Learn More
The large-scale mobile Underwater Wireless Sensor Network (UWSN) is a useful networking paradigm to explore underwater environments. The characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, and floating node mobility are significantly different from wireless sensor networks. In this paper, we propose a new efficient(More)
—We present an optimistic crash recovery technique without any communication overhead during normal operations of the distributed system. Our technique does not append any information to the application messages, it does not suffer from the domino effect, and each processor rolls back at most once during recovery. We present three distributed rollback(More)
Trees are a common structure to represent the inter-task communication pattern of a parallel algorithm. In this paper, we consider the embedding a complete binary tree in a star graph with the objective of minimizing congestion and dilation. We develop two embeddings: i) a congestion-free, dilation-2, load-1 embedding of a level-p binary tree, and ii) a(More)
In this paper, a new approach is proposed to reduce handoff operation in IEEE 802.16e network. Traditional mobile approaches, such as mobile IPv6 (MIPv6) and hierarchical MIPv6 (HMIPv6), can support smoothly handoff. These approach, ,unfortunately, suffer large handoff delay and packet lost in macro mobility for mobile users. With the aid of the partner(More)
Recently, wormhole routers with multi-destination capability have been proposed to support fast multicast in a multi-computer network. In this paper, we develop a new multicasting model for such networks based on the concept of Euler path/circuit in graph theory. The model can support multiple concurrent multicasts freely from deadlock and can be applied to(More)
The arrangement graph A nYk is not only a generalization of star graph (n À k ˆ 1), but also more ¯exible. In this investigation, we elucidate the problem of embedding of multiple spanning trees in an arrangement graph with the objective of congestion-free. This result is to report how to exploit 2…n À k† edge disjoint spanning trees in an arrangement(More)
Recovery from transient processor failures can be achieved by using optimistic message logging and checkpointing. The faulty processorsroll back, and some/all of the non-faulty processors also may have to roll back. This paper formulates the rollback problem as a closure problem. A centralized closure algorithm is presented together with two efficient(More)
In this paper, we propose three strategies for building a multicasting tree in a high-speed network. These strategies can be used in any network topology. The rst one is based on voting, the second based on constructing a minimum spanning tree, and the third based on repeatedly constructing multiple minimum spanning trees. To demonstrate the eeectiveness of(More)
Near Field Communication (NFC) is a two-way communication technology based on RFID. NFC-equipped phone (NFC phone) that embed the NFC technology into cellular phone earns increasingly attention in business, such as payment and ticketing. This paper presents a novel architecture for NFC phone driven context-aware smart spaces. Based on the architecture,(More)