Due to high mobility of nodes in mobile ad hoc networks (MANETs), there exist frequent link breakages which lead to nfrequent path failures and route discoveries. The overhead of a route discovery cannot be neglected. In a route discovery, broadcasting is a fundamental and effective data propagation mechanism, where a mobile node blindly rebroadcasts the […]
Semi-random backoff: Towards resource reservation for channel access in 802.11e wireless LANs
This paper proposes a semi-random backoff (SRB) method that enables resource reservation in contention-based wireless LANs. The proposed SRB is fundamentally different from traditional random backoff methods because it provides an easy migration path from random backoffs to deterministic slot assignments. The central idea of the SRB is for the wireless station to set its […]
Bandwidth scheduling and path computation algorithms for connection-oriented Networks
An increasing number of high-performance networks provision dedicated channels through circuit switching or MPLS/GMPLS techniques to support large data transfer. The link bandwidths in such networks are typically shared by multiple users through advance reservation, resulting in varying bandwidth availability in future time. Developing efficient scheduling algorithms for advance bandwidth reservation has become a critical […]
Correlated flooding in low-duty-cycle wireless sensor networks
Although existing flooding protocols can provide efficient and reliable communication in wireless sensor networks on some level, further performance improvement has been hampered by the assumption of link independence, which requires costly acknowledgments (ACKs) from every receiver. Flooding is a network-layer protocol that delivers a message from one node to all the other nodes inside […]
A Symbolic Representation of Time Series, with Implications for Streaming Algorithms
Supporting decision making in domains in which the observed phenomenon dynamics have to be dealt with, can greatly benefit of retrieval of past cases, provided that proper representation and retrieval techniques are implemented. In particular, when the parameters of interest take the form of time series, dimensionality reduction and flexible retrieval have to be addresses […]
Mining Association Rules between Sets of Items in Large Databases
Frequent itemset mining is a widely exploratory technique that focuses on discovering recurrent correlations among data. The steadfast evolution of markets and business environments prompts the need of data mining algorithms to discover significant correlation changes in order to reactively suit product and service provision to customer needs. Change mining, in the context of frequent itemsets, […]
Mining Distance-Based Outliers from Categorical Data
Outlier detection can usually be considered as a pre-processing step for locating, in a data set, those objects that do not conform to well-defined notions of expected behavior. It is very important in data mining for discovering novel or rare events, anomalies, vicious actions, exceptional phenomena, etc. We are investigating outlier detection for categorical data […]
Tractable Reasoning and Efficient Query Answering in Description Logics
The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system). The method amounts to extracting from the reference DMS a piece of schema relevant to the new application needs—a module—, possibly personalizing it with extra constraints w.r.t. the application […]
Multimedia Search With Pseudo Revelance Feedback
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm , named circular reranking, that reinforces the mutual exchange of information across […]
Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise
security teams that call for security to be “everyone’s responsibility” and “built in, not bolted on” are struggling to protect their businesses in the face of consumerization, mobility, cloud, and agile business environments. This article offers tangible techniques to turn these clichés into reality while considering the cultural and trust barriers that hinder the implementation […]