首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
A new method is described and tested for using an unreliable character recognition device to produce a reliable index for a collection of documents. All highly likely substitution errors of the recognition device are handled by transforming characters which confuse readily into the same pseudocharacter. An analysis of the method is done showing the expected precision (fraction of words correctly found to words present) and recall (fraction of words retrieved properly to those which were retrieved). Published substitution error matrices were employed, along with a large file of words and word frequencies to evaluate the method. Performance was surprisingly good. Suggestions for further enhancements are given.  相似文献   

2.
In this paper we study the problem of building a constant-degree connected dominating set (CCDS), a network structure that can be used as a communication backbone, in the dual graph radio network model (Clementi et al. in J Parallel Distrib Comput 64:89–96, 2004; Kuhn et al. in Proceedings of the international symposium on principles of distributed computing 2009, Distrib Comput 24(3–4):187–206 2011, Proceedings of the international symposium on principles of distributed computing 2010). This model includes two types of links: reliable, which always deliver messages, and unreliable, which sometimes fail to deliver messages. Real networks compensate for this differing quality by deploying low-layer detection protocols to filter unreliable from reliable links. With this in mind, we begin by presenting an algorithm that solves the CCDS problem in the dual graph model under the assumption that every process $u$ is provided with a local link detector set consisting of every neighbor connected to $u$ by a reliable link. The algorithm solves the CCDS problem in $O\left( \frac{\varDelta \log ^2{n}}{b} + \log ^3{n}\right) $ rounds, with high probability, where $\varDelta $ is the maximum degree in the reliable link graph, $n$ is the network size, and $b$ is an upper bound in bits on the message size. The algorithm works by first building a Maximal Independent Set (MIS) in $\log ^3{n}$ time, and then leveraging the local topology knowledge to efficiently connect nearby MIS processes. A natural follow-up question is whether the link detector must be perfectly reliable to solve the CCDS problem. With this in mind, we first describe an algorithm that builds a CCDS in $O(\varDelta $ polylog $(n))$ time under the assumption of $O(1)$ unreliable links included in each link detector set. We then prove this algorithm to be (almost) tight by showing that the possible inclusion of only a single unreliable link in each process’s local link detector set is sufficient to require $\varOmega (\varDelta )$ rounds to solve the CCDS problem, regardless of message size. We conclude by discussing how to apply our algorithm in the setting where the topology of reliable and unreliable links can change over time.  相似文献   

3.
We consider multichannel systems and open queueing networks with unreliable elements: nodes, paths between nodes, and channels at nodes. Computation of limiting distributions in a product form for these models is based on choosing recovery schemes for unreliable elements (independent recovery, recovery at a single site, recovering network scheme), routing algorithms, and service disciplines. Thus, by introducing a certain control, we constructively relate queueing theory with reliability theory. Results of the paper can be transferred to closed networks almost without changes.  相似文献   

4.
This paper considers the problem of selecting the optimum capacities of the links in a computer communication network which employs unreliable links. Given the nodes, links, link probabilities, grade of service and cost functions of the network, the objective of this problem is to find the optimum link capacities that minimize the network design cost, subject to the constraint equation involving the grade of service. This is essentially a combinatorial optimization problem. A general methematical model for this problem is formulated and a set of feasible solutions is obtained using Lagrangean relaxation and subgradient optimization techniques. A simulation study has been performed to verify the model, and favourable results obtained for a variety of nontrivial networks.  相似文献   

5.
In this paper a reliable and economic resource allocation strategy under cost constraints is developed for an unreliable multi-source multi-sink flow network. A multi-source multi-sink flow network is composed of nodes, characterized as source nodes, sink nodes and intermediate nodes, as well as directed arcs, joining pairs of nodes. In the presence of unreliable intermediate nodes and arcs, it is important to distribute resources at source nodes in a reliable and cost-effective manner so that resources are more likely to be transmitted successfully to sink nodes through the flow network. By modelling the capacities of intermediate nodes and arcs as statistically independent random variables, an integrated approach is proposed in this study that combines the existing methodologies to determine a reliability-maximizing resource allocation strategy which meets demand at sink nodes and a predetermined transmission cost requirement. Examples of cyclic and acyclic flow networks with unreliable intermediate nodes and arcs are given to illustrate the application of the proposed approach.  相似文献   

6.
Causal order states that for any process the order in which it is delivered messages cannot violate the happened-before relation of the corresponding sendings. Such a communication abstraction has been defined for reliable distributed systems in which data of application messages have unlimited time validity. In this paper we extend the notion of causal order to cope with unreliable communication networks in which messages have real-time delivery constraints. In particular, we assume that messages have a limited time validity, , after which their data can no longer be used by the application, and that some of them can be lost by the communication network. This new abstraction, called -causal order, requires to deliver as many messages as possible within their validity time in such a way that these deliveries respect causal order. Two efficient implementations are proposed in the case of one-to-one and broadcast communication. Examples of distributed multimedia real-time applications, in which scheduling messages deliveries respecting -causal order is a crucial point for the quality of the service, are given.  相似文献   

7.
8.
数字时间戳(DTS)技术被广泛用于数字签名、电子商务及各种软硬件产品的专利和产权保护。在一些网络状况差、网速变化大、时断时续的不可靠网络中,缺乏必要的技术手段来保证时间戳服务的正常、有效运行。根据不可靠网络的特点,设计了一个不实时依赖时间戳服务中心(TSA)的时间服务模型,每次进行时间戳服务时不再需要与远程TSA进行通信,而是通过本地可信平台来进行时间戳服务。还提出一种不可靠网络环境下基于可信平台模块(TPM)的数字时间戳服务协议,并对协议进行了安全性分析。结果表明,协议是安全的,协议产生的时间误差是可控的,对不可靠网络有很好的适应性。  相似文献   

9.
Election in a computer network is an operation in which one process is selected from among a group of processes to perform a particular task. An election is characterized by (1) the capacities of the candidates, and (2) the agreement reached by all processes to elect the master. In this paper, we show that election is in fact a very general style of computation. Many problems in computer networks can be solved by means of election. We then examine the election problem in computer networks with broadcast support. Basic design issues of election algorithms are addressed, and a number of election algorithms are presented based on various environments. These algorithms allow all nonfaulty processes to elect one and only one process as the master, and, by changing the definition of the capacities, they can be applied to a variety of problems.  相似文献   

10.
We consider Jackson networks with unreliable nodes, which randomly break down and are under repair for a random time. The network is described by a Markov process which encompasses the availability status and queue lengths vector. Ergodicity conditions for many related networks are available in the literature and can often be expressed as rate conditions. For (reliable) nodes in Jackson networks the overall arrival rate has to be strictly less than its service rate. If for some nodes this condition is violated, the network process is not ergodic. Nevertheless, it is known that in such a situation, especially in large networks, parts of the network (where the rate condition is fulfilled) in the long run stabilize. For standard Jackson networks without breakdown of nodes, the asymptotics of such stable subnetworks were derived by Goodman and Massey [J.B. Goodman, W.A. Massey, The non-ergodic Jackson network, Journal of Applied Probability 21 (1984) 860–869].In this paper, we obtain the asymptotics of Jackson networks with unreliable nodes and show that the state distribution of the stable subnetworks converges to a Jackson-type product form distribution. In such networks with breakdown and repair of nodes, in general, the ergodicity condition is more involved.Because no stationary distribution for the network exists, steady-state availability and performance evaluation is not possible. We show that instead assessment of the quality of service in the long run for the stabilizing subnetwork can be done by using limiting distributions. Additionally, we prove that time averages of cumulative rewards can be approximated by state-space averages.  相似文献   

11.
12.
We study the question of routing for minimum average drop rate over unreliable servers that are susceptible to random buffer failures, which arises in unreliable data or manufacturing networks. Interestingly, we first reveal that the traditional Join-the-Shortest-Queue (JSQ) or optimal Randomized Splitting (RS) strategies are consistently outperformed by the Constant Splitting Rule (CSR) where the incoming traffic is split with a constant fraction towards the available servers.This finding motivates us to obtain the optimal splitting fraction under CSR. However, the objective function to be minimized depends on the mean queue length of the servers, whose closed-form expression is not available and often intractable for general arrival and service processes. Thus, we use non-derivative methods to solve this optimization problem by approximately evaluating the objective value at each iteration. To that end, we explicitly characterize the approximation error by utilizing the regenerating nature of unreliable buffers. By adaptively controlling the precision of this approximation, we show that our proposed algorithm converges to an optimal splitting decision in the almost sure sense. Yet, previous works on non-derivative methods assume continuous differentiability of the objective function, which is not the case in our setup. We relax this strong assumption to the case when the objective function is locally Lipschitz continuous, which is another contribution of this paper.  相似文献   

13.
Wireless sensor networks are inherently plagued by problems of node failure, interference to communications from environmental noise and energy-limited sensor motes. These problems pose conflicting issues in the design of suitable routing protocols. Several existing reliable routing protocols exploit message broadcast redundancy and hop count as routing metrics and their performance trade-offs are revealed during simulation. In this paper, we study and analyse related design issues in proposed efficient and reliable routing protocols that attempt to achieve reliable and efficient communication performance in both single- and multi-hub sensor networks. Simulation results of four such routing protocols show that routing performance depends more on optimal (near-optimal) routing in single hub than in multi-hub networks. Our work also shows that optimal (near-optimal) routing is better achieved when historical metrics like packet distance traversed and transmission success are also considered in the routing protocol design.  相似文献   

14.
The problem of finding parameters of asymptotic relations for the probability of operation of a graph with unreliable ribs is solved. These parameters are expressed through minimax functions of lengths of ribs. To compute them, an economical modification of the Floyd algorithm is constructed.  相似文献   

15.
The unprecedented growth of the Internet of Things(Io T) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service(QoS) of authenticated users rather than that of all users. By acknowledging this limitation,we realise that user authentication would be a big issue in Io T networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to ...  相似文献   

16.
In this paper we introduce a novel energy-aware routing protocol REPU (reliable, efficient with path update), which provides reliability and energy efficiency in data delivery. REPU utilizes the residual energy available in the nodes and the received signal strength of the nodes to identify the best possible route to the destination. Reliability is achieved by selecting a number of intermediate nodes as waypoints and the route is divided into smaller segments by the waypoints. One distinct advantage of this model is that when a node on the route moves out or fails, instead of discarding the whole original route, only the two waypoint nodes of the broken segment are used to find a new path. REPU outperforms traditional schemes by establishing an energy-efficient path and also takes care of efficient route maintenance. Simulation results show that this routing scheme achieves much higher performance than the classical routing protocols, even in the presence of high node density, and overcomes simultaneous packet forwarding.  相似文献   

17.
This paper provides a reliable fusion scheme over sensor networks subject to abnormal measurements and energy constraints. Two kinds of channels are employed to implement the information transmission in order to extend the lifetime. Specifically, the one has the merit of high reliability by sacrificing energy cost and the other reduces the energy cost but could result in packet loss. For the addressed problem, a χ2 detection in local state estimator is first designed to remove abnormal measurements, which could come from outliers or a malicious modification by attackers. Then, a new strategy is developed to compensate the lost local estimation transmitted by low‐reliable channels. Furthermore, by view of matrix operation and probability theory, a set of recursive formulas are developed to calculate desired error covariance matrices of local state estimation, compensated state estimation as well as fusion estimation. The optimal fusion weights are obtained analytically and the advantage of fusion estimation is disclosed by resorting to these covariance matrices. Finally, a numerical example is used to illustrate the effectiveness of the proposed method.  相似文献   

18.
We address the problem of abnormal behaviour recognition of the inhabitant of a smart home in the presence of unreliable sensors. The corner stone of this work is a two-level architecture sensor fusion based on the Transferable Belief Model (TBM). The novelty of our work lies in the way we detect both unreliable sensors and abnormal behaviour within our architecture by using a temporal analysis of conflict resulting from the fusion of sensors. Detection of abnormal behaviour is based on a prediction/observation process and the influence of the faulty sources is discarded by discounting coefficients. Our architecture is tested in a real-life setting using three heterogeneous sensors enabling the detection of impossible transitions between three possible postures: Sitting, Standing and Lying. The impact of having a faulty sensor management is also tested in the real-life experiment for posture detection.  相似文献   

19.
Peer-to-Peer Networking and Applications - It is a very difficult task to estimate abnormal objects and analyze reliability in peer-to-peer (P2P) networks. In the P2P network environment,...  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号