Filters








1,756 Hits in 5.4 sec

Priority-aware optical shared protection: An offline evaluation study

Wissam Fawaz, Timothy Sawah, Chadi Abou-Rjeily
2009 Computer Communications  
More specifically, we develop an offline study whose main purpose is to assess the efficiency of the priority-aware shared protection scheme.  ...  Through this study, we show that the priority-aware shared protection strategy as opposed to existing protection strategies is able to achieve the best tradeoff between optical resource usage and optical  ...  It is important to note that in [8] we presented an online study of the priority-aware shared protection scheme, where we evaluated the performance of the proposed scheme in a dynamic network environment  ... 
doi:10.1016/j.comcom.2009.06.010 fatcat:k2chhkx4mnhpxcih3dqgjqu57q

Priority-enabled optical shared protection: An online efficiency evaluation study

W. Fawaz, K. Chen, G. Pujolle
2007 Computer Communications  
Through this study, we show that the priority-aware shared protection strategy is able to achieve both the best efficiency in terms of resource usage and in terms of availability satisfaction rate compared  ...  In a previous work, we proposed the so-called priority-aware shared protection as a potential survivability scheme for next generation WDM networks to deal with the previously exhibited concern.  ...  Our future work consists in completing the cost evaluation through an offline study. Fig. 1 . 1 General shared protection example.  ... 
doi:10.1016/j.comcom.2007.07.009 fatcat:44genua6hzamdjbwilxxpk75oy

A Novel Offline Physical Layer Impairments Aware RWA Algorithm With Dedicated Path Protection Consideration

Siamak Azodolmolky, Mirosław Klinkowski, Yvan Pointurier, Marianna Angelou, Davide Careglio, Josep Sole-Pareta, Ioannis Tomkos
2010 Journal of Lightwave Technology  
In this work we propose a novel offline IA-RWA algorithm, called Rahyab and perform a comparative performance evaluation study, which considers two enhanced algorithms from the literature.  ...  There are very few offline IA-RWA algorithms that consider dedicated path protection demands.  ...  A recent study shows that the CAPEX difference of shared (e.g., 1:1) and dedicated (e.g., ) path protection schemes is much lower in transparent optical networks comparing with its opaque counterpart  ... 
doi:10.1109/jlt.2010.2072905 fatcat:oohzhcyyq5eexk63ybjg7nltly

On Routing, Wavelength, Network Coding Assignment and Protection Configuration Problem in Optical-processing-enabled Networks [article]

Dao Thanh Hai
2022 arXiv   pre-print
dedicated path protection in wavelength division multiplexing (WDM) networks with an extra degree of freedom in the selection of protection triggering mechanism, that is, network-side and client-side,  ...  In optical-processing-enabled network, transitional lightpaths crossing the same node could be optically encoded to each other to achieve greater spectral efficiency.  ...  In this study, the most demanding cases have been solved optimally in less than 4 hours which can be acceptable for offline planning.  ... 
arXiv:2204.12027v1 fatcat:pvvkffuor5amrnazoajc6en6dq

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
The second is an algorithm. The third is an interaction method. Each of those is fairly self-contained and possible to evaluate using a fairly closed study.  ...  But we now briefly mention a few of the key themes in this study, including using complexity to protect, using algorithms to attack, studying approximations to bypass protections, and analyzing manipulation  ...  Appalachian State University is an Affirmative Action/Equal Opportunity Employer.  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y

TelosCAM: Identifying Burglar through Networked Sensor-Camera Mates with Privacy Protection

Shaojie Tang, Xiang-Yang Li, Haitao Zhang, Jiankang Han, Guojun Dai, Cheng Wang, Xingfa Shen
2011 2011 IEEE 32nd Real-Time Systems Symposium  
We present TelosCam, a networking system that integrates wireless module nodes (such as TelosB nodes) with existing legacy surveillance cameras to provide storage-efficient and privacy-aware services of  ...  In our system, a property owner will have a wireless module node (called secondary module) for each of the properties that s/he wants to protect.  ...  Based on these needs, the prioritization strategies employed by our system can be grouped into the following categories: priority-aware computation and priority-aware communication.  ... 
doi:10.1109/rtss.2011.37 dblp:conf/rtss/TangLZHDWS11 fatcat:saj64myyubbpdejwpaoeivranu

A Comparative Study on the Effect of Strategy Selection on Shared Backup in WDM MLR Optical Networks

Gul Boztok Algin, E. Turhan Tunali
2020 IEEE Access  
INDEX TERMS MLR, optical WDM networks, routing, rate and wavelength assignment (RRWA), shared backup protection, survivable communication.  ...  This study aims at identifying the pros and cons of these alternatives together with examining their performances. For this purpose, performance metrics that characterize sharing are first developed.  ...  In our studies, several test scenarios with different priorities have been evaluated, while best performance scenarios are presented later in this work. A.  ... 
doi:10.1109/access.2020.2978984 fatcat:hv375vjl6jcn3dgca4kz2o23am

Understanding and Protecting Yourself against Threats in the Internet

Ajith Sundaram
2017 Asian Social Science  
Use File Sharing with Caution-always use password protection for anything that is being shared. If the file sharing option is unnecessary, disable it.  ...  To prevent attackers from reading sensitive files, deactivate file sharing feature when linking to a public wireless access plug. Seek help to study the ways to disable file transferring.  ...  This will ensure that there is the most up-to-date protection possible against viruses. In addition, ensure the antivirus software chosen encompasses an email scanning feature.  ... 
doi:10.5539/ass.v13n12p201 fatcat:n67ntum7cvg5daf3r5cqe3dvfe

Spectrum management techniques for elastic optical networks: A survey

Sahar Talebi, Furqan Alam, Iyad Katib, Mohamed Khamis, Reda Salama, George N. Rouskas
2014 Optical Switching and Networkning Journal  
Protection The problem of ensuring dedicated or shared protection of established connections in an EON may be viewed as a variant of the offline and online RSA problems with additional constraints to account  ...  The study in [75] considered the online RSA problem with shared protection, and introduced two policies for spectrum sharing among backup paths.  ... 
doi:10.1016/j.osn.2014.02.003 fatcat:mqatv3meubfqxdjn7xikdlsbnm

Data Service Outsourcing and Privacy Protection in Mobile Internet [chapter]

Zhen Qin, Erqiang Zhou, Yi Ding, Yang Zhao, Fuhu Deng, Hu Xiong
2018 Data Service Outsourcing and Privacy Protection in Mobile Internet  
control through effective user privacy protection mechanism, and the data sharing in the mobile Internet, which provide technical support for improving various service applications based on mobile Internet  ...  However, outsourcing to third parties may cause some risks in user privacy protection.  ...  Ordering points to identify the clustering structure (OPTICS) OPTICS algorithm can get different density clustering.  ... 
doi:10.5772/intechopen.79903 fatcat:kvdisoudirgdhd7tvscnhsb6gm

Convention on the Protection and Promotion of the Diversity of Cultural Expressions (2005)

2008 Diogenes (English Edition)  
download or to share contents protected by authors' or related rights (Gunthert 2009) .  ...  As to the quotes contained in the texts, wherever an official version existed in the target language, it was used in priority.  ...  Is there an increase in supplied diversity? Theories of Long Tail and Superstars say "yes". But usually studies on the subject look at variety, balance, but rarely at disparity.  ... 
doi:10.1177/0392192108092630 fatcat:ttg7bgdiovghdejm7z2s7ekxgi

Convention on the Protection and Promotion of the Diversity of Cultural Expressions

2006 International Journal of Cultural Property  
download or to share contents protected by authors' or related rights (Gunthert 2009) .  ...  As to the quotes contained in the texts, wherever an official version existed in the target language, it was used in priority.  ...  Is there an increase in supplied diversity? Theories of Long Tail and Superstars say "yes". But usually studies on the subject look at variety, balance, but rarely at disparity.  ... 
doi:10.1017/s0940739106060218 fatcat:uuqvapebyfhsppmmnxmeud3z5y

Dynamic Bandwidth Allocation With SLA Awareness for QoS in Ethernet Passive Optical Networks

Abhishek Dixit, Bart Lannoo, Goutam Das, Didier Colle, Mario Pickavet, Piet Demeester
2013 Journal of Optical Communications and Networking  
The proposed delay aware (DA) online DBA algorithm provides constant and predictable average packet delay and reduced delay variation for the high and medium priority traffic while keeping the packet loss  ...  Quality-of-service (QoS) support in Ethernet passive optical networks (EPON) is a crucial concern.  ...  SIMULATION RESULTS We study the performance of the proposed delay aware (DA) DBA scheme by conducting a simulation of an EPON access network model using the OPNET simulation tool.  ... 
doi:10.1364/jocn.5.000240 fatcat:se4agl5b45e3pkwvbnzjmu6tde

D1.2 Regulatory Framework For Data Protection, Privacy And Ethical Issues

The Smile Of Child, ChildFocus, Hellenic Red Cross, NTUA, UBITECH
2018 Zenodo  
Powers of the reformed Authority The powers of the Data Protection Authority may be summarised into four categories, in order of priority: • Providing information and advice to individuals, controllers  ...  require the evaluation of several, concrete aspects or objectives.  ... 
doi:10.5281/zenodo.1255870 fatcat:wtas4z5mh5bermtei45y7lbufa

Cross-Layer Approaches for Planning and Operating Impairment-Aware Optical Networks

Josep Sole-Pareta, Suresh Subramaniam, Davide Careglio, Salvatore Spadaro
2012 Proceedings of the IEEE  
This paper presents some recent developments in cross-layer approaches for planning and operating impairment-aware optical networks; included are associated challenges, comparative analysis with some solutions  ...  In this paper, we aim to provide an overview of such challenges, reporting comparative analysis with a selection of existing solutions and to cast a glance at the open issues for future research.  ...  A number of high-quality articles and books (e.g., [9] and [12] ) addressed the evaluation of QoT of an optical signal in the past.  ... 
doi:10.1109/jproc.2012.2185669 fatcat:3qlwvx2eaja5xg5jzoe3cgu7ky
« Previous Showing results 1 — 15 out of 1,756 results