Filters








7,886 Hits in 6.6 sec

A Novel Traffic Dividing and Scheduling Mechanism for Enhancing Security and Performance in the Tor Network

K. Sangeetha, K. Ravikumar
2015 Indian Journal of Science and Technology  
Methods: In this manuscript, a Novel Traffic, Dividing and Scheduling (NTDS) mechanism is introduced for improving performance in the Tor anonymous communication network.  ...  The performance of the tor network is described by using various network metrics such as bandwidth, latency, jitter, loss etc.  ...  Each router has a large set of bandwidth statistics values 9.  ... 
doi:10.17485/ijst/2015/v8i7/62882 fatcat:xjjxvawx6vaolnc2yrx6dqhaum

A Review on Analysis and Synthesis of Nonlinear Stochastic Systems with Randomly Occurring Incomplete Information

Hongli Dong, Zidong Wang, Xuemin Chen, Huijun Gao
2012 Mathematical Problems in Engineering  
In this paper, we aim to survey some recent advances on the analysis and synthesis problems for nonlinear stochastic systems with randomly occurring incomplete information.  ...  Recently, in response to the development of network technologies, the phenomenon of randomly occurring incomplete information has become more and more prevalent.  ...  Recently, with the development of networked control systems, the analysis and synthesis problems for nonlinear stochastic systems with randomly occurring incomplete information have become interesting  ... 
doi:10.1155/2012/416358 fatcat:kv7yj7ejfnhkvaz4jvfhm4lfaa

A novel resource allocation strategy for distributed MIMO multi-hop multi-commodity communications

Yidong Lang, Carsten Bockelman, Dirk Wubben, Armin Dekorsy, Michael Sollner
2008 2008 International ITG Workshop on Smart Antennas  
The novel per-hop-optimization strategy aims to reduce the total transmission power of the network while meeting the individual end-to-end outage probability constraint of each commodity, i.e. for each  ...  In comparison to other bandwidth allocation strategies like equal or dynamic bandwidth for each commodity, our Per-Hop-Bandwidth-Allocation (PHBA) approach uses the bandwidth in a near-optimum way and  ...  In contrast, our novel approach PHBA can support the network with reasonable total power to provide the required QoS for the commodities.  ... 
doi:10.1109/wsa.2008.4475547 dblp:conf/wsa/LangBWDS08 fatcat:qa4ucedjcbf5vkvrw7rv33zpfe

On general systems with randomly occurring incomplete information

Zidong Wang, Jun Hu, Hongli Dong
2016 International Journal of General Systems  
Systems with randomly occurring incomplete information In the system and control community, the incomplete information is generally regarded as the results of (1) our limited knowledge in modelling real-world  ...  Recently, in response to the development of network technologies, the incomplete information often appears in a random fashion dependent on the random fluctuation of the network loads/conditions whose  ... 
doi:10.1080/03081079.2015.1106734 fatcat:3uvg6qgeu5bipn7cbon3lfovyy

Structural and Cognitive Bottlenecks to Information Access in Social Networks [article]

Jeon-Hyung Kang, Kristina Lerman
2013 arXiv   pre-print
Social scientists have developed influential theories about the role of network structure in information access.  ...  Our study suggests that cognitive and structural bottlenecks limit access to novel information in online social networks.  ...  to people with higher bandwidth who will communicate with them more frequently.  ... 
arXiv:1303.0861v1 fatcat:mowgjtcqdjeoroovbmt2rtjvgu

Supporting digital video in a managed wireless network

P. Bahl
1998 IEEE Communications Magazine  
Researchers continue to work on improving both software and hardware efficiency by, for example, developing faster RF transceivers that employ novel antenna designs with improved noise reduction circuitry  ...  All wireless end nodes communicate with a central access point or base station which is connected to the wired network. Figure 2 illustrates the reference architecture for such a network.  ... 
doi:10.1109/35.685369 fatcat:zrn6heirmbaivfynpnzr5mheai

Machine-to-machine communications: Technologies and challenges

Kwang-Cheng Chen, Shao-Yu Lien
2014 Ad hoc networks  
Related technologies toward practical realization are explored to complete fundamental understanding and engineering knowledge of this new communication and networking technology front.  ...  Machine-to-machine (M2M) communications emerge to autonomously operate to link interactions between Internet cyber world and physical systems.  ...  Under the thinking of network operating under incomplete information, statistical control of networks has been developed as the way that must go and will be described in detail.  ... 
doi:10.1016/j.adhoc.2013.03.007 fatcat:fsd6zefdq5fotbm5vhpozc4wci

Networked Systems with Incomplete Information

Zidong Wang, Bo Shen, Hongli Dong, Xiao He, Jun Hu
2015 Abstract and Applied Analysis  
These papers have covered both the theoretical and practical aspects of networked system with incomplete information in the broad areas of dynamical systems, mathematics, statistics, operational research  ...  This survey discusses a variety of T-S fuzzy control and filtering issues with network-induced phenomena in great detail firstly. Four network-induced phenomena (communication delays,  ...  Acknowledgments This special issue is a timely reflection of the research progress in the area of networked systems with incomplete information.  ... 
doi:10.1155/2015/852103 fatcat:ug5muimcz5fclitptdxmzkptdi

The workshop on internet topology (wit) report

Dmitri Krioukov, kc claffy, Marina Fomenkov, Fan Chung, Alessandro Vespignani, Walter Willinger
2007 Computer communication review  
This report describes the findings of the workshop, outlines a set of relevant open research problems identified by participants, and concludes with recommendations that can benefit all scientific communities  ...  By bringing together a group of researchers spanning the areas of computer science, physics, and the mathematical sciences, the workshop aimed to improve communication across these scientific disciplines  ...  We thank all the participants for their insights and support.  ... 
doi:10.1145/1198255.1198267 fatcat:btx5t32hirad5cdjhdseih7qpu

Unified User Association and Contract-Theoretic Resource Orchestration in NOMA Heterogeneous Wireless Networks

Maria Diamanti, Georgios Fragkos, Eirini Eleni Tsiropoulou, Symeon Papavassiliou
2020 IEEE Open Journal of the Communications Society  
To deal with the incompleteness of Channel State Information (CSI), a Contract Theory (CT) based approach is introduced.  ...  The coupled problem is treated under an incomplete information scenario, where the Base Stations (BSs) have statistical only knowledge of the users' channel conditions.  ...  Citation information: DOI 10.1109/OJCOMS.2020.3024778, IEEE Open Journal of the Communications Society  ... 
doi:10.1109/ojcoms.2020.3024778 fatcat:7zf722qca5aw5mg2fx6tmxgjku

Guest Editorial: 6G: The Paradigm for Future Wireless Communications

Shahid Mumtaz, Chunxiao Jiang, Antti Tolli, Anwer Al-Dulaimi, M. Majid Butt, Hafiz M. Asif, Muhammad Ikram Ashraf
2022 IEEE wireless communications  
The next article, "A Novel Wireless Resource Management for the 6G-Enabled High-Density Internet of Things" written by Shen et al., proposes a novel wireless resource management technique for 6G network  ...  The work also suggests a queue-aware offloading algorithm to facilitate decision making optimization under incomplete information.  ... 
doi:10.1109/mwc.2022.9749174 fatcat:nefme6j3vje4rg7u4coulmq7ji

Resource assignment for integrated services in wireless ATM networks

Paramvir Bahl, Imrich Chlamtac, András Faragó
1998 International Journal of Communication Systems  
The task of supporting integrated multirate multimedia traffic in a bandwidth-poor wireless environment poses a significant challenge for network designers.  ...  In this paper we propose a novel bandwidth allocation strategy which partitions the available bandwidth amongst the different traffic classes in a manner that ensures quality-of-service guarantees for  ...  This calls for a bandwidth management methodology that works under incomplete information and does not critically depend on specific statistical assumptions.  ... 
doi:10.1002/(sici)1099-1131(199801/02)11:1<29::aid-dac353>3.0.co;2-0 fatcat:t7ucwkqwkjf3ndqq55tukpaoua

Mathematical Control of Complex Systems

Zidong Wang, Hamid Reza Karimi, Bo Shen, Jun Hu
2013 Mathematical Problems in Engineering  
), (2) networked control (channel capacity constraints, control over communication networks, distributed filtering and control, information theory and control, and sensor networks), and (3) stochastic  ...  The overall aim of this special issue is to bring together the latest/innovative knowledge and advances in mathematics for handling complex systems, which may depend largely on methods from artificial  ...  We would like to acknowledge all authors for their efforts in submitting high-quality papers. We are also very grateful to the reviewers for their thorough and on time reviews of the papers.  ... 
doi:10.1155/2013/407584 fatcat:yeijua6xwve45h63ajsmehxqmm

Guest editorial

S. Verdu
1998 IEEE Transactions on Information Theory  
Since the 1970's, information theorists have been responsible for key advances in data networking. However, the information theory of communication networks remains at an embryonic stage.  ...  mobile communication, and network protocols.  ... 
doi:10.1109/tit.1998.720529 fatcat:fqja5ctzhjhljlgswymiclcuvm

Towards Understanding Uncertainty in Cloud Computing Resource Provisioning

Andrei Tchernykh, Uwe Schwiegelsohn, Vassil Alexandrov, El-ghazali Talbi
2015 Procedia Computer Science  
It is also true for communication infrastructure, where actual bandwidth is very dynamic and difficult to guarantee.  ...  There are numerous types of uncertainties associated with cloud computing, and one should to account for aspects of uncertainty in assessing the efficient service provisioning.  ...  Most of cloud applications require availability of communication resources for information exchange between tasks, with databases or end users.  ... 
doi:10.1016/j.procs.2015.05.387 fatcat:slgh4s5c75efrgkprepjpkcqdq
« Previous Showing results 1 — 15 out of 7,886 results