Loading...
Search for: technological-networks
0.009 seconds

    Cascaded failures in weighted networks

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 84, Issue 4 , 2011 ; 15393755 (ISSN) Mirzasoleiman, B ; Babaei, M ; Jalili, M ; Safari, M ; Sharif University of Technology
    2011
    Abstract
    Many technological networks can experience random and/or systematic failures in their components. More destructive situations can happen if the components have limited capacity, where the failure in one of them might lead to a cascade of failures in other components, and consequently break down the structure of the network. In this paper, the tolerance of cascaded failures was investigated in weighted networks. Three weighting strategies were considered including the betweenness centrality of the edges, the product of the degrees of the end nodes, and the product of their betweenness centralities. Then, the effect of the cascaded attack was investigated by considering the local weighted flow... 

    Proposing a hybrid protocol for secure wireless networks based on signcryption scheme

    , Article 2013 World Congress on Computer and Information Technology, WCCIT 2013 ; June , 2013 , Page(s): 1 - 6 ; 9781479904600 (ISBN) Darmian, N. R ; Oskoei, H. R. D ; Vazirnezhad, B ; Sharif University of Technology
    2013
    Abstract
    Considering the weaknesses of cryptography algorithms and the attacks performed against them, cryptography alone cannot guarantee the security of communication in a wireless network. With regard to the developments in wireless communication networks brought about by smart array antennas, security can be sought in the physical layer as well, aiming to restrict the access of the data in a wireless network and limit it to authorized users only in order to further restrain malicious data accesses. In this paper, we analysis a strategy for restricting data access using smart array antennas and present the results in security by a parameter called exposure region. For this strategy afterwards we... 

    Modeling security protocols using operational semantics

    , Article ICEIT 2010 - 2010 International Conference on Educational and Information Technology, Proceedings, 17 September 2010 through 19 September 2010, Chongqing ; Volume 3 , 2010 , Pages V3179-V3185 ; 9781424480340 (ISBN) Samadi, M ; Mahrooghi, H ; Movaghar, A ; Faraahi, A ; Sharif University of Technology
    2010
    Abstract
    In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial intruder knowledge. We validate our framework by analyzing the Needham-Schroeder-Lowe protocol  

    A network model for vehicular Ad hoc networks: an introduction to obligatory attachment rule

    , Article IEEE Transactions on Network Science and Engineering ; Volume 3, Issue 2 , 2016 , Pages 82-94 ; 23274697 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Kavousi, K ; Sharif University of Technology
    Abstract
    In the past few years, the study of complex networks has attracted the attention of researchers. Many real networks, ranging from technological networks such as the Internet to biological networks, have been considered as special types of complex networks. Through application of the network science, important structural properties of such networks have been analyzed and the mechanisms that form such characteristics have been introduced. In this paper, we address the structural characteristics of a technological network called Vehicular Ad hoc Networks (VANETs). Recent studies reveal that the communication graph of VANETs has some interesting characteristics including: the Gaussian degree... 

    LAXY: a location-based aging-resilient Xy-Yx routing algorithm for network on chip

    , Article IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ; Volume 36, Issue 10 , 2017 , Pages 1725-1738 ; 02780070 (ISSN) Rohbani, N ; Shirmohammadi, Z ; Zare, M ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Network on chip (NoC) is a scalable interconnection architecture for ever increasing communication demand between processing cores. However, in nanoscale technology size, NoC lifetime is limited due to aging processes of negative bias temperature instability, hot carrier injection, and electromigration. Usually, because of unbalanced utilization of NoC resources, some parts of the network experience more thermal stress and duty cycle in comparison with other parts, which may accelerate chip failure. To slow down the aging rate of NoC, this paper proposes an oblivious routing algorithm called location-based aging-resilient Xy-Yx (LAXY) to distribute packet flow over entire network. LAXY is... 

    Continuous-Time relationship prediction in dynamic heterogeneous information networks

    , Article ACM Transactions on Knowledge Discovery from Data ; Volume 13, Issue 4 , 2019 ; 15564681 (ISSN) Sajadmanesh, S ; Bazargani, S ; Zhang, J ; Rabiee, H. R ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    Online social networks, World Wide Web, media, and technological networks, and other types of so-called information networks are ubiquitous nowadays. These information networks are inherently heterogeneous and dynamic. They are heterogeneous as they consist of multi-Typed objects and relations, and they are dynamic as they are constantly evolving over time. One of the challenging issues in such heterogeneous and dynamic environments is to forecast those relationships in the network that will appear in the future. In this article, we try to solve the problem of continuous-Time relationship prediction in dynamic and heterogeneous information networks. This implies predicting the time it takes... 

    Capacity of network coding for wireless multicasting

    , Article IEEE Wireless and Microwave Technology Conference, WAMICON 2006, Clearwater Beach, FL, 4 December 2006 through 5 December 2006 ; 2006 ; 1424408482 (ISBN); 9781424408481 (ISBN) Eslami, A ; Khalaj, B. H ; Sharif University of Technology
    2006
    Abstract
    In this paper, we consider the network coding in networks with broadcast channels (called hypernetworks) as the first step for applying network coding to wireless networks. We first prove a Max-Flow Min-Cut theorem for such networks. While we propose an algorithm to achieve this bound, we will introduce new definitions and provide sufficient tools to extend many of the theorems stated for flows in wireline networks to the case of hypernetworks. As an example, we will extend the Max-Flow Min-Cut condition for feasibility of the point-to-point connection in wireline networks to the case of hypernetworks. Then, we will extend the algebraic approach of Koetter and Medard in [3] to the...