Parcourir par sujet "Electric network topology"
Voici les éléments 1-10 de 10
-
A demonstration of a relaying selection scheme for maximizing a diamond network's throughput
(2012)We demonstrate a queue-aware algorithm studied in a diamond network topology. This algorithm's decisions are obtained from an analytical optimization framework relying on our technical work [4] and we devise an implementation ... -
Distributed cache management in information-centric networks
(2013)The main promise of current research efforts in the area of Information-Centric Networking (ICN) architectures is to optimize the dissemination of information within transient communication relationships of endpoints. ... -
Distributed resource allocation algorithms for peer-to-peer networks
(2008)In peer-to-peer networks, each peer plays the role of client and server. As server, it receives content requests made by other peers and needs to decide on what basis and to what extent it will satisfy these requests by ... -
Effective cache management and performance limits in information-centric networks
(2013)Proliferation of content distribution traffic in the Internet is changing the requirements on the networking infrastructure to the extent that radical new architectures are envisioned, where information is addressed by ... -
Energy-aware base stations: The effect of planning, management, and femto Layers
(2014)We compare the performance of three base station management schemes on three different network topologies. In addition, we explore the effect of offloading traffic to heterogeneous femtocell layer upon energy savings taking ... -
Exploiting cross-layer packet overhearing for opportunistic distributed STC in wireless relay networks
(2013)In this paper we propose a distributed Alamoutibased space-time code (STC) where opportunistic listening of packets from independent sources is exploited. Relays overhear broadcasted packets from multiple sources and ... -
Lightweight jammer localization in wireless networks: System design and implementation
(2009)Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal ... -
Optimal algorithms for hierarchical web caches
(2013)Hierarchical topologies have been applied in many existing systems that provide public IPTV or massive content delivery services. The efficient operation of these services requires massive bandwidth resources. Data caching ... -
A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding
(2016)Network coding has been shown to offer significant throughput benefits over certain wireless network topologies. However, the application of network coding may not always improve the network performance. In this paper, we ... -
Uplink allocation based on user actions for peer-to-peer Video-on-Demand
(2014)For more than a decade peer-to-peer networking technologies have met with huge success among Internet users, with peer-to-peer traffic already accounting for the largest part of the Internet's total traffic. Peer-to-peer ...