Search results for "Work Performance"

showing 10 items of 71 documents

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

2009

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

business.industryComputer scienceWireless networkNetwork packetDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlCooperative diversitylaw.inventionTransmit diversityRelaylawComputer Science::Networking and Internet ArchitectureNetwork performancebusinessSelection algorithmComputer Science::Information TheoryComputer network2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
researchProduct

Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names

2021

Malware detection is a problem that has become particularly challenging over the last decade. A common strategy for detecting malware is to scan network traffic for malicious connections between infected devices and their command and control (C&C) servers. However, malware developers are aware of this detection method and begin to incorporate new strategies to go unnoticed. In particular, they generate domain names instead of using static Internet Protocol addresses or regular domain names pointing to their C&C servers. By using a domain generation algorithm, the effectiveness of the blacklisting of domains is reduced, as the large number of domain names that must be blocked g…

Feature engineeringGeneral Computer ScienceArtificial neural networkComputer sciencebusiness.industrymalwareDeep learningGeneral EngineeringDeep learningdomain generation algorithmscomputer.software_genreBlacklistDomain (software engineering)TK1-9971ServerMalwareGeneral Materials ScienceNetwork performanceArtificial intelligenceData miningElectrical engineering. Electronics. Nuclear engineeringbusinessLSTMcomputerIEEE Access
researchProduct

Deploying Virtual MAC Protocols Over a Shared Access Infrastructure Using MAClets

2013

Network virtualization has been extensively researched in the last years as a key enabler for improving the network performance. However, virtualization in wireless networks pose some unique challenges: first, the usual over-provisioning approach for providing isolation between multiple virtual entities is not viable; second, the partitioning criteria are often ambiguous, since the actual resources perceived by each entity depend on many external (and time-varying) factors. In this demo, we show an effective virtualization solution for wireless local area networks, solving the problem of isolation and flexible resource paritioning, based on the concept of MAClets. MAClets are software progr…

Full virtualizationHardware virtualizationNetwork packetComputer scienceWireless networkbusiness.industrySettore ING-INF/03 - TelecomunicazioniDistributed computingLocal area networkNetwork virtualizationVirtualizationcomputer.software_genreUploadNetwork performancebusinesscomputerComputer networkCognitive network wireless internet mac layer
researchProduct

Using a hazard-independent approach to understand road-network robustness to multiple disruption scenarios

2021

Abstract A range of predictable and unpredictable events can cause road perturbations, disrupting traffic flows and more generally the functioning of society. To manage this threat, stakeholders need to understand the potential impact of a multitude of predictable and unpredictable events. The present paper adopts a hazard-independent approach to assess the robustness (ability to maintain functionality despite disturbances) of the Sioux Falls network to all possible disruptions. This approach allows understanding the impact of a wide range of disruptive events, including random, localised, and targeted link failures. The paper also investigates the predictability of the link combinations wh…

050210 logistics & transportationPotential impactComputer science020209 energy05 social sciencesTransportationLink criticality Network robustness Resilience assessment Road networks Traffic congestion Travel time02 engineering and technologyHazardRisk analysis (engineering)0502 economics and business0202 electrical engineering electronic engineering information engineeringRange (statistics)Settore ICAR/04 - Strade Ferrovie Ed AeroportiNetwork performanceSensitivity (control systems)PredictabilityRobustness (economics)General Environmental ScienceCivil and Structural Engineering
researchProduct

Performance analysis of user-centric SBS deployment with load balancing in heterogeneous cellular networks: A Thomas cluster process approach

2020

Abstract In conventional heterogeneous cellular networks (HCNets), the locations of user equipments (UEs) and base stations (BSs) are modeled randomly using two different homogeneous Poisson point processes (PPPs). However, this might not be a suitable assumption in case of UE distribution because UE density is not uniform everywhere in HCNets. Keeping in view the existence of nonuniform UEs, the small base stations (SBSs) are assumed to be deployed in the areas with high UE density, which results in correlation between UEs and BS locations. In this paper, we analyse the performance of HCNets with nonuniform UE deployment containing a union of clustered and uniform UE sets. The clustered UE…

Computer Networks and CommunicationsComputer scienceDistributed computing020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Poisson distributionsymbols.namesakeBase station0202 electrical engineering electronic engineering information engineeringsymbolsCellular network020201 artificial intelligence & image processingNetwork performanceStochastic geometryComputer Networks
researchProduct

Industrial video sequences for network performance evaluation

2005

The analysis of video traffic characteristics plays a fundamental role in the evaluation of network performance or schedule design. However, the majority of these analyses are based on the study of traffic characteristics generated with different codifiers on typical general purpose films or sequences. These are generally made using asymmetric codifiers which are not usable in live real-time multimedia transmission systems. Moreover, the properties of these sequences are not necessarily equivalent to those obtained in an industrial environment. In this paper industrial monitoring video sequences are presented, describing their various characteristics, from the point of view of the source as…

ScheduleGeneral purposePoint (typography)Computer sciencemedia_common.quotation_subjectReal-time computingNetwork performanceQuality (business)Video sequenceVideo processingUSablemedia_common
researchProduct

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

2017

International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…

EngineeringAnomaly-based intrusion detection systemintrusion detection system (IDS)Context (language use)02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreBayesian game[ SPI.GCIV.IT ] Engineering Sciences [physics]/Civil Engineering/Infrastructures de transportUtility[ SPI.NRJ ] Engineering Sciences [physics]/Electric power0202 electrical engineering electronic engineering information engineering[ SPI.GCIV ] Engineering Sciences [physics]/Civil Engineering[ SPI ] Engineering Sciences [physics]Overhead (computing)Network performanceunmanned aerial vehicles (UAVs)Ad HocBayesian gameVehicular ad hoc networkbusiness.industryMechanical EngineeringNode (networking)020206 networking & telecommunicationsComputer Science Applications[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsEfficientAutomotive Engineeringintrusion ejection system (IES)020201 artificial intelligence & image processingVehicular NetworksWireless Sensor NetworksbusinesscomputerComputer network
researchProduct

SimuRed: A flit-level event-driven simulator for multicomputer network performance evaluation

2009

The interconnection network is one of the most important multicomputer components, since it has a great impact on global system performance. Many models and simulators have been proposed to evaluate network performance. This paper presents SimuRed, an event-driven flit-level, cycle-accurate simulator to evaluate different orthogonal network configurations. The core of the simulator has been designed to be expandable and portable to different situations. Some of the advantages of this simulator over other similar tools are its visual interface, its fast execution and its simplicity. Moreover, it is multiplatform and its source code versions (C++ and Java) are freely available under GNU open-…

InterconnectionSource codeGeneral Computer ScienceComputer architecture simulatorJavaComputer scienceEvent (computing)business.industrymedia_common.quotation_subjectControl and Systems EngineeringEmbedded systemNetwork performancePolygon meshHypercubeElectrical and Electronic EngineeringbusinesscomputerSimulationmedia_commoncomputer.programming_languageComputers & Electrical Engineering
researchProduct

Pumps as turbines (PATs) in water distribution networks affected by intermittent service

2013

A hydraulic model was developed in order to evaluate the potential energy recovery from the use of centrifugal pumps as turbines (PATs) in a water distribution network characterized by the presence of private tanks. The model integrates the Global Gradient Algorithm (GGA), with a pressure-driven model that permits a more realistic representation of the influence on the network behaviour of the private tanks filling and emptying. The model was applied to a real case study: a District Metered Area in Palermo (Italy). Three different scenarios were analysed and compared with a baseline scenario (Scenario 0 – no PAT installed) to identify the system configuration with added PATs that permits th…

Atmospheric ScienceService (systems architecture)geographyEngineeringgeography.geographical_feature_categorybusiness.industryNode (networking)Monte Carlo methodGeotechnical Engineering and Engineering GeologyCentrifugal pumpInletpressure-driven demandenergy productionwater distribution networkshydraulic modellingNetwork performancepump as turbineBaseline (configuration management)businessDownstream (networking)SimulationCivil and Structural EngineeringWater Science and TechnologyMarine engineeringJournal of Hydroinformatics
researchProduct

A Communication-Aware Topological Mapping Technique for NoCs

2008

Networks---on---Chip (NoCs) have been proposed as a promising solution to the complex on-chip communication problems derived from the increasing number of processor cores. The design of NoCs involves several key issues, being the topological mapping (the mapping of the Intellectual Properties (IPs) to network nodes) one of them. Several proposals have been focused on topological mapping last years, but they require the experimental validation of each mapping considered. In this paper, we propose a communication-aware topological mapping technique for NoCs. This technique is based on the experimental correlation of the network model with the actual network performance, thus avoiding the need…

Computer Science::Hardware ArchitectureComputer scienceNode (networking)Distributed computingNetwork performanceTopological mappingEnergy consumptionNetwork topologyNetwork model
researchProduct