17,177 research outputs found
Resource Allocation for Periodic Traffic Demands in WDM Networks
Recent research has clearly established that holding-time-aware routing and wavelength assignment (RWA) schemes lead to significant improvements in resource utilization for scheduled traffic. By exploiting the knowledge of the demand holding times, this thesis proposes new traffic grooming techniques to achieve more efficient resource utilization with the goal of minimizing resources such as bandwidth, wavelength channels, transceivers, and energy consumption. This thesis also introduces a new model, the segmented sliding window model, where a demand may be decomposed into two or more components and each component can be sent separately. This technique is suitable for applications where continuous data transmission is not strictly required such as large file transfers for grid computing. Integer linear program (ILP) formulations and an efficient heuristic are put forward for resource allocation under the proposed segmented sliding window model. It is shown that the proposed model can lead to significantly higher throughput, even over existing holding-time-aware models
Asset Management in Volatile Markets
The 27th SUERF Colloquium in Munich in June 2008: New Trends in Asset Management: Exploring the Implications was already topical in the Summer of 2008. The subsequent dramatic events in the Autumn of 2008 made the presentations in Munich even more relevant to investors and bankers that want to understand what happens in their investment universe. In the present SUERF Study, we have collected a sample of outstanding colloquium contributions under the fitting headline: Asset Management in Volatile Markets.derivatives, financial innovation, asset management, finance-growth-nexus; Relative Value Strategy, Pair Trading, Slippage, Implementation Shortfall, Asset Management, Fin4Cast
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
CHORUS Deliverable 2.2: Second report - identification of multi-disciplinary key issues for gap analysis toward EU multimedia search engines roadmap
After addressing the state-of-the-art during the first year of Chorus and establishing the existing landscape in
multimedia search engines, we have identified and analyzed gaps within European research effort during our second year.
In this period we focused on three directions, notably technological issues, user-centred issues and use-cases and socio-
economic and legal aspects. These were assessed by two central studies: firstly, a concerted vision of functional breakdown
of generic multimedia search engine, and secondly, a representative use-cases descriptions with the related discussion on
requirement for technological challenges. Both studies have been carried out in cooperation and consultation with the
community at large through EC concertation meetings (multimedia search engines cluster), several meetings with our
Think-Tank, presentations in international conferences, and surveys addressed to EU projects coordinators as well as
National initiatives coordinators. Based on the obtained feedback we identified two types of gaps, namely core
technological gaps that involve research challenges, and âenablersâ, which are not necessarily technical research
challenges, but have impact on innovation progress. New socio-economic trends are presented as well as emerging legal
challenges
Multicast protection and energy efficient traffic grooming in optical wavelength routing networks.
Zhang, Shuqiang.Thesis (M.Phil.)--Chinese University of Hong Kong, 2010.Includes bibliographical references (p. 74-80).Abstracts in English and Chinese.Abstract --- p.iæèŠ --- p.ivAcknowledgements --- p.vTable of Contents --- p.viChapter Chapter 1 --- Background --- p.1Chapter 1.1 --- Routing and Wavelength Assignment --- p.1Chapter 1.2 --- Survivability in Optical Networks --- p.3Chapter 1.3 --- Optical Multicasting --- p.4Chapter 1.3.1 --- Routing and Wavelength Assignment of Optical Multicast --- p.5Chapter 1.3.2 --- Current Research Topics about Optical Multicast --- p.8Chapter 1.4 --- Traffic Grooming --- p.10Chapter 1.4.1 --- Static Traffic Grooming --- p.11Chapter 1.4.2 --- Dynamic Traffic Grooming --- p.13Chapter 1.5 --- Contributions --- p.15Chapter 1.5.1 --- Multicast Protection with Scheduled Traffic Model --- p.15Chapter 1.5.2 --- Energy Efficient Time-Aware Traffic Grooming --- p.16Chapter 1.6 --- Organization of Thesis --- p.18Chapter Chapter 2 --- Multicast Protection in WDM Optical Network with Scheduled Traffic --- p.19Chapter 2.1 --- Introduction --- p.19Chapter 2.2 --- Multicast Protection under FSTM --- p.22Chapter 2.3 --- Illustrative Examples --- p.28Chapter 2.4 --- Two-Step Optimization under SSTM --- p.37Chapter 2.5 --- Summary --- p.40Chapter Chapter 3 --- Energy Efficient Time-Aware Traffic Grooming in Wavelength Routing Networks --- p.41Chapter 3.1 --- Introduction --- p.41Chapter 3.2 --- Energy consumption model --- p.43Chapter 3.3 --- Static Traffic Grooming with Time awareness --- p.44Chapter 3.3.1 --- Scheduled Traffic Model for Traffic Grooming --- p.44Chapter 3.3.2 --- ILP Formulation --- p.44Chapter 3.3.3 --- Illustrative Numerical Example --- p.48Chapter 3.4 --- Dynamic Traffic Grooming with Time Awareness --- p.49Chapter 3.4.1 --- Time-Aware Traffic Grooming (TATG) --- p.51Chapter 3.5 --- Simulation Results of Dynamic Traffic Grooming --- p.54Chapter 3.5.1 --- 24-node USNET: --- p.55Chapter 3.5.2 --- 15-node Pacific Bell Network: --- p.59Chapter 3.5.3 --- 14-node NSFNET: --- p.63Chapter 3.5.4 --- Alternative Configuration of Simulation Parameters: --- p.67Chapter 3.6 --- Summary --- p.71Chapter Chapter 4 --- Conclusions and Future Work --- p.72Chapter 4.1 --- Conclusions --- p.72Chapter 4.2 --- Future Work --- p.73Bibliography --- p.74Publications during M.Phil Study --- p.8
Research on optical core networks in the e-Photon/ONe network of excellence
This papers reports the advances in Optical Core networks research coordinated in the framework of the e-Photon/ONe and e-Photon/ONe+ networks of excellence
- âŠ