This paper evaluates and compares the performance of two approaches for locating an agent in a mobile agent environment. The first approach dynamically creates a chain of forwarders to locate a moving agent, whereas the second one relies on a centralized server to perform this task. Based on a Markov chain analysis, we compute the performance...
-
September 2002 (v1)Journal articleUploaded on: February 23, 2023
-
April 2002 (v1)Report
This paper evaluates and compares the performance of two approaches for locating an agent (e.g. a code) in a mobile agent environment. The first approach dynamically creates a chain of forwarders to locate a moving agent whereas the second one relies on a centralized server to perform this task. Based on a Markov chain analysis, we compute the...
Uploaded on: December 3, 2022 -
June 15, 2002 (v1)Conference paper
International audience
Uploaded on: December 4, 2022 -
February 2009 (v1)Conference paper
Nous considérons dans cet article le problème d'ordonnancement distribué dans les réseaux sans-fil. En raison des interférences dans ce type de réseau, ne peuvent être activés simultanément que des liens n'interférant pas entre eux. Par exemple dans un modèle primaire, on ne peut activer que des liens deux à deux non adjacents. Nous nous pla\c...
Uploaded on: December 3, 2022 -
April 19, 2009 (v1)Conference paper
This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes forms a delay tolerant (ad hoc) network (DTN). The goal of the paper is to study efficient ways for distributing evolving files within DTNs and for managing dynamically...
Uploaded on: December 3, 2022 -
2008 (v1)Report
This work focuses on a class of distributed storage systems whose content may evolve over time. Each component or node of the storage system is mobile and the set of all nodes forms a delay tolerant (ad hoc) network (DTN). The goal of the paper is to study efficient ways for distributing evolving files within DTNs and for managing dynamically...
Uploaded on: December 3, 2022 -
December 2004 (v1)Conference paper
International audience
Uploaded on: December 4, 2022 -
2022 (v1)Journal article
Caching systems have long been crucial for improving the performance of a wide variety of network and web based online applications. In such systems, end-to-end application performance heavily depends on the fraction of objects transfered from the cache, also known as the cache hit probability. Many cache eviction policies have been proposed...
Uploaded on: December 3, 2022 -
August 2022 (v1)Journal article
We study a quantum switch that distributes tripartite entangled states to sets of users. The entanglement switching process requires two steps: first, each user attempts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement for a...
Uploaded on: December 3, 2022 -
June 2020 (v1)Journal article
We study a quantum switch that distributes maximally entangled multipartite states to sets of users. e entanglement switching process requires two steps: rst, each user a empts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement...
Uploaded on: December 4, 2022 -
March 5, 2021 (v1)Journal article
We study a quantum switch serving a set of users in a star topology. The function of the switch is to create bipartite or tripartite entangled state among users at the highest possible rates at a fixed ratio. We model a set of randomized switching policies. Discovering that some are better than others, we present analytical results for the case...
Uploaded on: March 25, 2023 -
June 14, 2010 (v1)Conference paper
This work investigates distributed transmission scheduling in wireless networks. Due to interference constraints, "neighboring links" cannot be simultaneously activated, otherwise transmissions will fail. Here, we consider any binary model of interference. We follow the model described by Bui, Sanghavi, and Srikant in SBS07,SBS09. We suppose...
Uploaded on: December 3, 2022 -
2020 (v1)Journal article
International audience
Uploaded on: December 4, 2022 -
2008 (v1)Report
This work investigates distributed transmission scheduling in wireless networks. Due to interference constraints, "neighboring links'' cannot be simultaneously activated, otherwise transmissions will fail. Here, we consider any binary model of interference. We follow the model described by Bui, Sanghavi, and Srikant in SBS09,SBS07. We suppose...
Uploaded on: December 3, 2022 -
October 9, 2012 (v1)Conference paper
Many researchers have been working on the performance analysis of caching in Information-Centric Networks (ICNs) under various replacement policies like Least Recently Used (LRU), FIFO or Random (RND). However, no exact results are provided, and many approximate models do not scale even for the simple network of two caches connected in tandem....
Uploaded on: December 2, 2022 -
November 2021 (v1)Journal article
Botnets such as Mirai use insecure home devices to conduct distributed denial of service attacks on the Internet infrastructure. Although some of those attacks involve large amounts of traffic, they are generated from a large number of homes, which hampers their early detection. In this paper, our goal is to answer the following question: what...
Uploaded on: December 4, 2022 -
October 28, 2024 (v1)Conference paper
This paper investigates the damage that an adversary can effect while remaining covert in the presence of the Cumulative Sum (CuSum) procedure. An adversary is covert if the time to detection is on the same order as the time to false alarm. Damage is given as an increasing function of the KL-divergence of the adversarial actions and the normal...
Uploaded on: October 22, 2024