We also emphasize the combined usage of different techniques for quality-of-service (QoS) improvement. In order to judge the current service quality on different layers within the protocol hierarchy we introduce a set of QoS measures for each of the basic service interfaces identified. Finally, ...
In this paper we propose new techniques to improve scheduling performance in time-slotted superframe based ad hoc networks. Such channel access technology is used in the IEEE 802.15.3 and 802.15.4 standards. Building on the performance analysis of previous proposals, we enhance the scheduling algori...
By suppressing the compiler warning, you are taking full responsibility to ensure that the cast will always be safe, even if run on 64-bit platforms. In the previous example, you can see that the size of the vector is less than std::numeric_limits<ULONG>::max()...
It runs a batch file to disable any wireless NICs (all connections except the Local Area Connection are disabled), removes the Quality of Service (QoS) IPsec service on the internal NIC, and removes the \D folder in the root of the C: drive. To make sure these commands run, rmdir.exe...
Cache techniques have not only received substantial recent research attention, but also been implemented and deployed with success in different networks. Cache techniques are important for reducing Internet access latency, network traffic, and server load in different networks. We give recent advances abo...
Electricity distribution is the final step in delivering power to end users. The distribution domain transports power from the transmission system to consumers. To monitor the distribution network, advanced monitoring systems such as Advanced Metering Infrastructure (AMI) are used. AMI is an integrated...
However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency ...
In comparison to an implementation of the selfish-step algorithm using Dijkstra's algorithm we improve the total running time by a factor of 4 up to 9 on highway networks and grids. 展开 关键词: Nash equilibria game theory network congestion games selfish step algorithm shortest paths speed-up...
IoT forensics consists of three layers [11] as shown inFigure 2: the device level, network level, and cloud level. Each of these can provide vital information to investigators. On a device level, forensic investigators collect data directly from the local memory of the physical device for anal...
V2I: Vehicle to Infrastructure V2V: Vehicle to Vehicle VANET: Vehicular Ad-hoc Network VHN: Vehicular Heterogeneous Networks VPKI: Vehicular Public Key Infrastructure 1.1. Contributions of this work The main objective of this work is to provide a comprehensive review of the papers published in the...