Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Adaptive multicast (1)
- Algorithms (1)
- Byzantine fault tolerance (1)
- Carrier sense multiple access (CSMA) (1)
- Computer networks (1)
-
- Distributed algorithm (1)
- Distributed coordination function (DCF) (1)
- Electronic data processing (1)
- Fault-tolerant computing (1)
- Internet (1)
- Mobile ad hoc network (1)
- Mobile ad hoc networks (MANETs) (1)
- Multicast (1)
- Propagation model (1)
- Reliable messaging (1)
- Replication (1)
- SOAP (1)
- Spatial reuse (1)
- Tradeoffs (1)
- Web services (1)
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Adaptive Multicast On Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density Of Redundant Paths, Sangman Moh, Sang Jun Lee, Chansu Yu
Adaptive Multicast On Mobile Ad Hoc Networks Using Tree-Based Meshes With Variable Density Of Redundant Paths, Sangman Moh, Sang Jun Lee, Chansu Yu
Electrical and Computer Engineering Faculty Publications
Multicasting has been extensively studied for mobile ad hoc networks (MANETs) because it is fundamental to many ad hoc network applications requiring close collaboration of multiple nodes in a group. A general approach is to construct an overlay structure such as multicast tree or mesh and to deliver a multicast packet to multiple receivers over the overlay structure. However, it either incurs a lot of overhead (multicast mesh) or performs poorly in terms of delivery ratio (multicast tree). This paper proposes an adaptive multicast scheme, called tree-based mesh with k-hop redundant paths (TBM k ), …
Scene-Based Nonuniformity Correction With Reduced Ghosting Using A Gated Lms Algorithm, Russell C. Hardie, Frank Orion Baxley, Brandon J. Brys, Patrick C. Hytla
Scene-Based Nonuniformity Correction With Reduced Ghosting Using A Gated Lms Algorithm, Russell C. Hardie, Frank Orion Baxley, Brandon J. Brys, Patrick C. Hytla
Electrical and Computer Engineering Faculty Publications
In this paper, we present a scene-based nouniformity correction (NUC) method using a modified adaptive least mean square (LMS) algorithm with a novel gating operation on the updates. The gating is designed to significantly reduce ghosting artifacts produced by many scene-based NUC algorithms by halting updates when temporal variation is lacking. We define the algorithm and present a number of experimental results to demonstrate the efficacy of the proposed method in comparison to several previously published methods including other LMS and constant statistics based methods. The experimental results include simulated imagery and a real infrared image sequence. We show that …
Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi
Design Of Acousto-Optic Chaos Based Secure Free-Space Optical Communication Links, Anjan K. Ghosh, Pramode K. Verma, Samuel Cheng, Robert C. Huck, Monish Ranjan Chatterjee, Mohammed A. Al-Saedi
Electrical and Computer Engineering Faculty Publications
We discuss the design of an acousto-optic cell based free space optical communication link where the data beam is made secure through chaos encryption. Using external signal modulation of the diffracted light from a hybrid acousto-optic cell chaos (or directly via incorporation in the sound-cell driver's bias voltage) encryption of data is possible. We have shown numerically that decryption of the encoded data is possible by using an identical acousto-optic system in the receiver.
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Design And Implementation Of A Byzantine Fault Tolerance Framework For Web Services, Wenbing Zhao
Electrical and Computer Engineering Faculty Publications
Many Web services are expected to run with high degree of security and dependability. To achieve this goal, it is essential to use a Web services compatible framework that tolerates not only crash faults, but Byzantine faults as well, due to the untrusted communication environment in which the Web services operate. In this paper, we describe the design and implementation of such a framework, called BFT-WS. BFT-WS is designed to operate on top of the standard SOAP messaging framework for maximum interoperability. It is implemented as a pluggable module within the Axis2 architecture, as such, it requires minimum changes …
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Proactive Service Migration For Long-Running Byzantine Fault-Tolerant Systems, Wenbing Zhao, H. Zhang
Electrical and Computer Engineering Faculty Publications
A proactive recovery scheme based on service migration for long-running Byzantine fault-tolerant systems is described. Proactive recovery is an essential method for ensuring the long-term reliability of fault-tolerant systems that are under continuous threats from malicious adversaries. The primary benefit of our proactive recovery scheme is a reduced vulnerability window under normal operation. This is achieved in two ways. First, the time-consuming reboot step is removed from the critical path of proactive recovery. Second, the response time and the service migration latency are continuously profiled and an optimal service migration interval is dynamically determined during runtime based on the observed …
Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu
Minimizing Spatial And Time Reservation With Collision-Aware Dcf In Mobile Ad Hoc Networks, Lubo Song, Chansu Yu
Electrical and Computer Engineering Faculty Publications
Carrier sensing is widely adopted in wireless communication to protect data transfers from collisions. For example, distributed coordination function (DCF) in IEEE 802.11 standard renders a node to defer its communication if it senses the medium busy. For the duration of deferment, each frame carries, in its MAC header, a 16-bit number in microseconds during which any overhearing node must defer. However, even if the carrier signal is detected, both ongoing and a new communication can be simultaneously successful depending on their relative positions in the network or equivalently, their mutual interference level. Supporting multiple concurrent communications is …