![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Stochastic model-driven capacity planning framework for multi-access edge computing
Multi-access edge computing (MEC) offers cloud computing capabilities and IT services situated at the Radio Access Network (RAN) in the mobile users’ proximity. Applications could offload their computation-int...
-
Article
Effects benefits and hazards of honey bee venom on wound healing and serum biochemical changes in alloxan-induced diabetic rats
Honey bee (Apis mellifera) venom (BV) contains many enzymes and peptides used to treat various diseases, including cancer, neurodegenerative diseases, and chronic or autoimmune diseases. However, its adverse effe...
-
Chapter and Conference Paper
Modeling and Performance Evaluation of Map Layer Loading in Mobile Edge Computing Paradigm
Mobile Edge Computing (MEC) is a promising technology to prepare cloud services in the vicinity of mobile radio network. Mobile users could offload their tasks to the MEC servers to acquire results in minimum ...
-
Article
Analytical performance models for resource allocation schemes of cloudlet in mobile cloud computing
In the cloudlet architecture of mobile cloud computing (MCC), the mobile users offload their resource-intensive tasks to a local cloud (i.e., Cloudlet) via WiFi connections, to overcome the resource-constrained n...
-
Article
Analytical performance model for mobile network operator cloud
The characteristics of mobile cloud computing (MCC) including, mobility, the instability of 3G/WiFi connections, and the complexity of virtualization, make the prediction of performance challenging. To deal wi...
-
Article
Strategic Network Formation Game for Energy Consumption Balancing
Creation of hot-spots is unavoidable, in multihop wireless sensor networks using the least power (or shortest path) routing method. This happens due to the irregularity of underlying network structures. Since ...
-
Article
Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
High-speed wireless networks such as IEEE 802.11n have been introduced based on IEEE 802.11 to meet the growing demand for high-throughput and multimedia applications. It is known that the medium access contro...
-
Article
Neighbor Selection Game in Wireless Ad Hoc Networks
In wireless ad hoc networks, there is no infrastructure to enforce cooperation between nodes. As a result, nodes may act selfishly when running network protocols to conserve their energy resources as much as p...
-
Chapter and Conference Paper
A Novel Community Detection Algorithm for Privacy Preservation in Social Networks
Developed online social networks are recently being grown and popularized tremendously, influencing some life aspects of human. Therefore, privacy preservation is considered as an essential and crucial issue i...
-
Chapter and Conference Paper
Delay-Constrained Optimized Packet Aggregation in High-Speed Wireless Ad Hoc Networks
In recent years, high-speed WLANs are introduced to service growing demand of delay-sensitive and multimedia applications. To improve efficiency at the MAC layer of high-speed WLANs, few researches have tried ...
-
Chapter and Conference Paper
Network Layer Challenges of IEEE 802.11n Wireless Ad Hoc Networks
Recent demands toward high-speed wireless networks are growing. IEEE 802.11n, as the latest standard toward achieving higher speeds, aims to enhance IEEE 802.11 for higher throughputs. There are few works whic...
-
Chapter and Conference Paper
A Risk-Reward Competitive Analysis for Online Routing Algorithms in Delay Tolerant Networks
Delay Tolerant Networks (DTNs) suffer from frequent disruptions and partitioning. Because of dynamic environment and lack of knowledge about the whole network topology, routing is quiet challenging in DTNs. Pr...
-
Chapter and Conference Paper
Map-Based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point
Sub-Nyquist sampling techniques for Wireless Sensor Networks (WSN) are gaining increasing attention as an alternative method to capture natural events with desired quality while minimizing the number of active...
-
Chapter and Conference Paper
Ontology Matching Using Vector Space
Interoperability of heterogeneous systems on the Web will be achieved through an agreement between the underlying ontologies. Ontology matching is an operation that takes two ontologies and determines their se...
-
Article
Effect of the contention window size on performance and fairness of the IEEE 802.11 standard
IEEE 802.11 is a widely used standard for MAC and PHY layers of WLANs. Unfortunately, the access methods offered in this standard cannot support QoS (Quality of Service) for real-time traffics. Using multimedi...
-
Chapter
Critical Transmission Range for Connectivity in Ad-Hoc Networks
One of the challenging problems in the ad hoc networks is how to determine the critical transmission range for each communicating node to achieve a connected network with minimum power consumption and communic...
-
Chapter and Conference Paper
Accelerating Computation Bounded IP Lookup Methods by Adding Simple Instructions
Most of software-based IP lookup methods are memory bounded so their speed depends on memory technology. However, some of them are computation bounded, meaning that their memory time is less than computation. ...
-
Chapter and Conference Paper
Improving Data Distribution in Branching Point Based Multicast Protocols
In several multicast routing protocols, the multicast distribution tree is identified by its branching points where multicast data is delivered from one branching point to another using native unicast. As a re...
-
Chapter and Conference Paper
Linkcast: Fast and Scalable Multicast Routing Protocol
The current multicast routing protocols require state maintenance in the on-tree routers in order to forward multicast packet properly. Therefore, the routers memory may be easily saturated when there are very...
-
Chapter and Conference Paper
A Fast Group Communication Mechanism for Large Scale Distributed Objects
Group communication undoubtedly is a useful paradigm for many distributed object systems. Provision of a fast and scalable group communication mechanism can considerably improve the efficiency of these systems...