The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] EPL(177hit)

81-100hit(177hit)

  • Low Complexity Algorithms for Multi-Cell Joint Channel Estimation in TDD-CDMA Systems

    Peng XUE  Jae Hyun PARK  Duk Kyung KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E94-B No:8
      Page(s):
    2431-2434

    In this letter, we propose two low complexity algorithms for least square (LS) and minimum mean square error (MMSE) based multi-cell joint channel estimation (MJCE). The algorithm for LS-MJCE achieves the same complexity and mean square error (MSE) performance as the previously proposed most efficient algorithm, while the algorithm for MMSE-MJCE is superior to the conventional ones, in terms of either complexity or MSE performance.

  • A Novel Cache Replacement Policy via Dynamic Adaptive Insertion and Re-Reference Prediction

    Xi ZHANG  Chongmin LI  Zhenyu LIU  Haixia WANG  Dongsheng WANG  Takeshi IKENAGA  

     
    PAPER

      Vol:
    E94-C No:4
      Page(s):
    468-476

    Previous research illustrates that LRU replacement policy is not efficient when applications exhibit a distant re-reference interval. Recently RRIP policy is proposed to improve the performance for such kind of workloads. However, the lack of access recency information in RRIP confuses the replacement policy to make the accurate prediction. To enhance the robustness of RRIP for recency-friendly workloads, we propose an Dynamic Adaptive Insertion and Re-reference Prediction (DAI-RRP) policy which evicts data based on both re-reference prediction value and the access recency information. DAI-RRP makes adaptive adjustment on insertion position and prediction value for different access patterns, which makes the policy robust across different workloads and different phases. Simulation results show that DAI-RRP outperforms LRU and RRIP. For a single-core processor with a 1 MB 16-way set last-level cache (LLC), DAI-RRP reduces CPI over LRU and Dynamic RRIP by an average of 8.1% and 2.7% respectively. Evaluations on quad-core CMP with a 4 MB shared LLC show that DAI-RRP outperforms LRU and Dynamic RRIP (DRRIP) on the weighted speedup metric by an average of 8.1% and 15.7% respectively. Furthermore, compared to LRU, DAI-RRP consumes the similar hardware for 16-way cache, or even less hardware for high-associativity cache. In summary, the proposed policy is practical and can be easily integrated into existing hardware approximations of LRU.

  • Efficient Content Replication Strategy for Data Sharing Considering Storage Capacity Restriction in Hybrid Peer-to-Peer Networks

    Yusuke INOUE  Shinji SUGAWARA  Yutaka ISHIBASHI  

     
    PAPER-Network

      Vol:
    E94-B No:2
      Page(s):
    455-465

    Various kinds of content replication strategies in pure P2P networks have recently been examined. However, such strategies have not been thoroughly considered in hybrid P2P networks. In a hybrid P2P network, the target content can easily be found because there is a server that controls each peer and its content. Therefore, it is important to decrease futile storage resource consumption, since the data search cost through the network is relatively small. This paper proposes an effective content replication strategy that takes into account storage capacity restrictions. In brief, this method restricts the number of contents replicas possessed by a peer using threshold-based control by relocating or deleting excess replicas. Furthermore, the effectiveness of the proposal is evaluated using computer simulations.

  • HDAR: Highly Distributed Adaptive Service Replication for MANETs

    Asaad AHMED  Keiichi YASUMOTO  Minoru ITO  Naoki SHIBATA  Tomoya KITANI  

     
    PAPER-Information Network

      Vol:
    E94-D No:1
      Page(s):
    91-103

    Mobile Ad Hoc Networks (MANETs) offer quick and easy network deployment in situations where it is not possible otherwise and they can be used to provide mobile users with a temporary infrastructure to use services in the absence of fixed infrastructure. Nodes in MANETs are free to move and organize themselves in an arbitrary fashion. The challenging task in such dynamic environments is how to improve the service availability. Replicating a service at some nodes distributed across the network is an effective strategy. However, service replication can considerably impact the system energy consumption. Since mobile devices have limited battery resources, a dynamic and efficient service replication is necessary to support such environments. In this paper, we propose a distributed service replication scheme for achieving high service availability with reasonable energy consumption for MANETs. The proposed method called HDAR (Highly Distributed Adaptive Service Replication) divides the whole network into disjoint zones of at most 2-hops in diameter and builds a dynamic replication mechanism which selects new replica zones depending on their service demand and the tradeoff between the communication and replication energy consumption costs. Through simulations, we confirmed that our approach can achieve higher service availability with reasonable energy consumption than existing methods.

  • Relative MTTF-Based Incentive Scheme for Availability-Based Replication in P2P Systems

    Kyungbaek KIM  

     
    LETTER-Dependable Computing

      Vol:
    E93-D No:12
      Page(s):
    3403-3406

    When P2P systems are used for data sensitive systems, the data availability has become an important issue. The availability-based replication using individual node availability is the most popular method keeping high data availability efficiently. However, since the individual node availability is derived by the individual lifetime information of each node, the availability-based replication may select useless replicas. In this paper, we explore the relative MTTF (Mean Time To Failure)-based incentive scheme for the more efficient availability-based replication. The relative MTTF is used to classify the guaranteed replicas which can get the incentive node availability, and these replicas help reduce the data traffic and the number of replicas without losing the target data availability. Results from trace-driven simulations show that the replication using our relative MTTF-based incentive scheme achieves the same target data availability with 41% less data traffic and 24% less replicas.

  • Maximizing Lifetime Sensing Coverage in Heterogeneous Sensors Deployments

    Jae-Joon LEE  Bhaskar KRISHNAMACHARI  C.-C. Jay KUO  

     
    PAPER

      Vol:
    E93-B No:11
      Page(s):
    2859-2867

    In practical settings of wireless sensor networks, it is often feasible to consider heterogeneous deployments of devices with different capabilities. Under prescribed cost constraints, we analyze such heterogenous deployments and present how they impact the coverage of a sensor network including spatial correlation effect. We derive expressions for the heterogeneous mixture of devices that maximizes the lifetime coverage in both single-hop direct and multi-hop communication models. Our results show that using an optimal mixture of many inexpensive low-capability devices and some expensive high-capability devices can significantly extend the duration of a network's sensing performance, especially in a network with low spatial correlation.

  • P2P-Based Approach to Finding Replica Server Locations for Alleviating Flash Crowds

    Masato ASAHARA  Kenji KONO  Toshinori KOJIMA  Ai HAYAKAWA  

     
    PAPER-Software System

      Vol:
    E93-D No:11
      Page(s):
    3027-3037

    Many services rely on the Internet to provide their customers with immediate access to information. To provide a stable service to a large number of customers, a service provider needs to monitor demand fluctuations and adjust the number and the location of replica servers around the world. Unfortunately, Flash crowds make it quite difficult to determine good number and locations of replica servers because they must be repositioned very quickly to respond to rapidly changing demands. We are developing ExaPeer, an infrastructure for dynamically repositioning replica servers on the Internet on the basis of demand fluctuations. In this paper we introduce ExaPeer Server Reposition (EPSR), a mechanism that quickly finds appropriate number and locations of replica servers. EPSR is designed to be lightweight and responsive to Flash crowds. EPSR enables us to position replica servers so that no server becomes overloaded. Even though no dedicated server collects global information such as the distribution of clients or the load of all servers over the Internet, the peer-to-peer approach enables EPSR to find number and locations of replica servers quickly enough to respond to flash crowds. Simulation results demonstrate that EPSR locates high-demand areas, estimates their scale correctly and determines appropriate number and locations of replica servers even if the demand for a service increases/decreases rapidly.

  • Fast Self-Expansion of Sensing Coverage in Autonomous Mobile Sensor Networks

    Youn-Hee HAN  Heon-Jong LEE  Sung-Gi MIN  

     
    LETTER-Network

      Vol:
    E93-B No:11
      Page(s):
    3148-3151

    Random scattering of sensors may cause some location not to be covered. In such a case, it is useful to make use of mobile sensors that can move to eliminate the coverage holes. Wang et al [1]. proposed self-deployment schemes of mobile sensors by using Voronoi polygon. However, some coverage holes still remain after the execution of the schemes. We propose a new self-deployment scheme using the centroid (geometric center) of each sensor's Voronoi polygon as the moving target position. The performance evaluation shows that the proposed scheme achieves better results than the existing schemes in terms of fast coverage expansion.

  • Expanding Ring-Based Data Query with Delay Constraints for Dense Wireless Ad Hoc Networks

    Yuebin BAI  Jun HUANG  

     
    PAPER-Network

      Vol:
    E93-B No:11
      Page(s):
    3023-3034

    Data query is one of the most important issues in wireless ad hoc networks, since the ultimate goal of these networks is to support efficient data sharing among wireless nodes. In this paper, we study the issue of data query for delay-sensitive applications in dense wireless ad hoc networks. We focus our attention on step-by-step expanding ring-based data query, which provides an upper bound on query delay to any expanding ring based query strategies. Two replication strategies including Index Replication (IR) and Data Replication (DR) are considered, to improve the delay performance of data query. We analyze the probabilistic behavior of query delay for both DR and IR by theoretical methods, and develop analytical models to approximate the minimum number of replicas required for both query strategies if an application-specified delay bound is imposed. Our work is validated through extensive simulations.

  • Effective Management of Secondary User's Density in Cognitive Radio Networks

    Chunxiao JIANG  Shuai FAN  Canfeng CHEN  Jian MA  Yong REN  

     
    LETTER-Network Management/Operation

      Vol:
    E93-B No:9
      Page(s):
    2443-2447

    Cognitive radio has emerged as an efficient approach to reusing the licensed spectrums. How to appropriately set parameters of secondary user (SU) plays a rather important role in constructing cognitive radio networks. In this letter, we have analyzed the theoretical value of SUs' density, which provides a standard for controlling the number of SUs around one primary receiver, in order to guarantee that primary communication links do not experience excessive interference. The simulation result of secondary density well matches with the theoretical result derived from our analysis. Additionally, the achievable rate of secondary user under density control is also analyzed and simulated.

  • Computationally Efficient Multi-Cell Joint Channel Estimation in TDD-CDMA Systems

    Peng XUE  Duk Kyung KIM  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:9
      Page(s):
    2465-2468

    In this letter, a low complexity multi-cell joint channel estimation (MJCE) scheme is proposed. With proper arrangement of the multi-cell midamble matrix and channel impulse response (CIR) vector, the MJCE operation is formulated to solve a block-Toeplitz linear system. The block-Levinson algorithm is adopted to solve this problem instead of the Cholesky algorithm. Our results show that the proposed MJCE scheme can be a practical choice with significantly lower complexity, compared with the previous schemes with the Cholesky algorithm.

  • CropNET: A Wireless Multimedia Sensor Network for Agricultural Monitoring

    Shouyi YIN  Zhongfu SUN  Leibo LIU  Shaojun WEI  

     
    LETTER

      Vol:
    E93-B No:8
      Page(s):
    2073-2076

    Motivated by the needs of modern agriculture, in this paper we present CropNET, a wireless multimedia sensor network system for agriculture monitoring. Both hardware and software designs of CropNET are tailored for sensing in wide farmland without human supervision. We have carried out multiple rounds of deployments. The evaluation results show that CropNET performs well and facilitates modern agriculture.

  • Achieving Global Optimal Replication in Distributed Networks

    Yao YU  Yu ZHOU  Kanglian ZHAO  Sidan DU  

     
    LETTER-Network

      Vol:
    E93-B No:7
      Page(s):
    1923-1926

    This letter presents the globally optimal data replication in the distributed networks. We propose a distributed approach based on the metropolis-hastings algorithm to achieve the globally optimal data replication without requiring any global information. Experimental results show that the proposed approach works well and the error can be held below 0.6% easily.

  • Verification of Spark-Resistance Formulae for Micro-Gap ESD

    Yoshinori TAKA  Osamu FUJIWARA  

     
    PAPER-ESD and Transients

      Vol:
    E93-B No:7
      Page(s):
    1801-1806

    Micro-gap electrostatic discharge (ESD) events due to a human with charge voltages below 1000 V cause serious malfunctions in high-tech information devices. For clarifying such a mechanism, it is indispensable to grasp the spark process of such micro-gap ESDs. For this purpose, two types of spark-resistance laws proposed by Rompe-Weizel and Toepler have often been used, which were derived from the hypotheses that spark conductivity be proportional to the internal energies and charges injected into a spark channel, respectively. However, their validity has not well been verified. To examine which spark-resistance formula could be applied for micro-gap ESDs, with a 12-GHz digital oscilloscope, we previously measured the discharge currents through the hand-held metal piece from a charged human with respect to charged voltages of 200 V and 2000 V, and thereby derived the conductance of a spark gap to reveal that both of their hypotheses are roughly valid in the initial stage of sparks. In this study, to further verify the above spark hypotheses, we derived the discharge voltages in closed forms across a spark gap based on the above spark-resistance formulae, and investigated which spark-resistance formula could be applied for micro-gap ESDs in comparison of spark gaps estimated from the measured discharge currents. As a result, we found that Rompe-Weizel's formula could well explain spark properties for micro-gap ESDs than Toepler's one regardless of charge voltages and approach speeds.

  • An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

    SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E93-A No:6
      Page(s):
    1086-1101

    Secure channels can be realized by an authenticated key exchange (AKE) protocol that generates authenticated session keys between the involving parties. In, Shin et al., proposed a new kind of AKE (RSA-AKE) protocol whose goal is to provide high efficiency and security against leakage of stored secrets as much as possible. Let us consider more powerful attacks where an adversary completely controls the communications and the stored secrets (the latter is denoted by "replacement" attacks). In this paper, we first show that the RSA-AKE protocol is no longer secure against such an adversary. The main contributions of this paper are as follows: (1) we propose an RSA-based leakage-resilient AKE (RSA-AKE2) protocol that is secure against active attacks as well as replacement attacks; (2) we prove that the RSA-AKE2 protocol is secure against replacement attacks based on the number theory results; (3) we show that it is provably secure in the random oracle model, by showing the reduction to the RSA one-wayness, under an extended model that covers active attacks and replacement attacks; (4) in terms of efficiency, the RSA-AKE2 protocol is comparable to in the sense that the client needs to compute only one modular multiplication with pre-computation; and (5) we also discuss about extensions of the RSA-AKE2 protocol for several security properties (i.e., synchronization of stored secrets, privacy of client and solution to server compromise-impersonation attacks).

  • Access Load Balancing with Analogy to Thermal Diffusion for Dynamic P2P File-Sharing Environments

    Masanori TAKAOKA  Masato UCHIDA  Kei OHNISHI  Yuji OIE  

     
    PAPER

      Vol:
    E93-B No:5
      Page(s):
    1140-1150

    In this paper, we propose a file replication method to achieve load balancing in terms of write access to storage device ("write storage access load balancing" for short) in unstructured peer-to-peer (P2P) file-sharing networks in which the popularity trend of queried files varies dynamically. The proposed method uses a write storage access ratio as a load balance index value in order to stabilize dynamic P2P file-sharing environments adaptively. In the proposed method, each peer autonomously controls the file replication ratio, which is defined as a probability to create the replica of the file in order to uniform write storage access loads in the similar way to thermal diffusion phenomena. Theoretical analysis results show that the behavior of the proposed method actually has an analogy to a thermal diffusion equation. In addition, simulation results reveal that the proposed method has an ability to realize write storage access load balancing in the dynamic P2P file-sharing environments.

  • VAMSD: Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage

    Jaeyoung HONG  Hanjin LEE  Suho YANG  Hyunsoo YOON  

     
    LETTER-Network

      Vol:
    E93-B No:3
      Page(s):
    732-735

    This letter proposes a novel mobile sensor deployment scheme for maximizing coverage. The basic idea is to force mobile sensors to move to predetermined target points that are the optimal layout in a distributed manner using Voronoi diagram data structure. A simulation shows that the result of the proposed scheme is quite close to the optimal result and outperforms previous works.

  • Replacement and Preventive Maintenance Models with Random Working Times

    Mingchih CHEN  Syouji NAKAMURA  Toshio NAKAGAWA  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E93-A No:2
      Page(s):
    500-507

    This paper considers replacement and maintenance policies for an operating unit which works at random times for jobs. The unit undergoes minimal repairs at failures and is replaced at a planned time T or at a number N of working times, whichever occurs first. The expected cost rate is obtained, and an optimal policy which minimizes it is derived analytically. The imperfect preventive maintenance (PM) model, where the unit is improved by PM after the completion of each working time, is analyzed. Furthermore, when the work of a job incurs some damage to the unit, the replacement model with number N is proposed. The expected cost rate is obtained by using theory of cumulative processes. Two modified models, where the unit is replaced at number N or at the first completion of the working time over time T, and it is replaced at T or number N, whichever occurs last, are also proposed. Finally, when the unit is replaced at time T, number N or Kth failure, whichever occurs first, the expected cost rate is also obtained.

  • Resource Minimization Method Satisfying Delay Constraint for Replicating Large Contents

    Sho SHIMIZU  Hiroyuki ISHIKAWA  Yutaka ARAKAWA  Naoaki YAMANAKA  Kosuke SHIBA  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E92-B No:10
      Page(s):
    3102-3110

    How to minimize the number of mirroring resources under a QoS constraint (resource minimization problem) is an important issue in content delivery networks. This paper proposes a novel approach that takes advantage of the parallelism of dynamically reconfigurable processors (DRPs) to solve the resource minimization problem, which is NP-hard. Our proposal obtains the optimal solution by running an exhaustive search algorithm suitable for DRP. Greedy algorithms, which have been widely studied for tackling the resource minimization problem, cannot always obtain the optimal solution. The proposed method is implemented on an actual DRP and in experiments reduces the execution time by a factor of 40 compared to the conventional exhaustive search algorithm on a Pentium 4 (2.8 GHz).

  • Partially Eager Update Propagation and Freshness-Based Read Relaxation for Replicated Internet Services

    Ho-Joong KIM  Seungryoul MAENG  

     
    PAPER-Parallel and Distributed Architecture

      Vol:
    E92-D No:10
      Page(s):
    1986-1998

    We propose an Edge-write architecture which performs eager update propagation for update requests for the corresponding secondary server, whereas it lazily propagates updates from other secondary servers. Our architecture resolves consistency problems caused by read/update decoupling in the conventional lazy update propagation-based system. It also improves overall scalability by alleviating the performance bottleneck at the primary server in compensation for increased but bounded response time. Such relaxed consistency management enables a read request to choose whether to read the replicated data immediately or to refresh it. We use the age of a local data copy as the freshness factor so that a secondary server can make a decision for freshness control independently. As a result, our freshness-controlled edge-write architecture benefits by adjusting a tradeoff between the response time and the correctness of data.

81-100hit(177hit)