Learn More
Call admission control (CAC) is one of challenging issues for quality of service (QoS) provisioning in mobile multimedia network communication systems. CAC can be defined as the system that restricts the network access based on resource availability. A new call is admitted if enough idle resources are available in order to meet the QoS requirements of the(More)
For MPP's to solve new and interesting problems, they must support the development of sophisticated algorithms on very large data sets. Successful development depends strongly on the speed of the execute-x cycle. Sequential machines cannot provide suuciently fast execution of large problems, but many programming systems available on MPP's today neglect the(More)
Like other distributed systems, unattended sensor networks need to be balanced not only by load but also in terms of energy. Sensor networks are expected to live long. Lifetime can be maximized if and only if a balanced network can be formed. In this research work we first identify the tasks, that a sensor node accomplishes in its life time. Based on those,(More)
Moving toward Smart Grid systems is becoming a priority for power service providers in many countries. Effective communications constitute a crucial component for the successful implementation of Smart Grid. This paper introduces a communication framework which can be used to classify and integrate the various communication networking entities in a Smart(More)
DISPO is a Distributed Prolog Virtual Machine for interpreting and executing Prolog programs through distribution and multi-threading. It is a distributed version of a standard Prolog interpreter designed for exploiting OR-parallelism and pipe-lined AND parallelism. Some distinctive features of DISPO is that it speeds up the execution of Prolog programs and(More)
Sensor networks enable a wide range of applications in both military and civilian domains. However, the deployment scenarios, the functionality requirements, and the limited capabilities of these networks expose them to a wide-range of attacks against control traffic (such as wormholes, Sybil attacks, rushing attacks, etc). In this paper we propose a(More)
  • 1