Some observations on optimal frequency selection in DVFS-based energy consumption minimization
In recent years, the issue of energy consumption in parallel and distributed computing systems has attracted a great deal of attention. In response to this, many energy-aware scheduling algorithms have been developed primarily using the dynamic voltage-...
Research note: On the uniformity of peer sampling based on view shuffling
Consider a group of peers, an ideal random peer sampling service should return a peer, which is a uniform independent random sample of the group. This paper focuses on the implementation and analysis of a peer sampling service based on symmetric view ...
Toward a practical approach for BGP stability with root cause check
The instability issues of the Border Gateway Protocol (BGP), such as route oscillations and path explorations, can decrease the performance of packet forwarding and place heavy workload on routers. While BGP instability has been extensively studied, ...
FPGA implementation and performance evaluation of a high throughput crypto coprocessor
This paper describes the FPGA implementation of FastCrypto, which extends a general-purpose processor with a crypto coprocessor for encrypting/decrypting data. Moreover, it studies the trade-offs between FastCrypto performance and design parameters, ...
HD Tree: A novel data structure to support multi-dimensional range query for P2P networks
There are two basic concerns for supporting multi-dimensional range query in P2P overlay networks. The first is to preserve data locality in the process of data space partitioning, and the second is the maintenance of data locality among data ranges ...
Strategic behavior modeling of multi-service overlay multicast networks based on auction mechanism design
Since the users of overlay multicast networks belong to different administrative domains, they are selfish in nature; resulting in degradation of performance. That is why strategic behavior modeling is a hot topic in the area of the overlay multicast ...
Secure message transmission in asynchronous networks
In the Perfectly Secure Message Transmission (PSMT) problem, a sender S and a receiver R are part of a distributed network and connected through n node disjoint paths, also called as wires, among which at most t wires are controlled by a static, ...
Fuzzy online location management in mobile computing environments
This paper presents a new approach, namely Intelligent Fuzzy Online Location Management Strategy (IFOLMS), based on Fuzzy clustering techniques to solve the mobile location management problem. Using a Fuzzy location estimator in this technique, mobile ...
Capability information: A cost-effective information model for multi-hop routing of wireless ad hoc networks in the real environment
In greedy routing, each relay node forwards the message to a neighbor (also called the successor) that is closer to the destination. However, the successor candidate set (SCS) is different every time the relative location of the relay node to the ...