scispace - formally typeset
Search or ask a question

Showing papers on "Node (networking) published in 2013"


Journal ArticleDOI
01 Jan 2013
TL;DR: This work develops a broadcast-based algorithm, termed the subgradient-push, which steers every node to an optimal value under a standard assumption of subgradient boundedness, which converges at a rate of O (ln t/√t), where the constant depends on the initial values at the nodes, the sub gradient norms, and, more interestingly, on both the consensus speed and the imbalances of influence among the nodes.
Abstract: We consider distributed optimization by a collection of nodes, each having access to its own convex function, whose collective goal is to minimize the sum of the functions. The communications between nodes are described by a time-varying sequence of directed graphs, which is uniformly strongly connected. For such communications, assuming that every node knows its out-degree, we develop a broadcast-based algorithm, termed the subgradient-push, which steers every node to an optimal value under a standard assumption of subgradient boundedness. The subgradient-push requires no knowledge of either the number of agents or the graph sequence to implement. Our analysis shows that the subgradient-push algorithm converges at a rate of O (ln t/√t), where the constant depends on the initial values at the nodes, the subgradient norms, and, more interestingly, on both the consensus speed and the imbalances of influence among the nodes.

956 citations


Journal ArticleDOI
TL;DR: It is shown that, due to its ability to decrease the rate of transmission collisions, the VeMAC protocol can provide significantly higher throughput on the control channel than ADHOC MAC, an existing TDMA MAC protocol for VANETs.
Abstract: The need of a medium access control (MAC) protocol for an efficient broadcast service is of great importance to support the high-priority safety applications in vehicular ad hoc networks (VANETs). This paper introduces VeMAC, a novel multichannel TDMA MAC protocol proposed specifically for a VANET scenario. The VeMAC supports efficient one-hop and multihop broadcast services on the control channel by using implicit acknowledgments and eliminating the hidden terminal problem. The protocol reduces transmission collisions due to node mobility on the control channel by assigning disjoint sets of time slots to vehicles moving in opposite directions and to road side units. Analysis and simulation results in highway and city scenarios are presented to evaluate the performance of VeMAC and compare it with ADHOC MAC, an existing TDMA MAC protocol for VANETs. It is shown that, due to its ability to decrease the rate of transmission collisions, the VeMAC protocol can provide significantly higher throughput on the control channel than ADHOC MAC.

466 citations


Journal ArticleDOI
TL;DR: D-ADMM is proven to converge when the network is bipartite or when all the functions are strongly convex, although in practice, convergence is observed even when these conditions are not met.
Abstract: We propose a distributed algorithm, named Distributed Alternating Direction Method of Multipliers (D-ADMM), for solving separable optimization problems in networks of interconnected nodes or agents. In a separable optimization problem there is a private cost function and a private constraint set at each node. The goal is to minimize the sum of all the cost functions, constraining the solution to be in the intersection of all the constraint sets. D-ADMM is proven to converge when the network is bipartite or when all the functions are strongly convex, although in practice, convergence is observed even when these conditions are not met. We use D-ADMM to solve the following problems from signal processing and control: average consensus, compressed sensing, and support vector machines. Our simulations show that D-ADMM requires less communications than state-of-the-art algorithms to achieve a given accuracy level. Algorithms with low communication requirements are important, for example, in sensor networks, where sensors are typically battery-operated and communicating is the most energy consuming operation.

398 citations


Journal ArticleDOI
TL;DR: Two resilience-based component importance measures are provided, and an algorithm to perform stochastic ordering of network components due to the uncertain nature of network disruptions, are illustrated with a 20 node, 30 link network example.

309 citations


Posted Content
TL;DR: This work develops a broadcast-based algorithm, termed the subgradient-push, which steers every node to an optimal value under a standard assumption of subgradient boundedness, which converges at a rate of O (ln t/√t), where the constant depends on the initial values at the nodes, the sub gradient norms, and, more interestingly, on both the consensus speed and the imbalances of influence among the nodes.
Abstract: We consider distributed optimization by a collection of nodes, each having access to its own convex function, whose collective goal is to minimize the sum of the functions. The communications between nodes are described by a time-varying sequence of directed graphs, which is uniformly strongly connected. For such communications, assuming that every node knows its out-degree, we develop a broadcast-based algorithm, termed the subgradient-push, which steers every node to an optimal value under a standard assumption of subgradient boundedness. The subgradient-push requires no knowledge of either the number of agents or the graph sequence to implement. Our analysis shows that the subgradient-push algorithm converges at a rate of $O(\ln(t)/\sqrt{t})$, where the constant depends on the initial values at the nodes, the subgradient norms, and, more interestingly, on both the consensus speed and the imbalances of influence among the nodes.

293 citations


Journal ArticleDOI
TL;DR: The concept of energy cooperation is introduced, where a user wirelessly transmits a portion of its energy to another energy harvesting user, which enables shaping and optimization of the energy arrivals at the energy-receiving node, and improves the overall system performance, despite the loss incurred in energy transfer.
Abstract: In energy harvesting communications, users transmit messages using energy harvested from nature during the course of communication. With an optimum transmit policy, the performance of the system depends only on the energy arrival profiles. In this paper, we introduce the concept of energy cooperation, where a user wirelessly transmits a portion of its energy to another energy harvesting user. This enables shaping and optimization of the energy arrivals at the energy-receiving node, and improves the overall system performance, despite the loss incurred in energy transfer. We consider several basic multi-user network structures with energy harvesting and wireless energy transfer capabilities: relay channel, two-way channel and multiple access channel. We determine energy management policies that maximize the system throughput within a given duration using a Lagrangian formulation and the resulting KKT optimality conditions. We develop a two-dimensional directional water-filling algorithm which optimally controls the flow of harvested energy in two dimensions: in time (from past to future) and among users (from energy-transferring to energy-receiving) and show that a generalized version of this algorithm achieves the boundary of the capacity region of the two-way channel.

288 citations


Journal ArticleDOI
TL;DR: A temporal-credential-based mutual authentication scheme among the user, GWN and the sensor node and a lightweight key agreement scheme is proposed to embed into the protocol that is realistic and well adapted for resource-constrained wireless sensor networks.

287 citations


Proceedings ArticleDOI
29 Oct 2013
TL;DR: This work describes a new approach to virtual machine (VM) construction that amortizes much of the effort in initial construction by allowing new languages to be implemented with modest additional effort, and suggests that high performance is attainable while preserving a modular and layered architecture.
Abstract: Building high-performance virtual machines is a complex and expensive undertaking; many popular languages still have low-performance implementations. We describe a new approach to virtual machine (VM) construction that amortizes much of the effort in initial construction by allowing new languages to be implemented with modest additional effort. The approach relies on abstract syntax tree (AST) interpretation where a node can rewrite itself to a more specialized or more general node, together with an optimizing compiler that exploits the structure of the interpreter. The compiler uses speculative assumptions and deoptimization in order to produce efficient machine code. Our initial experience suggests that high performance is attainable while preserving a modular and layered architecture, and that new high-performance language implementations can be obtained by writing little more than a stylized interpreter.

281 citations


Journal ArticleDOI
31 Oct 2013-PLOS ONE
TL;DR: Experimental results on two directed networks, a social network extracted from delicious.com and a large-scale short-message communication network, demonstrate that the ClusterRank outperforms some benchmark algorithms such as PageRank and LeaderRank.
Abstract: Identifying influential nodes in very large-scale directed networks is a big challenge relevant to disparate applications, such as accelerating information propagation, controlling rumors and diseases, designing search engines, and understanding hierarchical organization of social and biological networks. Known methods range from node centralities, such as degree, closeness and betweenness, to diffusion-based processes, like PageRank and LeaderRank. Some of these methods already take into account the influences of a node’s neighbors but do not directly make use of the interactions among it’s neighbors. Local clustering is known to have negative impacts on the information spreading. We further show empirically that it also plays a negative role in generating local connections. Inspired by these facts, we propose a local ranking algorithm named ClusterRank, which takes into account not only the number of neighbors and the neighbors’ influences, but also the clustering coefficient. Subject to the susceptible-infected-recovered (SIR) spreading model with constant infectivity, experimental results on two directed networks, a social network extracted from delicious.com and a large-scale short-message communication network, demonstrate that the ClusterRank outperforms some benchmark algorithms such as PageRank and LeaderRank. Furthermore, ClusterRank can also be applied to undirected networks where the superiority of ClusterRank is significant compared with degree centrality and k-core decomposition. In addition, ClusterRank, only making use of local information, is much more efficient than global methods: It takes only 191 seconds for a network with about nodes, more than 15 times faster than PageRank.

279 citations


Journal ArticleDOI
TL;DR: A modeling framework for growing multiplexes where a node can belong to different networks and a number of relevant ingredients for modeling their evolution such as the coupling between the different layers and the distribution of node arrival times are identified.
Abstract: We propose a modeling framework for growing multiplexes where a node can belong to different networks. We define new measures for multiplexes and we identify a number of relevant ingredients for modeling their evolution such as the coupling between the different layers and the distribution of node arrival times. The topology of the multiplex changes significantly in the different cases under consideration, with effects of the arrival time of nodes on the degree distribution, average shortest path length, and interdependence.

275 citations


Posted Content
TL;DR: The smallest eigenvalue of the controllability Gramian is adopted as metric for the controLLability degree of a network, as it identifies the energy needed to accomplish the control task.
Abstract: This paper studies the problem of controlling complex networks, that is, the joint problem of selecting a set of control nodes and of designing a control input to steer a network to a target state. For this problem (i) we propose a metric to quantify the difficulty of the control problem as a function of the required control energy, (ii) we derive bounds based on the system dynamics (network topology and weights) to characterize the tradeoff between the control energy and the number of control nodes, and (iii) we propose an open-loop control strategy with performance guarantees. In our strategy we select control nodes by relying on network partitioning, and we design the control input by leveraging optimal and distributed control techniques. Our findings show several control limitations and properties. For instance, for Schur stable and symmetric networks: (i) if the number of control nodes is constant, then the control energy increases exponentially with the number of network nodes, (ii) if the number of control nodes is a fixed fraction of the network nodes, then certain networks can be controlled with constant energy independently of the network dimension, and (iii) clustered networks may be easier to control because, for sufficiently many control nodes, the control energy depends only on the controllability properties of the clusters and on their coupling strength. We validate our results with examples from power networks, social networks, and epidemics spreading.

Journal ArticleDOI
05 Sep 2013-Nature
TL;DR: It is shown that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network.
Abstract: The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology.

Book ChapterDOI
TL;DR: This chapter proposes a novel hierarchical classification system based on the K-Nearest Neighbors (K-NN) model and its application to non-melanoma skin lesion classification that reaches an overall classification accuracy of 74 % over five common classes of skin lesions, including two non-Melanoma cancer types.
Abstract: This chapter proposes a novel hierarchical classification system based on the K-Nearest Neighbors (K-NN) model and its application to non-melanoma skin lesion classification. Color and texture features are extracted from skin lesion images. The hierarchical structure decomposes the classification task into a set of simpler problems, one at each node of the classification. Feature selection is embedded in the hierarchical framework that chooses the most relevant feature subsets at each node of the hierarchy. The accuracy of the proposed hierarchical scheme is higher than 93 % in discriminating cancer and potential at risk lesions from benign lesions, and it reaches an overall classification accuracy of 74 % over five common classes of skin lesions, including two non-melanoma cancer types. This is the most extensive known result on non-melanoma skin cancer classification using color and texture information from images acquired by a standard camera (non-dermoscopy).

Journal ArticleDOI
TL;DR: A novel decentralized adaptive pinning-control scheme for cluster synchronization of undirected networks using a local adaptive strategy on both coupling strengths and feedback gains is proposed.
Abstract: In this brief, we investigate pinning control for cluster synchronization of undirected complex dynamical networks using a decentralized adaptive strategy. Unlike most existing pinning-control algorithms with or without an adaptive strategy, which require global information of the underlying network such as the eigenvalues of the coupling matrix of the whole network or a centralized adaptive control scheme, we propose a novel decentralized adaptive pinning-control scheme for cluster synchronization of undirected networks using a local adaptive strategy on both coupling strengths and feedback gains. By introducing this local adaptive strategy on each node, we show that the network can synchronize using weak coupling strengths and small feedback gains. Finally, we present some simulations to verify and illustrate the theoretical results.

Journal ArticleDOI
TL;DR: It is found through numerical results that the proposed two-way protocol with power control at the BS and CU is effective to improve the sum rate for both the D2D and cellular users and relay selection can achieve further improvement in thesum rate of the cellular links.
Abstract: Device-to-device (D2D) communications has been proposed in the literature as an underlay approach to cellular networks to allow direct transmission between two cellular devices with local communication needs. In this paper, we consider a scenario of D2D communications overlaying a cellular network and propose a new spectrum sharing protocol, which allows the D2D users to communicate bi-directionally with each other while assisting the two-way communications between the cellular base station (BS) and the cellular user (CU). We derive the achievable rate region of the sum rate of the D2D transmissions versus that of the cellular transmissions. The Pareto boundary of the region is found by optimizing the transmit power at BS and CU as well as the power splitting factor at the relay D2D node. Since either of the two D2D users can be the relay and there can exist multiple pairs of D2D users, we also consider the relay selection from the potential D2D users. We find through numerical results that the proposed two-way protocol with power control at the BS and CU is effective to improve the sum rate for both the D2D and cellular users. In addition, relay selection can achieve further improvement in the sum rate of the cellular links.

Journal ArticleDOI
TL;DR: Information-weighted consensus algorithms for distributed maximum a posteriori parameter estimation, and their extension to the information- Weighted consensus filter (ICF) for state estimation are proposed.
Abstract: Due to their high fault-tolerance and scalability to large networks, consensus-based distributed algorithms have recently gained immense popularity in the sensor networks community. Large-scale camera networks are a special case. In a consensus-based state estimation framework, multiple neighboring nodes iteratively communicate with each other, exchanging their own local information about each target's state with the goal of converging to a single state estimate over the entire network. However, the state estimation problem becomes challenging when some nodes have limited observability of the state. In addition, the consensus estimate is suboptimal when the cross-covariances between the individual state estimates across different nodes are not incorporated in the distributed estimation framework. The cross-covariance is usually neglected because the computational and bandwidth requirements for its computation become unscalable for a large network. These limitations can be overcome by noting that, as the state estimates at different nodes converge, the information at each node becomes correlated. This fact can be utilized to compute the optimal estimate by proper weighting of the prior state and measurement information. Motivated by this idea, we propose information-weighted consensus algorithms for distributed maximum a posteriori parameter estimation, and their extension to the information-weighted consensus filter (ICF) for state estimation. We compare the performance of the ICF with existing consensus algorithms analytically, as well as experimentally by considering the scenario of a distributed camera network under various operating conditions.

Journal ArticleDOI
TL;DR: This work studies the problem of en route caching and investigates if caching in only a subset of nodes along the delivery path can achieve better performance in terms of cache and server hit rates and proposes a centrality-based caching algorithm that can consistently achieve better gain across both synthetic and real network topologies that have different structural properties.

Journal ArticleDOI
21 Jun 2013-PLOS ONE
TL;DR: This work introduces a novel method, based on persistent homology, to detect particular non-local structures, akin to weighted holes within the link-weight network fabric, which are invisible to existing methods and creates the first bridge between network theory and algebraic topology, which will allow to import the toolset of algebraic methods to complex systems.
Abstract: The statistical mechanical approach to complex networks is the dominant paradigm in describing natural and societal complex systems. The study of network properties, and their implications on dynamical processes, mostly focus on locally defined quantities of nodes and edges, such as node degrees, edge weights and –more recently– correlations between neighboring nodes. However, statistical methods quickly become cumbersome when dealing with many-body properties and do not capture the precise mesoscopic structure of complex networks. Here we introduce a novel method, based on persistent homology, to detect particular non-local structures, akin to weighted holes within the link-weight network fabric, which are invisible to existing methods. Their properties divide weighted networks in two broad classes: one is characterized by small hierarchically nested holes, while the second displays larger and longer living inhomogeneities. These classes cannot be reduced to known local or quasilocal network properties, because of the intrinsic non-locality of homological properties, and thus yield a new classification built on high order coordination patterns. Our results show that topology can provide novel insights relevant for many-body interactions in social and spatial networks. Moreover, this new method creates the first bridge between network theory and algebraic topology, which will allow to import the toolset of algebraic methods to complex systems.

Proceedings ArticleDOI
14 Nov 2013
TL;DR: It is argued that it is not sufficient to look only at node-to-controller latencies but a controller placement should also fulfill certain resilience constraints especially for the control plane, and is provided an overview over related work and include different resilience issues in the controller placement process.
Abstract: With the introduction of Software Defined Networking (SDN), the concept of an external and optionally centralized network control plane, i.e. controller, is drawing the attention of researchers and industry. A particularly important task in the SDN context is the placement of such external resources in the network. In this paper, we discuss important aspects of the controller placement problem with a focus on SDN-based core networks, including different types of resilience and failure tolerance. When several performance and resilience metrics are considered, there is usually no single best controller placement solution, but a trade-off between these metrics. We introduce our framework for resilient Pareto-based Optimal COntroller-placement (POCO) that provides the operator of a network with all Pareto-optimal placements. The ideas and mechanisms are illustrated using the Internet2 OS3E topology and further evaluated on more than 140 topologies of the Topology Zoo. In particular, our findings reveal that for most of the topologies more than 20% of all nodes need to be controllers to assure a continuous connection of all nodes to one of the controllers in any arbitrary double link or node failure scenario.

Journal ArticleDOI
TL;DR: An analytical framework is developed to identify the category of each node in a network, leading to the discovery of two distinct control modes in complex systems: centralized versus distributed control.
Abstract: The control of a complex network can be achieved by different combinations of relatively few driver nodes. Tao Jia and colleagues show that this can lead to two distinct control modes—centralized or distributed—that determine the number of nodes that can act as driver node.

Journal ArticleDOI
TL;DR: In this article, an unsupervised outlier detection approach for wireless sensor networks is proposed, which is flexible with respect to the outlier definition and uses only single-hop communication, thus permitting very simple node failure detection and message reliability assurance mechanisms.
Abstract: To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy consumption, (3) uses only single-hop communication, thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance by simulation, using real sensor data streams. Our results demonstrate that our approach is accurate and imposes reasonable communication and power consumption demands.

Journal ArticleDOI
TL;DR: Comparing with the epidemic process results for four real networks and the Barabasi–Albert network, the parameterless method could identify the node spreading influence more accurately than the ones generated by the degree k, closeness centrality, k-shell and mixed degree decomposition methods.
Abstract: Identifying the node spreading influence in networks is an important task to optimally use the network structure and ensure the more efficient spreading in information. In this paper, by taking into account the shortest distance between a target node and the node set with the highest k -core value, we present an improved method to generate the ranking list to evaluate the node spreading influence. Comparing with the epidemic process results for four real networks and the Barabasi–Albert network, the parameterless method could identify the node spreading influence more accurately than the ones generated by the degree k , closeness centrality, k -shell and mixed degree decomposition methods. This work would be helpful for deeply understanding the node importance of a network.

Journal ArticleDOI
TL;DR: A penalty function method incorporating the rank-1 constraint into the objective function is proposed and an efficient iterative algorithm to solve the so-obtained problem, which is a convex SDP problem, thus it can be efficiently solved using the interior point method.
Abstract: In this paper, we propose a hybrid cooperative beamforming and jamming scheme to enhance the physical-layer security of a single-antenna-equipped two-way relay network in the presence of an eavesdropper. The basic idea is that in both cooperative transmission phases, some intermediate nodes help to relay signals to the legitimate destination adopting distributed beamforming, while the remaining nodes jam the eavesdropper, simultaneously, which takes the data transmissions in both phases under protection. Two different schemes are proposed, with and without the instantaneous channel state information of the eavesdropper, respectively, and both are subjected to the more practical individual power constraint of each cooperative node. Under the general channel model, it is shown that both problems can be transformed into a semi-definite programming (SDP) problem with an additional rank-1 constraint. A current state of the art technique for handling such a problem is the semi-definite relaxation (SDR) and randomization techniques. In this paper, however, we propose a penalty function method incorporating the rank-1 constraint into the objective function. Although the so-obtained problem is not convex, we develop an efficient iterative algorithm to solve it. Each iteration is a convex SDP problem, thus it can be efficiently solved using the interior point method. When the channels are reciprocal such as in TDD mode, we show that the problems become second-order convex cone programming ones. Numerical evaluation results are provided and analyzed to show the properties and efficiency of the proposed hybrid security scheme, and also demonstrate that our optimization algorithms outperform the SDR technique.

Journal ArticleDOI
TL;DR: State-of-the-art research on self-configuring and self-optimizing HetNets are surveyed, and their corresponding SON architectures are introduced and the performance gain of SON algorithms is demonstrated.
Abstract: Self-organizing network, or SON, technology, which is able to minimize human intervention in networking processes, was proposed to reduce the operational costs for service providers in future wireless systems. As a cost-effective means to significantly enhance capacity, heterogeneous deployment has been defined in the 3GPP LTEAdvanced standard, where performance gains can be achieved through increasing node density with low-power nodes, such as pico, femto, and relay nodes. The SON has great potential for application in future LTE-Advanced heterogeneous networks, also called HetNets. In this article, state-of-the-art research on self-configuring and self-optimizing HetNets are surveyed, and their corresponding SON architectures are introduced. In particular, we discuss the issues of automatic physical cell identifier assignment and radio resource configuration in HetNets based on selfconfiguring SONs. As for self-optimizing SONs, we address the issues of optimization strategies and algorithms for mobility management and energy saving in HetNets. At the end of the article, we show a testbed designed for evaluating SON technology, with which the performance gain of SON algorithms is demonstrated.

Patent
27 Sep 2013
TL;DR: In this article, the authors proposed a system information (SI) broadcast from a radio access network (RAN) node to indicate that an operator of the RAN node supports service-based network access.
Abstract: Systems, methods, and instrumentalities are disclosed such that a WTRU may obtain network operator agnostic wireless access for a service. The WTRU may receive a system information (SI) broadcast from a radio access network (RAN) node. The SI broadcast may indicate that an operator of the RAN node supports service-based network access. The WTRU may send a service request to a virtual service provider to request the service. The WTRU may receive a service response from the virtual service provider. The WTRU may receive a service response from the virtual service provider, the service response indicating a mobile network operator (MNO) to use for obtaining the service and subscription information for accessing the MNO, wherein the MNO is different than the operator of the RAN node. The WTRU may access the MNO to obtain the service.

Patent
08 Aug 2013
TL;DR: In this paper, the authors describe local and cross-site switchover and switchback operations of a node in a disaster recovery (DR) group, where the first and second HA groups form the DR group and share a storage fabric.
Abstract: Synchronous local and cross-site switchover and switchback operations of a node in a disaster recovery (DR) group are described. In one embodiment, during switchover, a takeover node receives a failover request and responsively identifies a first partner node in a first cluster and a second partner node in a second cluster. The first partner node and the takeover node form a first high-availability (HA) group and the second partner node and a third partner node in the second cluster form a second HA group. The first and second HA groups form the DR group and share a storage fabric. The takeover node synchronously restores client access requests associated with a failed partner node at the takeover node.

Patent
04 Feb 2013
TL;DR: In this article, a slave management module modifies at least one node of the plurality of nodes in an on-demand compute environment, upon instructions from a master management module at a local compute environment.
Abstract: An on-demand compute environment comprises a plurality of nodes within an on-demand compute environment available for provisioning and a slave management module operating on a dedicated node within the on-demand compute environment, wherein upon instructions from a master management module at a local compute environment, the slave management module modifies at least one node of the plurality of nodes.

Proceedings ArticleDOI
08 Apr 2013
TL;DR: FlockLab is presented, a testbed that overcomes limitation by allowing multiple services to run simultaneously and synchronously against all nodes under test in addition to the traditional serial port service: tracing of GPIO pins to record logical events occurring on a node, actuated pins to trigger actions on a nodes, and high-resolution power profiling.
Abstract: Testbeds are indispensable for debugging and evaluating wireless embedded systems. While existing testbeds provide ample opportunities for realistic, large-scale experiments, they are limited in their ability to closely observe and control the distributed operation of resource-constrained nodes - access to the nodes is restricted to the serial port. This paper presents FlockLab, a testbed that overcomes this limitation by allowing multiple services to run simultaneously and synchronously against all nodes under test in addition to the traditional serial port service: tracing of GPIO pins to record logical events occurring on a node, actuation of GPIO pins to trigger actions on a node, and high-resolution power profiling. FlockLab's accurate timing information in the low microsecond range enables logical events to be correlated with power samples, thus providing a previously unattained level of visibility into the distributed behavior of wireless embedded systems. In this paper, we describe FlockLab's design, benchmark its performance, and demonstrate its capabilities through several real-world test cases.

Patent
Christopher P. Ricci1
14 Mar 2013
TL;DR: In this article, the authors describe a microprocessor executable remote control module that allows a vehicle owner to configure and alter and/or determine a state of a selected vehicle component and, when the vehicle owner is authenticated successfully by the remote controller module, to configure or alter or determine the state of the selected component.
Abstract: The present disclosure describes a microprocessor executable remote control module operable to receive, via a remote node, a command from a vehicle owner to configure and/or alter and/or determine a state of a selected vehicle component and, when the vehicle owner is authenticated successfully by the remote control module, to configure and/or alter and/or determine a state of the selected vehicle component.

Journal ArticleDOI
TL;DR: A new centrality measure is proposed based on the Dempster–Shafer evidence theory, which trades off between the degree and strength of every node in a weighted network.
Abstract: The design of an effective ranking method to identify influential nodes is an important problem in the study of complex networks. In this paper, a new centrality measure is proposed based on the Dempster–Shafer evidence theory. The proposed measure trades off between the degree and strength of every node in a weighted network. The influences of both the degree and the strength of each node are represented by basic probability assignment (BPA). The proposed centrality measure is determined by the combination of these BPAs. Numerical examples are used to illustrate the effectiveness of the proposed method.