Filters








15,913 Hits in 3.4 sec

Learning routing queries in a query zone

Amit Singhal, Mandar Mitra, Chris Buckley
1997 Proceedings of the 20th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '97  
We approximate a query domain by a guerg zone. Experiments show that routing profiles learned from a query zone are 8-12~0 more effective than the profiles generated when no query zoning is used.  ...  We show that routing queries (profiles) learned only from the documents in a query domain are better than the routing profiles learned when query domains are not used.  ...  We test the effectiveness of the routing queries learned using zoning (QZ-1, QZ-2, QZ-3) by comparing them to the routing queries learned when query zoning is not used (No-QZ).  ... 
doi:10.1145/258525.258530 dblp:conf/sigir/SinghalMB97 fatcat:5ug3jmgekbaghatahzp4j6ve3y

An Energy-Aware Routing Protocol for Query-Based Applications in Wireless Sensor Networks

Ehsan Ahvar, Shohreh Ahvar, Gyu Myoung Lee, Noel Crespi
2014 The Scientific World Journal  
In this paper, we propose an energy-aware routing protocol (ERP) for query-based applications in WSNs, which offers a good trade-off between traditional energy balancing and energy saving objectives and  ...  Designing energy-aware routing protocol can significantly reduce energy consumption in WSNs. Energy-aware routing protocols can be classified into two categories, energy savers and energy balancers.  ...  In query-based routing protocols, a station sends queries to find specific events among the WSNs.  ... 
doi:10.1155/2014/359897 pmid:24696640 pmcid:PMC3947686 fatcat:j63noxshfzc2vbkpwo4kpmwldy

RER: a real time energy efficient routing protocol for query-based applications in wireless sensor networks

Ehsan Ahvar, Gyu Myoung Lee, Noel Crespi, Shohreh Ahvar
2015 Telecommunications Systems  
This paper proposes a Real time Energy efficient Routing(RER) protocol for query-based applications in WSNs, which offers an efficient trade-off between traditional energy balancing and energy saving objectives  ...  while supporting a soft real time packet delivery.  ...  Query zones-After estimating the expected zone, node S defines a query zone for the route query.  ... 
doi:10.1007/s11235-015-0072-z fatcat:2voq5uc7erd6litxvutosaikte

Page 1054 of IEEE Transactions on Computers Vol. 52, Issue 8 [page]

2003 IEEE Transactions on Computers  
An interzone path from S to D is formed by a sequence of nodes B, S,B,,... By. Bygas D, in is a node within B;’s routing zone and ‘s routing zone.  ...  A route to D can be accumulated in the query packet during forwarding or—to reduce the query packet length—stored temporarily at nodes and accumulated in the reply control packet during the reply phase  ... 

Zonal rumor routing for wireless sensor networks

T. Banka, G. Tandon, A.P. Jayasumana
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
Rumor Routing can be considered as a special case of ZRR when only one node belongs to one zone.  ...  New algorithm improves the percentage query delivery and requires fewer transmissions, thus reducing the total energy consumption in a sensor network.  ...  Figure 1 shows a possible path taken by a query. If a route does not exist, then the query selects a neighbor that is in a different zone than the query's zone.  ... 
doi:10.1109/itcc.2005.305 dblp:conf/itcc/BankaTJ05 fatcat:y2z3bllkxnfvdnrjyq2wpswd6m

Density-Independent, Scalable Search in Ad Hoc Networks

Zygmunt J. Haas, Rimon Barr
2007 International Journal of Wireless Information Networks  
Furthermore, we show that this is optimal and that bordercasting (a query propagation protocol where a node retransmits a query to a set of nodes at some hop-distance away) possesses this density-independence  ...  We analyze the asymptotic cost of discovering a route within a flat ad hoc network and we show that one can discover a route with cost that is proportional only to the area of the network and that is independent  ...  ACKNOWLEDGMENTS The work on this project was supported in part by the DoD MURI (Multidisciplinary University Research Initiative) Program administered by the Office of Naval Research (ONR) under contract  ... 
doi:10.1007/s10776-006-0055-9 fatcat:xfd5lqmqxza35mdktwow6cbprm

A communication infrastructure for smart environments: a position article

Z.J. Haas
2000 IEEE personal communications  
Applications of this technology can easily be envisioned in nearly every aspect of our life: in the workplace, at home, in a supermarket, in a department store, in a car, on the battlefield, and so on.  ...  This position article addresses some key issues in the creation of such a micronetwork. This work has been sponsored in part by ONR contract no. N00014-00-1-0564 and AFRL contract no.  ...  In order to understand the need for a query control mechanism in ZRP, it is important to stress one of the key features of the routing zone: a node's response to a route query contains information about  ... 
doi:10.1109/98.878540 fatcat:rdhu7ulayjf4rdiwxsrgaa34e4

Study of Recognition Algorithm for Core Node in KAD Network Based on BP Model

Li Qiang, Tang Bo, Yang Jie
2016 International Journal of Future Computer and Communication  
In view of the core node recognition in the KAD (Kademlia), a model based on BP is presented to determine whether a node is core node in real time.  ...  An algorithm in MatLab is designed to train the BP network until the results are limited in a predetermined error range.  ...  Their definitions are given below [14] : Definition 1 (routing hotspot): in a zone Zx, each node has n resource sets.  ... 
doi:10.18178/ijfcc.2016.5.2.454 fatcat:bmef7gljd5erfjckz2nhh53qw4

RPKI vs ROVER

Aanchal Malhotra, Sharon Goldberg
2014 Computer communication review  
Meanwhile, the designers of ROVER claim that it operates in a "fail-safe" mode, where "[o]ne could completely unplug a router verification application at any time and Internet routing would continue to  ...  Both RPKI and ROVER rely on a hierarchy of authorities to provide trusted information about the routing system.  ...  We say a BGP route is an IP prefix π and the AS a originating it in BGP. A router issues a ROVER query for every new route it learns in BGP.  ... 
doi:10.1145/2740070.2631435 fatcat:tt5bb43harfz5b6gqn7sehdhf4

RPKI vs ROVER

Aanchal Malhotra, Sharon Goldberg
2014 Proceedings of the 2014 ACM conference on SIGCOMM - SIGCOMM '14  
Meanwhile, the designers of ROVER claim that it operates in a "fail-safe" mode, where "[o]ne could completely unplug a router verification application at any time and Internet routing would continue to  ...  Both RPKI and ROVER rely on a hierarchy of authorities to provide trusted information about the routing system.  ...  We say a BGP route is an IP prefix π and the AS a originating it in BGP. A router issues a ROVER query for every new route it learns in BGP.  ... 
doi:10.1145/2619239.2631435 dblp:conf/sigcomm/MalhotraG14 fatcat:difzllq4kjawphduaj3ycpsb6m

Adaptive Peer-to-Peer Routing with Proximity [chapter]

Chu Yee Liau, Achmad Nizar Hidayanto, Stephane Bressan
2003 Lecture Notes in Computer Science  
In this paper, we presented a routing strategy for requests in unstructured peer-to-peer networks. The strategy is based on the adaptive routing Q-routing.  ...  The strategy uses reinforcement learning to estimate the cost of routing a request. Such a strategy is scalable only if the routing indices are of reasonable size.  ...  The virtual space is partitioned into many small d-dimensional zones. Keys are mapped into zones and a zone will be split whenever a node requests to join that zone.  ... 
doi:10.1007/978-3-540-45227-0_45 fatcat:ddxjvab2kne65n7lvpkqvrzkra

Determining the optimal configuration for the zone routing protocol

M.R. Pearlman, Z.J. Haas
1999 IEEE Journal on Selected Areas in Communications  
Knowledge of this routing zone topology is leveraged by the ZRP to improve the efficiency of a reactive route query/reply mechanism.  ...  The zone routing protocol (ZRP) is a hybrid routing protocol that proactively maintains routes within a local region of the network (which we refer to as the routing zone).  ...  We assume that a node learns its zone through some sort of a proactive scheme, which we refer to here as the intrazone routing protocol (IARP).  ... 
doi:10.1109/49.779922 fatcat:vjnfmefdhfal5o2tsmzfdws5we

Enhanced ZRP Protocol for Mobile Ad-hoc Networks

M.N Sree Ranga Raju, Jitendranath Mungara
2011 International Journal of Wireless & Mobile Networks  
of routing in inter as well as intra zone.  ...  There are many protocols which are proposed on the issues of MANET but they have not considered all possibility of routing in intra as well as inter zone.  ...  A proactive routing protocol, intra zone routing protocol (IARP), is used inside routing zones, and a reactive routing protocol, inter-zone routing protocol (IERP), is used between routing zones.  ... 
doi:10.5121/ijwmn.2011.3411 fatcat:h4bgzp76xzcsbmd5phl4y4vjsi

Preventing Restricted Space Inference in Online Route Planning Services

Florian Dorfmeister, Kevin Wiesner, Michael Schuster, Marco Maier
2015 Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
Using a map-based approach for creating cloaked regions for the start and destination addresses, our solution queries the online service for routes between subsets of points from these regions.  ...  As suchlike leakage of personal information threatens a user's privacy and anonymity, this paper presents PrOSPR, a comprehensive approach for using current online route planning services in a privacy-preserving  ...  found in a zone.  ... 
doi:10.4108/eai.22-7-2015.2260037 dblp:journals/sis/DorfmeisterWSM15 fatcat:vouazljclze27kzyxup6h7abq4

Offline firewall analysis

Alain Mayer, Avishai Wool, Elisha Ziskind
2005 International Journal of Information Security  
A tool that is sorely missing in the arsenal of firewall administrators and auditors is one that allows them to analyze the policy on a firewall.  ...  This paper describes the design and architecture of these tools, their evolution from a research prototype to a commercial product, and the lessons we have learned along the way.  ...  In addition, if a default route exists in the routing table, then the algorithm uses the zone to which the default route leads to define the Outside host group.  ... 
doi:10.1007/s10207-005-0074-z fatcat:dpvba4xjvjfj7i6ajywbykb6z4
« Previous Showing results 1 — 15 out of 15,913 results