Loading...
Search for: nodes--network
0.007 seconds

    An outer bound on the capacity region of Broadcast-Relay-Channel

    , Article IEEE International Symposium on Information Theory - Proceedings, 13 June 2010 through 18 June 2010, Austin, TX ; 2010 , Pages 599-603 ; 21578103 (ISSN) ; 9781424469604 (ISBN) Salehkalaibar, S ; Ghabeli, L ; Aref, M. R ; Sharif University of Technology
    2010
    Abstract
    In this paper, we obtain an outer bound on the capacity region of the Broadcast-Relay-Channel (BRC). BRC is a four node network with one source, one relay and two destinations. To the best of our knowledge, this work represents the first effort to find an outer bound on the capacity region of the BRC. In the proof, we jointly utilize the ideas of the outer bounds on the Broadcast Channel (BC) and also the cut-set bound. The proposed outer bound looks like the inner bound obtained by Kramer et. al for BRC  

    A new scheme on recovery from failure in NICE overlay protocol

    , Article 1st International Conference on Scalable Information Systems, InfoScale '06, Hong Kong, 30 May 2006 through 1 June 2006 ; Volume 152 , 2006 ; 1595934286 (ISBN); 9781595934284 (ISBN) Abdolhosseini Moghadam, A. R ; Barghi, S ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2006
    Abstract
    Overlay networks have been an active area of research for the past few years. The control overhead and the recovery from failure are the two important issues in the topology aware embedded overlay networks. In this research, we have introduced an enhanced version of the NICE protocol, called resilient NICE (R-NICE) that reduces the control overhead significantly. Furthermore, by saving the join path for an end host, the time and overhead of rejoining for isolated nodes have also been reduced. This will cause the clusters and consequently the overall network to become more stable and the effect of a node failure become localized. Our experimental results have confirmed the superior... 

    Power and performance efficient partial circuits in packet-switched networks-on-chip

    , Article Proceedings of the 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2013 ; 27 February - 1 March , 2013 , pp. 509-513 ; Print ISBN: 9781467353212 Teimouri, N ; Modarressi, M ; Sarbazi-Azad, H ; Sharif University of Technology
    Abstract
    In this paper, we propose a hybrid packet-circuit switching for networks-on-chip to benefit from the advantages of both switching mechanisms. Integrating circuit and packet switching into a single NoC is achieved by partitioning the link bandwidth and router data-path and control-path elements into two parts and allocating each part to one of the switching methods. In this NoC, during injection in the source node, packets are initially forwarded on the packet-switched sub-network, but keep requesting a circuit towards the destination node. The circuit-switched part, at each cycle, collects the circuit construction requests, performs arbitration among the conflicting requests, and constructs... 

    Power and performance efficient partial circuits in packet-switched networks-on-chip

    , Article Proceedings of the 2013 21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2013 ; February , 2013 , Pages 509-513 ; 9780769549392 (ISBN) Teimouri, N ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    2013
    Abstract
    In this paper, we propose a hybrid packet-circuit switching for networks-on-chip to benefit from the advantages of both switching mechanisms. Integrating circuit and packet switching into a single NoC is achieved by partitioning the link bandwidth and router data-path and control-path elements into two parts and allocating each part to one of the switching methods. In this NoC, during injection in the source node, packets are initially forwarded on the packet-switched sub-network, but keep requesting a circuit towards the destination node. The circuit-switched part, at each cycle, collects the circuit construction requests, performs arbitration among the conflicting requests, and constructs... 

    Compressed sensing in cyber physical social systems

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 10760 LNCS , 2018 , Pages 287-305 ; 03029743 (ISSN) Grosu, R ; Ghalebi, K. E ; Movaghar, A ; Mahyar, H ; Sharif University of Technology
    Abstract
    We overview the main results in Compressed Sensing and Social Networks, and discuss the impact they have on Cyber Physical Social Systems (CPSS), which are currently emerging on top of the Internet of Things. Moreover, inspired by randomized Gossip Protocols, we introduce TopGossip, a new compressed-sensing algorithm for the prediction of the top-k most influential nodes in a social network. TopGossip is able to make this prediction by sampling only a relatively small portion of the social network, and without having any prior knowledge of the network structure itself, except for its set of nodes. Our experimental results on three well-known benchmarks, Facebook, Twitter, and Barabási,... 

    Network reconstruction under compressive sensing

    , Article Proceedings of the 2012 ASE International Conference on Social Informatics, SocialInformatics ; 2013 , Pages 19-25 ; 9780769550152 (ISBN) Siyari, P ; Rabiee, H. R ; Salehi, M ; Mehdiabadi, M. E ; Academy of Science and Engineering (ASE) ; Sharif University of Technology
    2013
    Abstract
    Many real-world systems and applications such as World Wide Web, and social interactions can be modeled as networks of interacting nodes. However, in many cases, one encounters the situation where the pattern of the node-to-node interactions (i.e., edges) or the structure of a network is unknown. We address this issue by studying the Network Reconstruction Problem: Given a network with missing edges, how is it possible to uncover the network structure based on certain observable quantities extracted from partial measurements? We propose a novel framework called CS-NetRec based on a newly emerged paradigm in sparse signal recovery called Compressive Sensing (CS). The results demonstrate that... 

    Zero error coordination

    , Article ITW 2015 - 2015 IEEE Information Theory Workshop, 11 October 2015 through 15 October 2015 ; 2015 , Pages 202-206 ; 9781467378529 (ISBN) Abroshan, M ; Gohari, A ; Jaggi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, we consider a zero error coordination problem wherein the nodes of a network exchange messages to be able to perfectly coordinate their actions with the individual observations of each other. While previous works on coordination commonly assume an asymptotically vanishing error, we assume exact, zero error coordination. Furthermore, unlike previous works that employ the empirical or strong notions of coordination, we define and use a notion of set coordination. This notion of coordination bears similarities with the empirical notion of coordination. We observe that set coordination, in its special case of two nodes with a one-way communication link is equivalent with the Hide... 

    A secure key management framework for heterogeneous wireless sensor networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 19 October 2011 through 21 October 2011 ; Volume 7025 LNCS , October , 2011 , Pages 18-31 ; 03029743 (ISSN) ; 9783642247118 (ISBN) Alagheband, M. R ; Aref, M. R ; Sharif University of Technology
    2011
    Abstract
    A Wireless sensor network (WSN) is composed of numerous sensor nodes with both insecurely limited hardware and restricted communication capabilities. Thus WSNs suffer from some inherent weaknesses. Key management is an interesting subject in WSNs because it is the fundamental element for all security operations. A few key management models for heterogeneous sensor networks have been proposed in recent years. In this paper, we propose a new key management scheme based on elliptic curve cryptography and signcryption method for hierarchical heterogeneous WSNs. Our scheme as a secure infrastructure has superior sensor node mobility and network scalability. Furthermore, we propose both a periodic... 

    A general methodology for direction-based irregular routing algorithms

    , Article Journal of Parallel and Distributed Computing ; Volume 70, Issue 4 , 2010 , Pages 363-370 ; 07437315 (ISSN) Moraveji, R ; Sarbazi Azad, H ; Zomaya, A. Y ; Sharif University of Technology
    Abstract
    This paper presents a general methodology for generating deadlock-free routing algorithms for irregular networks. Constructing a spanning tree on the given network, assigning directions to the network channels, creating deadlock-free zones, and specifying a logical sequence of the produced deadlock-free zones are the four fundamental steps that the proposed methodology takes to generate deadlock-free and connected routing algorithms. By applying the proposed methodology with two known labeling methods we have generated six irregular routing algorithms: three of them are novel routing algorithms and three of them (the Up/Down, Left/Right, and L-turn routing algorithms) have already been... 

    Node positioning and lifetime optimization for wireless body area networks

    , Article IEEE Sensors Journal ; Volume 17, Issue 14 , 2017 , Pages 4647-4660 ; 1530437X (ISSN) Razavi, A ; Jahed, M ; Sharif University of Technology
    Abstract
    Wireless communication networks may be categorized based on the extent of the geographical area that they cover. The latest trend in this assortment is wireless body area network (WBAN), which is standardized by IEEE 802.15.6 and is defined as a network composed of intelligent, miniaturized, low-power nodes that are implanted in, placed on, or in close proximity to the human body for certain healthcare applications. In this paper, we will start with some assessments on applicable channel models for a typical WBAN. Considering various scenarios with different carrier frequencies, bandwidths, body movements, and transceiver locations, the well-known Bayesian Information Criterion is used to... 

    Fault-tolerance improvement of planar adaptive routing based on detailed traffic analysis

    , Article 22nd International Symposium on Computer and Information Sciences, ISCIS 2007, Ankara, 7 November 2007 through 9 November 2007 ; 2007 , Pages 408-412 ; 1424413648 (ISBN); 9781424413645 (ISBN) Shamaei, A ; Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2007
    Abstract
    Currently, some coarse measures like global network latency are used to compare routing protocols. These measures do not provide enough insight of traffic distribution among network nodes in the presence of different fault regions. This paper presents a detailed traffic analysis of fault-tolerant planar adaptive routing (FTPAR) algorithm achieved by an especially developed tool. Per-node traffic analysis illustrates the traffic hotspots caused by fault regions and provides a great assistance in developing fault tolerant routing algorithms. Based on such detailed information, a simple yet effective improvement of FTPAR is suggested. Moreover, the effect of a traffic hotspot on the traffic of... 

    Scalable architecture for a contention-free optical network on-chip

    , Article Journal of Parallel and Distributed Computing ; Volume 72, Issue 11 , 2012 , Pages 1493-1506 ; 07437315 (ISSN) Koohi, S ; Hessabi, S ; Sharif University of Technology
    2012
    Abstract
    This paper proposes CoNoC (Contention-free optical NoC) as a new architecture for on-chip routing of optical packets. CoNoC is built upon all-optical switches (AOSs) which passively route optical data streams based on their wavelengths. The key idea of the proposed architecture is the utilization of per-receiver wavelength in the data network to prevent optical contention at the intermediate nodes. Routing optical packets according to their wavelength eliminates the need for resource reservation at the intermediate nodes and the corresponding latency, power, and area overheads. Since passive architecture of the AOS confines the optical contention to the end-points, we propose an electrical...