To see the other types of publications on this topic, follow the link: Communication Overheads.

Journal articles on the topic 'Communication Overheads'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Communication Overheads.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yang, Jixiang, Ling Ling, and Haibin Liu. "A Hierarchical Load Balancing Strategy Considering Communication Delay Overhead for Large Distributed Computing Systems." Mathematical Problems in Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/5641831.

Full text
Abstract:
Load balancing technology can effectively exploit potential enormous compute power available on distributed systems and achieve scalability. Communication delay overhead on distributed system, which is time-varying and is usually ignored or assumed to be deterministic for traditional load balancing strategies, can greatly degrade the load balancing performance. Considering communication delay overhead and its time-varying feature, a hierarchical load balancing strategy based on generalized neural network (HLBSGNN) is presented for large distributed systems. The novelty of the HLBSGNN is threef
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Zhen, Shuai Zheng, Yida Wang, et al. "MiCS." Proceedings of the VLDB Endowment 16, no. 1 (2022): 37–50. http://dx.doi.org/10.14778/3561261.3561265.

Full text
Abstract:
Existing general purpose frameworks for gigantic model training, i.e., dense models with billions of parameters, cannot scale efficiently on cloud environment with various networking conditions due to large communication overheads. In this paper, we propose MiCS, which Minimizes the Communication Scale to bring down communication overhead. Specifically, by decreasing the number of participants in a communication collective, MiCS can utilize heterogeneous network bandwidth, reduce network traffic over slower links, reduce the latency of communications for maintaining high network bandwidth util
APA, Harvard, Vancouver, ISO, and other styles
3

Resano, J. Javier, M. Elena Pérez, Daniel Mozos, Hortensia Mecha, and Julio Septién. "Analyzing communication overheads during hardware/software partitioning." Microelectronics Journal 34, no. 11 (2003): 1001–7. http://dx.doi.org/10.1016/s0026-2692(03)00168-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mr., Fariz bin Hussain1, Fidha Jaleel2 Ms., Nisni Abdul Naseer3 Ms., Sahala4 Ms., Shefna5 Ms., and Ms.Aqeela.S.Ummer6. "GROUP KEY MANAGEMENT FOR SECURE WIRELESS MOBILE MULTICAST." International Journal of Advances in Engineering & Scientific Research 3, no. 6 (2016): 49–56. https://doi.org/10.5281/zenodo.10774468.

Full text
Abstract:
<strong>Abstract: </strong> &nbsp; Addressing key management in mobile multicast communication is currently a booming topic due to the convergence of wireless and mobile technologies. With the proliferation of multiple group based services that are possible to co-exist within a single network, mobile subscribers could subscribe to these services concurrently while ubiquitous. However, the existing group key management (GKM) protocols intend to secure group communication for just a single group service. The GKM approaches involve inefficient use of keys and huge rekeying overheads, hence unsuit
APA, Harvard, Vancouver, ISO, and other styles
5

Tang, Ling, Yaping Sun, Shumin Yao, Xiaodong Xu, Hao Chen, and Zhiyong Luo. "Efficient Multiple-Input–Multiple-Output Channel State Information Feedback: A Semantic-Knowledge-Base- Driven Approach." Electronics 14, no. 8 (2025): 1666. https://doi.org/10.3390/electronics14081666.

Full text
Abstract:
Massive multiple-input–multiple-output (MIMO) systems encounter substantial challenges in relation to channel state information (CSI) feedback; this is particularly the case in frequency division duplex systems, where the lack of channel reciprocity necessitates high-dimensional CSI transmission, resulting in substantial feedback overheads. Most existing deep learning methods have improved compression efficiency but still suffer from high feedback overheads due to their transmission of entire compressed vectors. To address this, we propose SKBNet, an innovative semantic knowledge base (SKB)-dr
APA, Harvard, Vancouver, ISO, and other styles
6

Carothers, Christopher D., Richard M. Fujimoto, and Paul England. "Effect of communication overheads on Time Warp performance." ACM SIGSIM Simulation Digest 24, no. 1 (1994): 118–25. http://dx.doi.org/10.1145/195291.182578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shanta, Mandal, and Chaki Rituparna. "A Secure Encryption Logic for Communication in Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 2, no. 3 (2020): 107–16. https://doi.org/10.5281/zenodo.3752819.

Full text
Abstract:
This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated computational and communication overheads in terms of energy consumption using Directed Diffusion protocol. Public-key cryptography has been observed to suffer from high computational complexity and overhead. The symmetric-key schemes can be utilized more efficiently in order to provide more security. The proposed scheme overcomes the limitations of public-key and symmetric-key protocols for wireless sensor networks in respect of low energy consumption. The symmetric-key function is used to gua
APA, Harvard, Vancouver, ISO, and other styles
8

Mohamed, Taha M., Islam Z. Ahmed, and Rowayda A. Sadek. "Efficient VANET safety message delivery and authenticity with privacy preservation." PeerJ Computer Science 7 (May 4, 2021): e519. http://dx.doi.org/10.7717/peerj-cs.519.

Full text
Abstract:
Vehicular ad-hoc networks (VANETs) play an essential role in the development of the intelligent transportation system (ITS). VANET supports many types of applications that have strict time constraints. The communication and computational overheads are minimal for these computations and there are many security requirements that should be maintained. We propose an efficient message authentication system with a privacy preservation protocol. This protocol reduces the overall communication and computational overheads. The proposed protocol consists of three main phases: the group registration phas
APA, Harvard, Vancouver, ISO, and other styles
9

Shaikh, Abdul Khalique, Saadat M. Alhashmi, and Rajendran Parthiban. "A Proximity and Semantic-Aware Optimisation Model for Sub-Domain-Based Decentralised Resource Discovery in Grid Computing." Journal of Information & Knowledge Management 15, no. 02 (2016): 1650020. http://dx.doi.org/10.1142/s0219649216500209.

Full text
Abstract:
One of the fundamental issues in Grid decentralised resource discovery services is high communication overheads that affect the Grid system’s performance significantly. The rationale is that Grid resources are geographically distributed across the world through a wide area network under various virtual organisations. To address the issue, a significant amount of effort has been made by proposing various decentralised overlay algorithms with semantic solutions. Current Grid literature reveals that when semantic features are added into discovery services, the probability of finding resources is
APA, Harvard, Vancouver, ISO, and other styles
10

Han, Tian, Shi, Huang, and Li. "Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things." Sensors 19, no. 12 (2019): 2804. http://dx.doi.org/10.3390/s19122804.

Full text
Abstract:
. In recent years, the industrial use of the internet of things (IoT) has been constantly growing and is now widespread. Wireless sensor networks (WSNs) are a fundamental technology that has enabled such prevalent adoption of IoT in industry. WSNs can connect IoT sensors and monitor the working conditions of such sensors and of the overall environment, as well as detect unexpected system events in a timely and accurate manner. Monitoring large amounts of unstructured data generated by IoT devices and collected by the big-data analytics systems is a challenging task. Furthermore, detecting anom
APA, Harvard, Vancouver, ISO, and other styles
11

Balaji, Pavan, Anthony Chan, William Gropp, Rajeev Thakur, and Ewing Lusk. "The Importance of Non-Data-Communication Overheads in MPI." International Journal of High Performance Computing Applications 24, no. 1 (2010): 5–15. http://dx.doi.org/10.1177/1094342009359528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rim, Hwakyung, Ju-wook Jang, and Sungchun Kim. "Hiding communication overheads in dynamic load balancing for multicomputers." Journal of Systems and Software 58, no. 1 (2001): 11–22. http://dx.doi.org/10.1016/s0164-1212(01)00024-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mahmud, Shohaib, Haiying Shen, and Anand Iyer. "PACER: Accelerating Distributed GNN Training Using Communication-Efficient Partition Refinement and Caching." Proceedings of the ACM on Networking 2, CoNEXT4 (2024): 1–18. http://dx.doi.org/10.1145/3697805.

Full text
Abstract:
Despite recent breakthroughs in distributed Graph Neural Network (GNN) training, large-scale graphs still generate significant network communication overhead, decreasing time and resource efficiency. Although recently proposed partitioning or caching methods try to reduce communication inefficiencies and overheads, they are not sufficiently effective due to their sampling pattern-agnostic nature. This paper proposes a Pipelined Partition Aware Caching and Communication Efficient Refinement System (Pacer), a communication-efficient distributed GNN training system. First, Pacer intelligently est
APA, Harvard, Vancouver, ISO, and other styles
14

Olieh, Ofuchi Ngozi Rich. "A Smart Contract-based Blockchain Solution in IoT Networks." European Journal of Computer Science and Information Technology 12, no. 2 (2024): 75–92. http://dx.doi.org/10.37745/ejcsit.2013/vol12n27592.

Full text
Abstract:
The emergence and growing use of advanced technologies has opened up new possibilities for addressing the security challenges of resource-constrained IoT net- works. As IoT devices exchange sensitive data, secure key management is essential for IoT network security, particularly during the key revocation phase. However, current IoT key management solutions require improvements due to the resource limitations of IoT devices. Despite these limitations, existing key revocation solutions still have several areas for improvement, including high communication overheads. Therefore, a decentralized an
APA, Harvard, Vancouver, ISO, and other styles
15

Jinnai, Yuu, and Alex Fukunaga. "On Hash-Based Work Distribution Methods for Parallel Best-First Search." Journal of Artificial Intelligence Research 60 (October 30, 2017): 491–548. http://dx.doi.org/10.1613/jair.5225.

Full text
Abstract:
Parallel best-first search algorithms such as Hash Distributed A* (HDA*) distribute work among the processes using a global hash function. We analyze the search and communication overheads of state-of-the-art hash-based parallel best-first search algorithms, and show that although Zobrist hashing, the standard hash function used by HDA*, achieves good load balance for many domains, it incurs significant communication overhead since almost all generated nodes are transferred to a different processor than their parents. We propose Abstract Zobrist hashing, a new work distribution method for para
APA, Harvard, Vancouver, ISO, and other styles
16

Ma, Jie, Wei Su, Yikun Li, and Fangtao Yao. "A Low-Overhead and High-Precision Attack Traceback Scheme with Combination Bloom Filters." Security and Communication Networks 2022 (October 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/1639203.

Full text
Abstract:
Distributed denial of service attacks seriously threatens the availability of highly resilient software-defined networking systems, such as data center networks. A traceback scheme is an effective means of mitigating attacks by identifying the location of the attacker and the attacking path. However, traditional traceback schemes suffer from low traceability success rates, high packet header overheads, and high communication traffic overheads, in addition to the fact that logically centralized traceability schemes make the control plane a prime target for attacks. To overcome the above challen
APA, Harvard, Vancouver, ISO, and other styles
17

Martínez-Peñas, Umberto. "Universal secure rank-metric coding schemes with optimal communication overheads." Cryptography and Communications 11, no. 2 (2018): 147–66. http://dx.doi.org/10.1007/s12095-018-0279-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Comarú, Gustavo, Rafael Follmann Faccenda, Luciano Lores Caimi, and Fernando Gehm Moraes. "Integration of Monitoring Mechanisms in Secure Network Interfaces for Peripherals to Protect IO Communication in NoC-based Many-cores." Journal of Integrated Circuits and Systems 19, no. 3 (2024): 1–10. https://doi.org/10.29292/jics.v19i3.907.

Full text
Abstract:
Many-core systems have gained popularity due to their high performance and parallelism. However, they also present significant security challenges. One critical issue that remains insufficiently addressed in current research is protecting Input/Output (IO) communication within these systems. This paper proposes a Secure Network Interface with Peripherals (SNIP) design, incorporating security mechanisms to safeguard communication between internal components in many-core systems. The proposed SNIP makes an original contribution by integrating security features into its network interface design,
APA, Harvard, Vancouver, ISO, and other styles
19

Gong, Yinyan, Kuanching Li, Lijun Xiao, et al. "VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV." Sensors 23, no. 11 (2023): 5198. http://dx.doi.org/10.3390/s23115198.

Full text
Abstract:
With the rapid growth in wireless communication and IoT technologies, Radio Frequency Identification (RFID) is applied to the Internet of Vehicles (IoV) to ensure the security of private data and the accuracy of identification and tracking. However, in traffic congestion scenarios, frequent mutual authentication increases the overall computing and communication overhead of the network. For this reason, in this work, we propose a lightweight RFID security fast authentication protocol for traffic congestion scenarios, designing an ownership transfer protocol to transfer access rights to vehicle
APA, Harvard, Vancouver, ISO, and other styles
20

FUJIMOTO, NORIYUKI, TOMOKI BABA, TAKASHI HASHIMOTO, and KENICHI HAGIHARA. "ON MESSAGE PACKAGING IN TASK SCHEDULING FOR DISTRIBUTED MEMORY PARALLEL MACHINES." International Journal of Foundations of Computer Science 12, no. 03 (2001): 285–306. http://dx.doi.org/10.1142/s0129054101000497.

Full text
Abstract:
In this paper, we report a performance gap betweeen a schedule with small makespan on the task scheduling model and the corresponding parallel program on distributed memory parallel machines. The main reason of the gap is the software overhead in the interprocessor communication. Therefore, speedup ratios of schedules on the model do not approximate well to those of parallel programs on the machines. The purpose of the paper is to get a task scheduling algorithm that generates a schedule with good approximation to the corresponding parallel program and with small makespan. For this purpose, we
APA, Harvard, Vancouver, ISO, and other styles
21

Rathee, Geetanjali, and Hemraj Saini. "Efficient Authentication Scheme with Reduced Response Time and Communication Overhead in WMN." International Journal of Information Security and Privacy 12, no. 2 (2018): 26–37. http://dx.doi.org/10.4018/ijisp.2018040102.

Full text
Abstract:
Recently, Wireless Mesh Network is deliberated as a significant technology due to its self-healing, self-configuring and self-organizing features. The Multi-hop nature of WMN nodes has the potential to forward the data traffic to their intended destination node without the involvement of source node. One of the factors that impact the WMN performance is secure communication process. Various secure authentication mechanisms have been projected however, authentication delay and communication overheads are listed as the main security issues of these approaches. In this article, an efficient and f
APA, Harvard, Vancouver, ISO, and other styles
22

Ahn, Jinho. "Scalable Communication-Induced Checkpointing Protocol with Little Overhead for Distributed Computing Environments." Electronics 12, no. 12 (2023): 2702. http://dx.doi.org/10.3390/electronics12122702.

Full text
Abstract:
The existing communication-induced checkpointing protocols may not scale well due to their slow acquisition of the most recent timestamps of the next checkpoints of other processes. Accurate situation awareness with diversified information conveyance paths is needed to reduce the number of unnecessary forced checkpoints taken as few as possible. In this paper, a scalable communication-induced checkpointing protocol is proposed to considerably cut down the possibility of performing unnecessary forced checkpointing by exploiting the beneficial features of reliable communication channels. The pro
APA, Harvard, Vancouver, ISO, and other styles
23

Mirzaei, Fatemeh, and Mahdi Mollamotalebi. "An Adaptive Multi-hop Clustered Voting to Improve the Message Trust in Vehicular Ad-hoc Networks." International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems 7, no. 1 (2018): 1. http://dx.doi.org/10.11601/ijates.v7i1.245.

Full text
Abstract:
The Vehicular Ad-hoc Network (VANET) is used in intelligent transportation systems to make communication between vehicles and make appropriate decisions with regard to road or traffic conditions. Some main research issues in VANETs are unreliability in communication, delay/precision of decision making, information overheads, and handling the nodes dynamicity. This paper aimed to provide an efficient voting method to improve the reliability of decision making for message voting. It also reduces the voting delay and network information overhead. The proposed method is simulated in NS2. The exper
APA, Harvard, Vancouver, ISO, and other styles
24

Waseem, Athar, Aqdas Naveed, Sardar Ali, Muhammad Arshad, Haris Anis, and Ijaz Mansoor Qureshi. "Compressive Sensing Based Channel Estimation for Massive MIMO Communication Systems." Wireless Communications and Mobile Computing 2019 (May 27, 2019): 1–15. http://dx.doi.org/10.1155/2019/6374764.

Full text
Abstract:
Massive multiple-input multiple-output (MIMO) is believed to be a key technology to get 1000x data rates in wireless communication systems. Massive MIMO occupies a large number of antennas at the base station (BS) to serve multiple users at the same time. It has appeared as a promising technique to realize high-throughput green wireless communications. Massive MIMO exploits the higher degree of spatial freedom, to extensively improve the capacity and energy efficiency of the system. Thus, massive MIMO systems have been broadly accepted as an important enabling technology for 5th Generation (5G
APA, Harvard, Vancouver, ISO, and other styles
25

Bitar, Rawad, and Salim El Rouayheb. "Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads." IEEE Transactions on Information Theory 64, no. 2 (2018): 933–43. http://dx.doi.org/10.1109/tit.2017.2723019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Research Scholar ,Assistant Professor,Associate Professor. "Communication Efficient Mobile Data Collection for IoT Edge using Federated Learning." Cuestiones de Fisioterapia 54, no. 2 (2025): 4216–30. https://doi.org/10.48047/tz5fx475.

Full text
Abstract:
Internet of Things (IoT) has emerged in recent years as a result of substantial advances in computer and communication technology. A new paradigm for networked computing is federated learning (FL). However, utilizing FL in client-edge-computing will result in costly communication overheads, with usual resources used for ordinary communication. The edge server has more effective interactions with the IoT devices as well as with the cloud server.
APA, Harvard, Vancouver, ISO, and other styles
27

Alagiri, I., V. Madhuviswanatham, and P. VenkataKrishna. "Efficient Data Transfer by Mobility Adjustment Algorithm for Clustered Mobile Ad-Hoc Networks." Cybernetics and Information Technologies 14, no. 2 (2014): 50–64. http://dx.doi.org/10.2478/cait-2014-0019.

Full text
Abstract:
Abstract Mobile Ad-hoc NETwork (MANET) is a prevalent deployable network for easy plug-in and it is widely applied for many real time scenarios. Clustering is a well known solution for efficient communication among nodes with least control overheads. The communication link breaks between nodes when a node moves beyond the transmission range of another node because of mobility. Frequent link breaks happen because of nodes mobility which cannot be controlled without increasing the network control overheads. The authors propose an Mobility Adjustment Routing (MAR) routing algorithm for establishi
APA, Harvard, Vancouver, ISO, and other styles
28

Son, Yunsik, Junho Jeong, and YangSun Lee. "An Adaptive Offloading Method for an IoT-Cloud Converged Virtual Machine System Using a Hybrid Deep Neural Network." Sustainability 10, no. 11 (2018): 3955. http://dx.doi.org/10.3390/su10113955.

Full text
Abstract:
A virtual machine with a conventional offloading scheme transmits and receives all context information to maintain program consistency during communication between local environments and the cloud server environment. Most overhead costs incurred during offloading are proportional to the size of the context information transmitted over the network. Therefore, the existing context information synchronization structure transmits context information that is not required for job execution when offloading, which increases the overhead costs of transmitting context information in low-performance Inte
APA, Harvard, Vancouver, ISO, and other styles
29

Li, Ruihan, Lou Zhao, Chunshan Liu, and Meihua Bi. "Strongest Angle-of-Arrival Estimation for Hybrid Millimeter Wave Architecture with 1-Bit A/D Equipped at Transceivers." Sensors 22, no. 9 (2022): 3140. http://dx.doi.org/10.3390/s22093140.

Full text
Abstract:
This paper proposes an effective strongest angles of arrival (AoAs) estimation algorithm for a hybrid millimeter wave (mmWave) communication system with 1-bit analog-to-digital/digital-to-analog converters (A/Ds) equipped at transceivers. The proposed algorithm aims to reduce the required number of estimation overheads, while maintaining the root mean square error (RMSE) of strongest AoA estimates at the base station. We obtain the quantization thresholds of A/Ds for different signal-to-noise ratios (SNRs) and numbers of antennas via numerical simulations, based on which, the strongest AoAs ca
APA, Harvard, Vancouver, ISO, and other styles
30

Loganathan, Murukesan, Thennarasan Sabapathy, Mohamed Elshaikh, Mohamed Nasrun Osman, and Rosemizi Abd Rahim. "Energy efficient anti-collision algorithm for the RFID networks." Bulletin of Electrical Engineering and Informatics 8, no. 2 (2019): 622–29. http://dx.doi.org/10.11591/eei.v8i2.1427.

Full text
Abstract:
Energy efficiency is crucial for radio frequency identification (RFID) systems as the readers are often battery operated. The main source of the energy wastage is the collision which happens when tags access the communication medium at the same time. Thus, an efficient anti-collision protocol could minimize the energy wastage and prolong the lifetime of the RFID systems. In this regard, EPCGlobal-Class1-Generation2 (EPC-C1G2) protocol is currently being used in the commercial RFID readers to provide fast tag identification through efficient collision arbitration using the Q algorithm. However,
APA, Harvard, Vancouver, ISO, and other styles
31

Murukesan, Loganathan, Sabapathy Thennarasan, Elshaikh Mohamed, Nasrun Osman Mohamed, and Abd Rahim Rosemizi. "Energy efficient anti-collision algorithm for the RFID networks." Bulletin of Electrical Engineering and Informatics 8, no. 2 (2019): 622–29. https://doi.org/10.11591/eei.v8i2.1427.

Full text
Abstract:
Energy efficiency is crucial for radio frequency identification (RFID) systems as the readers are often battery operated. The main source of the energy wastage is the collision which happens when tags access the communication medium at the same time. Thus, an efficient anti-collision protocol could minimize the energy wastage and prolong the lifetime of the RFID systems. In this regard, EPCGlobal-Class1-Generation2 (EPC-C1G2) protocol is currently being used in the commercial RFID readers to provide fast tag identification through efficient collision arbitration using the Q algorithm. However,
APA, Harvard, Vancouver, ISO, and other styles
32

Wu, Tianhao, Mingzhi Jiang, Yinhui Han, Zheng Yuan, Xinhang Li, and Lin Zhang. "A Traffic-Aware Federated Imitation Learning Framework for Motion Control at Unsignalized Intersections with Internet of Vehicles." Electronics 10, no. 24 (2021): 3050. http://dx.doi.org/10.3390/electronics10243050.

Full text
Abstract:
The wealth of data and the enhanced computation capabilities of Internet of Vehicles (IoV) enable the optimized motion control of vehicles passing through an intersection without traffic lights. However, more intersections and demands for privacy protection pose new challenges to motion control optimization. Federated Learning (FL) can protect privacy via model interaction in IoV, but traditional FL methods hardly deal with the transportation issue. To address the aforementioned issue, this study proposes a Traffic-Aware Federated Imitation learning framework for Motion Control (TAFI-MC), cons
APA, Harvard, Vancouver, ISO, and other styles
33

Ruwei, Huang, Gui Xiaolin, Yu Si, and Zhuang Wei. "Study of privacy-preserving framework for cloud storage." Computer Science and Information Systems 8, no. 3 (2011): 801–19. http://dx.doi.org/10.2298/csis100327029r.

Full text
Abstract:
In order to implement privacy-preserving, efficient and secure data storage and access environment of cloud storage, the following problems must be considered: data index structure, generation and management of keys, data retrieval, treatments of change of users? access right and dynamic operations on data, and interactions among participants. To solve those problems, the interactive protocol among participants is introduced, an extirpation-based key derivation algorithm (EKDA) is designed to manage the keys, a double hashed and weighted Bloom Filter (DWBF) is proposed to retrieve the encrypte
APA, Harvard, Vancouver, ISO, and other styles
34

Biswas, Sudeshna, Himanshu ., Sushmita Ghosh, Payali Das, Kaushik Saha, and Swades De. "Efficient Data Transfer Mechanism for DLMS/COSEM Enabled Smart Energy Metering Platform." ACM SIGMETRICS Performance Evaluation Review 50, no. 4 (2023): 14–16. http://dx.doi.org/10.1145/3595244.3595250.

Full text
Abstract:
We report our implementation of DLMS/COSEM (Device Language Message Specification/Companion Specification for Energy Metering) enabled advanced smart metering data collection using our in-house developed data-driven multivariate data pruning technique. Aiming at near real-time smart metering data collection, a working model of a smart energy meter with a data pruning subsystem is developed and incorporated with the data pruning and communication module. The implementation of DLMS/COSEM service layer enables standard pull-based data collection from multiple meters that are connected with a comm
APA, Harvard, Vancouver, ISO, and other styles
35

., Renu Kumari. "PERFORMANCE EVALUATION OF VARIOUS COOPERATIVE SPECTRUM SENSING ALGORITHMS FOR REDUCING COMMUNICATION OVERHEADS." International Journal of Research in Engineering and Technology 03, no. 06 (2014): 472–74. http://dx.doi.org/10.15623/ijret.2014.0306088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hockney, Roger. "Synchronization and communication overheads on the LCAP multiple FPS-164 computer system." Parallel Computing 9, no. 3 (1989): 279–90. http://dx.doi.org/10.1016/0167-8191(89)90113-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Schneider, Timo, Robert Gerstenberger, and Torsten Hoefler. "Application-oriented ping-pong benchmarking: how to assess the real communication overheads." Computing 96, no. 4 (2013): 279–92. http://dx.doi.org/10.1007/s00607-013-0330-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Song, Zhen, Yu Gu, Tianyi Li, et al. "ADGNN: Towards Scalable GNN Training with Aggregation-Difference Aware Sampling." Proceedings of the ACM on Management of Data 1, no. 4 (2023): 1–26. http://dx.doi.org/10.1145/3626716.

Full text
Abstract:
Distributed computing is promising to enable large-scale graph neural network (GNN) model training. However, care is needed to avoid excessive computational and communication overheads. Sampling is promising in terms of enabling scalability, and sampling techniques have been proposed to reduce training costs. However, online sampling introduces large overheads, and while offline sampling that is done only once can eliminate such overheads, it instead introduces information loss and accuracy degradation. Thus, existing sampling techniques are unable to improve simultaneously both efficiency and
APA, Harvard, Vancouver, ISO, and other styles
39

Ullah, Ikram, and Munam Ali Shah. "SGO: Semantic Group Obfuscation for Location-Based Services in VANETS." Sensors 24, no. 4 (2024): 1145. http://dx.doi.org/10.3390/s24041145.

Full text
Abstract:
Location privacy is an important parameter to be addressed in the case of vehicular ad hoc networks. Each vehicle frequently communicates with location-based services to find the nearest location of interest. The location messages communicated with the location server may contain sensitive information like vehicle identity, location, direction, and other headings. A Location-Based Services (LBS) server is not a trusted entity; it can interact with an adversary, compromising the location information of vehicles on the road and providing a way for an adversary to extract the future location trac
APA, Harvard, Vancouver, ISO, and other styles
40

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads,
APA, Harvard, Vancouver, ISO, and other styles
41

Ashraf, Zeeshan, Adnan Sohail, and Muddesar Iqbal. "Design and Implementation of Lightweight Certificateless Secure Communication Scheme on Industrial NFV-Based IPv6 Virtual Networks." Electronics 13, no. 13 (2024): 2649. http://dx.doi.org/10.3390/electronics13132649.

Full text
Abstract:
With the fast growth of the Industrial Internet of Everything (IIoE), computing and telecommunication industries all over the world are moving rapidly towards the IPv6 address architecture, which supports virtualization architectures such as Network Function Virtualization (NFV). NFV provides networking services like routing, security, storage, etc., through software-based virtual machines. As a result, NFV reduces equipment costs. Due to the increase in applications on Industrial Internet of Things (IoT)-based networks, security threats have also increased. The communication links between peo
APA, Harvard, Vancouver, ISO, and other styles
42

Vatambeti, Ramesh, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, and K. Venkateswara Rao. "Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network." International Journal of Computer Network and Information Security 15, no. 3 (2013): 78–89. http://dx.doi.org/10.5815/ijcnis.2023.03.06.

Full text
Abstract:
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion
APA, Harvard, Vancouver, ISO, and other styles
43

Thakre, Neha, Nidhi Pateriya, Gulafsha Anjum, Divyanshi Tiwari, and Aastha Mishra. "Federated Learning Trade-Offs: A Systematic Review of Privacy Protection and Performance Optimization." International Journal of Innovative Research in Computer and Communication Engineering 11, no. 10 (2023): 11332–43. http://dx.doi.org/10.15680/ijircce.2023.1110049.

Full text
Abstract:
Federated Learning (FL) is an innovative approach in Artificial Intelligence (AI) that enhances privacy by avoiding centralized data storage and performing learning directly on users' devices. However, this method introduces new privacy concerns, especially during the training phase and when exchanging parameters between servers and clients. Although various privacy-preserving solutions have been developed to address these issues, integrating these mechanisms can lead to increased communication and computational overheads. This, in turn, may affect data utility and the performance metrics of l
APA, Harvard, Vancouver, ISO, and other styles
44

Panigrahi, T., P. M. Pradhan, G. Panda, and B. Mulgrew. "Block Least Mean Squares Algorithm over Distributed Wireless Sensor Network." Journal of Computer Networks and Communications 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/601287.

Full text
Abstract:
In a distributed parameter estimation problem, during each sampling instant, a typical sensor node communicates its estimate either by the diffusion algorithm or by the incremental algorithm. Both these conventional distributed algorithms involve significant communication overheads and, consequently, defeat the basic purpose of wireless sensor networks. In the present paper, we therefore propose two new distributed algorithms, namely, block diffusion least mean square (BDLMS) and block incremental least mean square (BILMS) by extending the concept of block adaptive filtering techniques to the
APA, Harvard, Vancouver, ISO, and other styles
45

Lai, W. K., and J. M. Chung. "Analysing and reducing the protocol overheads of MPOA in the intra-IASG communication." IEE Proceedings - Computers and Digital Techniques 147, no. 4 (2000): 255. http://dx.doi.org/10.1049/ip-cdt:20000555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ki, Seongmin, and Sungju Ryu. "Reducing Communication Overheads in MD Simulations: A Novel Floating-point Data Compression Approach." JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE 25, no. 3 (2025): 301–10. https://doi.org/10.5573/jsts.2025.25.3.301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

CHONG, FREDERIC T., SHAMIK D. SHARMA, ERIC A. BREWER, and JOEL SALTZ. "MULTIPROCESSOR RUNTIME SUPPORT FOR FINE-GRAINED, IRREGULAR DAGS." Parallel Processing Letters 05, no. 04 (1995): 671–83. http://dx.doi.org/10.1142/s012962649500059x.

Full text
Abstract:
We examine multiprocessor runtime support for fine-grained, irregular directed acyclic graphs (DAGs) such as those that arise from sparse-matrix triangular solves. We conduct our experiments on the CM-5, whose lower latencies and active-message support allow us to achieve unprecedented speedups for a general multiprocessor. Where as previous implementations have maximum speedups of less than 4 on even simple banded matrices, we are able to obtain scalable performance on extremely small and irregular problems. On a matrix with only 5300 rows, we are able to achieve scalable performance with a s
APA, Harvard, Vancouver, ISO, and other styles
48

Zhao, Tianxiao, Chunbo Luo, Jianming Zhou, Dechun Guo, Ning Chen, and Pablo Casaseca-de-la-Higuera. "DoA Prediction Based Beamforming with Low Training Overhead for Highly-Mobile UAV Communication with Cellular Networks." Applied Sciences 10, no. 13 (2020): 4420. http://dx.doi.org/10.3390/app10134420.

Full text
Abstract:
In supporting communications with unmanned aerial vehicles (UAVs) as aerial user equipments (aUEs) in cellular systems, the current beamforming schemes based on channel state estimation are facing severe challenges from the pilot contamination effect, especially in 5G and future networks where the cell size becomes small and the user density is high. Beamforming schemes based on signal direction of arrival (DoA) are regarded as a highly promising alternative to solve this problem. However, to achieve optimal performance for DoA-based beamforming, the error to DoA estimation during pilot signal
APA, Harvard, Vancouver, ISO, and other styles
49

Kurdi, Hassan, and Vijey Thayananthan. "A Multi-Tier MQTT Architecture with Multiple Brokers Based on Fog Computing for Securing Industrial IoT." Applied Sciences 12, no. 14 (2022): 7173. http://dx.doi.org/10.3390/app12147173.

Full text
Abstract:
With the rapid growth of internet-connected devices and their resource-constrained capabilities, the current authentication mechanisms are unable to meet the complex IoT application requirements, such as in the Industrial Internet of Things (IIoT), due to the increased computation, communication, and storage overhead arising from these mechanisms. In the IIoT, machine-to-machine (M2M) communication is an underlying technology where devices (e.g., sensors, actuators, and controllers) can be enabled to exchange information autonomously; thus, the massive data generated by these devices can incre
APA, Harvard, Vancouver, ISO, and other styles
50

Heshem, A. El Zouka. "PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS." International Journal of Network Security & Its Applications (IJNSA) 7, no. 4 (2015): 31–41. https://doi.org/10.5281/zenodo.8300141.

Full text
Abstract:
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks. Any attacker can have complete control over the communication channel, listen to phone calls, read email, and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a middleware security system that aims to protect the GSM communication channel and minimize the computational overheads of the provided authentication and cryptographic schemes of the network The proposed scheme supports an end-to-end secured communication between the GSM mobile devices and the
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!