Search results for "Tribute"

showing 10 items of 1455 documents

Notice of Violation of IEEE Publication Principles: Reinforcement learning for P2P searching

2005

For a peer-to-peer (P2P) system holding a massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured P2P networks avoid the limitations of centralized systems and the drawbacks of a highly structured approach, because they impose few constraints on topology and data placement, and they support highly versatile search mechanisms. However their search algorithms are usually based on simple flooding schemes, showing severe inefficiencies. In this paper, to address this major limitation, we propose and evaluate the adoption of a local adaptive routing protocol. The routing algorithm adopts a simple reinforcement learni…

Routing protocolSmall-world networkComputer scienceSearch algorithmbusiness.industryDistributed computingScalabilityReinforcement learningbusinessNetwork topologyComputer networkShared resourceFlooding (computer networking)Seventh International Workshop on Computer Architecture for Machine Perception (CAMP'05)
researchProduct

IMRR and IMPR Routing Protocols For Inter and Intra Wireless Mesh Communications

2015

Given the evolution of wireless technologies, Wireless Mesh Networks (WMN) have appeared as an emerging low-cost solution to ensure last-mile connectivity to the Internet network. However, providing real-time and streaming applications, such as VoIP (Voice over IP) and VoD (Video on Demand), with a satisfying QoS level is considered as an important challenge within these networks. In this paper, we propose a QoS based routing protocol, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to improve the scalability of mesh networks. HQMR is composed of two routing sub- protocols: a reactive QoS based routing protocol for intra-mesh infrastructure communications and a pr…

Routing protocolStatic routingZone Routing ProtocolDynamic Source Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputer scienceHQMRDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolNetwork simulationWireless Routing ProtocolQoS020206 networking & telecommunications02 engineering and technologyWMNRouting protocolLink-state routing protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

Evaluating a bound for MANETs routing protocols performance using graphs with activation windows

2008

In this paper we present an algorithm called STPA (shortest time path algorithm) which aims at providing a comparison tool for the evaluation of a bound for mobile ad hoc networks (MANETs) routing protocols performance. STPA provides an exhaustive evaluation of an ideal routing protocol. Based on the current position and state of the nodes it can determine factors like: how many complete messages get to the destination, which is the smallest amount of time required by a packet to get to the destination, which path followed each packet, and so on. This values would allow a protocol designer to improve or fine tune his proposal. We demonstrate that the complexity of the algorithm is O(sigma2)…

Routing protocolWireless ad hoc networkEqual-cost multi-path routingComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSWireless Routing ProtocolMobile ad hoc networkOptimized Link State Routing ProtocolLink-state routing protocolComputer Science::Networking and Internet ArchitectureDestination-Sequenced Distance Vector routingbusinessComputer networkProceedings of the 6th Intl Symposium on Modeling and Optimization
researchProduct

An optimized path-selection using airtime metric in OLSR networks: Implementation and testing

2008

Wireless mesh networks used for broadband access may be equipped with multiple Internet gateways. Using airtime metric as the main criterion for path selection is an effective method for achieving load-balancing in such a multi-homed mesh network. In this paper, we describe how the radio-aware path selection using airtime as a metric can be implemented in order to achieve this functionality, based on a modified version of an open source OLSR implementation. The paper presents both the principle of this method, its implementation and the empirical results which focus on testing the airtime metric functionality based on a deployed small-scale test network.

Routing protocolWireless mesh networkComputer sciencebusiness.industryDistributed computingMesh networkingLoad balancing (computing)Optimized Link State Routing ProtocolBroadbandComputer Science::Networking and Internet ArchitectureThe InternetbusinessInternetworkingComputer network2008 IEEE International Symposium on Wireless Communication Systems
researchProduct

Performance Analysis in Spatially Correlated IEEE 802.11 Networks

2012

Wireless mesh networks are difficult to be characterized, especially under multi-hop traffic streams. The problem is that the local view of the channel and the correlation between the buffers of consecutive nodes in a stream path make complicated the identification of the contention level perceived by each station along the time. Such a figure is used in the models based on the so called decoupling assumption for evaluating the final scheduling of simultaneous channel access grants. In this paper we propose a simplified mesh network model focused on capturing the correlation due to the network topology and traffic routes rather than the access protocol state at each node. To this purpose, w…

Routing protocolWireless mesh networkbusiness.industryWireless networkComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingMesh networkingThroughputNetwork topologyScheduling (computing)IEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitecturebusinessSpatial Correlated Wireless Network Performance EvaluationNetwork modelComputer network
researchProduct

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

2010

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transm…

Routing protocolbusiness.industryNetwork packetWireless networkComputer scienceRetransmissionDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionComputer Science::PerformanceRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessComputer Science::Information TheoryComputer networkEfficient energy use2010 European Wireless Conference (EW)
researchProduct

Latency factor in worldwide IP routed networks

2014

Current Border Gateway Protocol (BGP) serves for worldwide internet backbone connections between different Autonomous Systems (AS) on the routing level. Continuously in real-time changing environment core routers calculate routing decisions based on path-vector database entries. AS path-vector database may contain multiple paths for various Internet Protocol (IP) prefix destinations where smallest entity in the path-vector is AS. In real world AS can be internet service operator, university or any other organization willing to participate in internet network via multi-homed uplinks. Unfortunately, internal part of AS is hidden in path-vector database thus excluding factors like latency, pac…

Routing protocolbusiness.industrycomputer.internet_protocolComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolIP forwardingAutonomous system (Internet)Internet backbonelaw.inventionlawInternet ProtocolBorder Gateway ProtocolDefault-free zonebusinesscomputerComputer network2014 IEEE 2nd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

Routing protocolbusiness.product_categoryBroadband networksComputer scienceMesh networkingHop (networking)law.inventionlawVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552BroadbandInternet accessWi-FiElectrical and Electronic EngineeringVDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Network architectureWireless mesh networkbusiness.industryWireless networkQuality of serviceWireless WANOrder One Network ProtocolComputer Science ApplicationsInternet Connection SharingDigital subscriber lineNetwork access pointHazy Sighted Link State Routing ProtocolRural areabusinessTelecommunicationsMunicipal wireless networkComputer network
researchProduct

Materiały sejmikowe w spuściźnie po Ludwiku Gruno, księciu Hessen-Homburg w archiwum Muzeum Artylerii, Wojsk Inżynieryjnych i Łączności w Sankt Peter…

2018

The article discusses source materials for history o f Polish-Lithuanian Commonwealth Dietines, found in archival legacy o f Ludwig Gruno, Prince o f Hesse-Homburg. The documents are part o f field chancellery o f the prince, currently preserved in the Military-Historical Museum of Engineer and Signal Corps in St. Petersburg among over a thousand of letters, documents and files illustrating his achievements as commander o f Russian armies in the Caucasus and Poland in 1732-1736. The documents pertain mostly to tsarist army exacting war tribute in form o f food and feed in South- Eastern voivodeships from autumn 1734 to 1736. It was a significant burden to noblemen in Ukrainę, Podolia, Volhy…

RzeczpospolitaMilitary - Historical Museum of Engineer and Signal Corps in St. Petersburgpolska wojna sukcesyjnakontrybucja wojenna dla armii rosyjskiejCommonwealth of Two NationsPolish succesion wardietinesMuzeum ArtyleriiLudwig Gruno - Prince of Hesse - Homburgwar tribute to Russian armysejmikiWojsk Inżynieryjnych i Łączności w PetersburguLudwik Gruno książę Hessen - HomburgMiscellanea Historico-Archivistica
researchProduct

Reliable Coverage with Circumferential WMSNs

2021

This work tackles the closed peripheral coverage issue. Such circumferential surveillance is essential in numerous realistic applications where the goal is to ensure rapid detection of any unauthorized entry/exit of the monitored area. To respond to these requirements, peripheral WMSNs can be rapidly deployed around areas of interest (e.g., temporary military camps, natural or nuclear disasters, etc.). While it seems simple, this solution raises two major challenging issues. First, checking whether the deployed peripheral WMSN forms a closed shape around the monitored region. That is, any object trying to leave or access this area must be instantaneously detected by at least one multimedia …

SIMPLE (military communications protocol)Computer scienceDistributed algorithmbusiness.industryReliability (computer networking)Sensor nodebusinessRapid detectionComputer networkScheduling (computing)ICC 2021 - IEEE International Conference on Communications
researchProduct