the network by creating a quasi-static overlay on top of the highly mobile  ... 
doi:10.1109/saso.2010.33 dblp:conf/saso/PruteanuDL10 fatcat:p6xr4ouhavg6tmh6bd2r3q2x3e

ASH: tackling node mobility in large-scale networks

Andrei Pruteanu, Stefan Dulman
2012 Computing  
A preliminary evaluation by means of simulation shows that ASH succeeds in tackling node mobility, while consuming only minimal resources.  ...  It is powered by simple, local interactions between nodes and exhibits self-healing and self-organization capabilities with respect to failures and node mobility.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s)  ... 
doi:10.1007/s00607-012-0202-3 fatcat:vq77vi2panbr5cjx7hbgsbzukm

Epilogue: The Machinery of Urban Resilience

Ash Amin
2014 Social Sciences  
They are large, open and dispersed. They gather life but also distribute it. They are full of variety, latency and multiplicity. They are territories but also nodes in multiple networks.  ...  In the course of time, cities have endured all manner of difficulty, hedging against risk and bouncing back from adversity, small and large [1] .  ...  Recognizing the plurality of the modern metropolis, and drawing on the example of cities investing in large-scale data capture, this narrative locates resilience-anticipatory and regenerative-in the capacity  ... 
doi:10.3390/socsci3030308 fatcat:dotdvetvgnhy3pj4xzighvahmu

Volcanic ash impacts on critical infrastructure

Thomas M. Wilson, Carol Stewart, Victoria Sword-Daniels, Graham S. Leonard, David M. Johnston, Jim W. Cole, Johnny Wardman, Grant Wilson, Scott T. Barnard
2012 Physics and Chemistry of the Earth  
Electricity networks are very vulnerable to disruption from volcanic ash falls.  ...  Ash cleanup from road and airports is commonly necessary, but the large volumes make it logistically challenging.  ...  Acknowledgements We would like to thank the large number of local partners, collaborators and participants, too numerous to list here, who have given generously of their time and expertise to assist international  ... 
doi:10.1016/j.pce.2011.06.006 fatcat:bozm55uqa5hvpdtzx3mq3p4ke4

Regulating economic globalization

Ash Amin
2004 Transactions of the Institute of British Geographers  
provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in  ...  The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-profit purposes  ...  In part, the variety is the product of the sheer 'excess' of regulation at work in different networks, and in part, it is the product of the interface between the scalar, largely state-led, regimes of  ... 
doi:10.1111/j.0020-2754.2004.00126.x fatcat:hvukjakjzvb4xdrap4akdv5nwu

Combine Effect of Metakaolin, Fly Ash and Steel Fiber on Mechanical Properties of High Strength Concrete

Vinod B. Shikhare Vinod B. Shikhare
2013 IOSR Journal of Mechanical and Civil Engineering  
In this experimental study the changes on some mechanical properties of concrete specimens produced by Metakaolin, fly Ash and steel fibers were investigated.  ...  Three types of steel fibers were used in the experiments and volume fractions of steel fiber were 0.5% to 4.0 %.  ...  Journal of Chemical Engineering costs and problems with regeneration of the spent activated carbon discourage its large-scale application.  ... 
doi:10.9790/1684-0710104 fatcat:hcaupjeofvejrgklz6soete4em

Potential impacts of the loss ofFraxinus excelsior(Oleaceae) due to ash dieback on woodland vegetation in Great Britain

R.J. Mitchell, R.L. Hewison, A.J. Hester, A. Broome, K.J. Kirby
2016 New Journal of Botany  
Ash is dominant in eight NVC communities: W8a, W8b, W8c, W8d, W8e, W8g, W9a and W12a. (Confidence: High).  ...  Regional differences in how the tree and ground flora woodland community may respond following the loss of ash were assessed.  ...  In south and east England, holes in mature farmland trees are frequently used as nest sites; where this coincides with ash being the dominant farmland tree, any large-scale felling of mature ash is likely  ... 
doi:10.1080/20423489.2016.1171454 fatcat:eex3mkfx2zgp7oubmwchezj4ga

Top Downloads in IEEE Xplore [Reader's Choice]

Chungshui Zhang
2017 IEEE Signal Processing Magazine  
September 2014 Locating the Nodes: Cooperative Localization in Wireless Sensor Networks Patwari, N.; Ash, J.N.; Kyperountas, S.; Hero, O.; Moses, R.L.; Correal, N.S.  ...  September 2014 Communicating While Computing: Distributed Mobile Cloud Computing over 5G Heterogeneous Networks Barbarossa, S.; Sardellitti, S.; Lorenzo, P.D.  ... 
doi:10.1109/msp.2016.2639138 fatcat:c22jyxu4hzanjirvdw22o5c6we

Stanford Us-Russia Forum Research Journal

Alexis Lerner, Evelina Akimova, Andrey Bakalenko, Grace Baller, Mugi Bayarlkhagva, Joel Beckner, Tatti Currey, Alexander Dorofeev, Ziba Dzhafarova, Elza Ganeeva, Irina Gavrilova, Eugeniu Han (+19 others)
2017 Zenodo  
We are grateful to Middlebury School in Russia for their assistance in distributing the survey and providing expert advice.  ...  Tatiana Tropina for her guidance in the development of this paper.  ...  Next, for every other English-language co-occurrence network, we add edges between nodes if those nodes are linked by an edge in any other English network.  ... 
doi:10.5281/zenodo.1181947 fatcat:cuatqnwazrby3gdggnv7z6ue7a

Stanford Us-Russia Forum Research Journal

Alexis Lerner, Evelina Akimova, Andrey Bakalenko, Grace Baller, Mugi Bayarlkhagva, Joel Beckner, Tatti Currey, Alexander Dorofeev, Ziba Dzhafarova, Elza Ganeeva, Irina Gavrilova, Eugeniu Han (+19 others)
2017 Zenodo  
We are grateful to Middlebury School in Russia for their assistance in distributing the survey and providing expert advice.  ...  Tatiana Tropina for her guidance in the development of this paper.  ...  Next, for every other English-language co-occurrence network, we add edges between nodes if those nodes are linked by an edge in any other English network.  ... 
doi:10.5281/zenodo.1181946 fatcat:4pnc5nzim5chnpivdwgqwde2ae

When networks network: Once studied solo, systems display surprising behavior when they interact

Elizabeth Quill
2012 Science News  
Important large-scale interactions would have remained hidden. Exposing unknown interactions is not the only issue.  ...  In 2009, D'Souza and a colleague showed that connecting a large portion of nodes in a network of networks takes fewer links than would be required for a similar single network.  ... 
doi:10.1002/scin.5591820619 fatcat:3hedr7oxhrhnbfch5uvg5lirty

Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm

Songlin Chen, Hong Wen, Jinsong Wu, Jie Chen, Wenjie Liu, Lin Hu, Yi Chen
2018 Wireless Communications and Mobile Computing  
One major obstacle in the application of the PHY-layer authentication is its detection rate.  ...  In addition, a two-dimensional test statistic features authentication model is presented for further improvement of detection rate.  ...  of wireless mobile networks are continuously covered in rural areas.  ... 
doi:10.1155/2018/6039878 fatcat:k5gbel5jgbcbnoodnjiukv4yra

The Ninja architecture for robust Internet-scale systems and services

Steven D Gribble, Matt Welsh, Rob von Behren, Eric A Brewer, David Culler, N Borisov, S Czerwinski, R Gummadi, J Hill, A Joseph, R.H Katz, Z.M Mao (+2 others)
2001 Computer Networks  
Support is provided as well by Intel Corporation, Ericsson, Philips, Sun Microsystems, IBM, Nortel Networks, and Compaq.  ...  Acknowledgements This work is supported, in part, by the Defense Advanced Research Project Agency (grant DABT 63-98-C-0038) and the National Science Foundation (grant RI EIA-9802069).  ...  We believe that there will be a very large number of units attached to the network, reaching scales of hundreds of millions, and eventually, billions of devices.  ... 
doi:10.1016/s1389-1286(00)00179-1 fatcat:vaghnmok75a5bfqpiapmnz6g6e

Trustworthy Edge Computing through Blockchains [article]

Abdullah Al-Mamun, Dongfang Zhao
2020 arXiv   pre-print
, computing, and network capacity.  ...  Nonetheless, one open challenge of this emerging paradigm lies in the potential security issues on edge nodes and end devices, e.g., sensors and controllers.  ...  ., adjacency) in large scales of nodes, (ii) It makes the validation process independent of the Build-Network phase because the leaders can continue validating the blocks while the other nodes are building  ... 
arXiv:2005.07741v1 fatcat:ivxef3bgmbdrdahyqgb2u7qhxm

Distributed computing column 44 2011 in review

Idit Keidar
2011 ACM SIGACT News  
And in this column, we have touched in 2011 upon computing over dynamic networks (in March), combining game theory and fault tolerance in distributed computing (in June), and using social networks to overcome  ...  The ABD construction lies at the heart of many distributed storage systems built in the last decade, including scalable replicated storage used in today's large data centers and clouds.  ...  Mobile and radio networks was one of this year's hot topics.  ... 
doi:10.1145/2078162.2078178 fatcat:wqzckoz7jngxbpp4ezv6uce65u
« Previous Showing results 1 — 15 out of 1,376 results