Results 1 - 10
of
882
Message Fragmentation for a Chain of Disrupted Links
"... Abstract—We investigate the problem of estimating the transmission time of fragmented messages over multiple disrupted links. We build a system model for the case where a single message is sent over a chain of links and the disruptions in these links are identically and independently distributed. Fo ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—We investigate the problem of estimating the transmission time of fragmented messages over multiple disrupted links. We build a system model for the case where a single message is sent over a chain of links and the disruptions in these links are identically and independently distributed
Loopy belief propagation for approximate inference: An empirical study. In:
- Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract
-
Cited by 676 (15 self)
- Add to MetaCart
X passes to its parent U; is given by: and the message X sends to its child Y j is given by: k;Cj For noisy-or links between parents and children, there exists an analytic expression for 1r( x) and Ax ( u;) that avoids the exhaustive enumeration over parent config urations We made a slight
Message Fragmentation for Disrupted Links
"... Abstract—In networks with unstable links the connection between the sender and the receiver may be cut before the entire message has been transmitted. Quantization of the message into blocks before its transmission, enables message fragments consisting of one or more such blocks to be transmitted su ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
messages in disrupted networks; and (2) develop methods to analytically estimate the mean transmission time of fragmented message within a basic system model for the case of transmission over a single disrupted link. I.
Message Fragmentation in Disruptive Networks
, 2009
"... Abstract—In networks with unstable links fragmentation of a message into smaller pieces before transmission can reduce message blocking due to disrupted transmission and increase the utilization of contact durations; thus increasing the connectivity of the network for large messages. In this paper, ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Abstract—In networks with unstable links fragmentation of a message into smaller pieces before transmission can reduce message blocking due to disrupted transmission and increase the utilization of contact durations; thus increasing the connectivity of the network for large messages. In this paper
Message Fragmentation in Opportunistic DTNs
- in Proc. of IEEE WoWMoM
, 2008
"... Delay-tolerant networking is used for communication in challenged environments such as MANETs, in which links are unstable and end-to-end paths between communicating nodes may not exist. Messages may be significantly larger than packets in IP networks. Large messages lead to longer transfer times re ..."
Abstract
-
Cited by 17 (8 self)
- Add to MetaCart
rendering it more likely that a link breaks in the middle of a message transfer. This motivates investigating how to support partial message transfers through fragmentation. In this paper, we formulate fragmentation independent of routing algorithms, introduce several fragmentation strategies, and evaluate
Implementing References as Chains of Links
- In 1992 Int. Workshop on Object Orientation and Operating Systems
, 1992
"... The goal of this work is to provide uniform transparent access to objects, be they local, remote, persistent, or mobile. In this way, we facilitate distributed programming and persistence management. An object (the target) is accessed through a reference. A reference retains its meaning as it is cop ..."
Abstract
-
Cited by 14 (4 self)
- Add to MetaCart
as it is copied, stored, passed in messages, and as the target migrates. A reference is used to invoke a procedure (or method) of the target object. References support standard single-space targets, as well as fragmented objects [9]. The cost of using a reference to a local object is comparable to the cost
Using redundancy to cope with failures in a delay tolerant network
- in Proceedings of ACM SIGCOMM
, 2005
"... We consider the problem of routing in a delay tolerant net-work (DTN) in the presence of path failures. Previous work on DTN routing has focused on using precisely known network dy-namics, which does not account for message losses due to link failures, buffer overruns, path selection errors, unsched ..."
Abstract
-
Cited by 146 (4 self)
- Add to MetaCart
We consider the problem of routing in a delay tolerant net-work (DTN) in the presence of path failures. Previous work on DTN routing has focused on using precisely known network dy-namics, which does not account for message losses due to link failures, buffer overruns, path selection errors
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
. Globalization is highly selective. It proceeds by linking up all that, according to dominant interests, has value anywhere in the planet, and discarding anything (people, rms, territories, resources) which has no value or becomes devalued, in a variable geometry of creative destruction and destructive creation
Precise gene disruption in Saccharomyces cerevisiae by double fusion polymerase chain reaction
- Yeast
, 1995
"... We adapted a fusion polymerase chain reaction (PCR) strategy to synthesize gene disruption alleles of any sequenced yeast gene of interest. The first step of the construction is to amplify sequences flanking the reading frame we want to disrupt and to amplify the selectable marker sequence. Then we ..."
Abstract
-
Cited by 20 (8 self)
- Add to MetaCart
We adapted a fusion polymerase chain reaction (PCR) strategy to synthesize gene disruption alleles of any sequenced yeast gene of interest. The first step of the construction is to amplify sequences flanking the reading frame we want to disrupt and to amplify the selectable marker sequence. Then we
Superfluid current disruption in a chain of weakly coupled Bose-Einstein condensates
- New Journal of Physics
, 2003
"... Abstract. We report the experimental observation of the disruption of the superfluid atomic current flowing through an array of weakly linked Bose-Einstein condensates. The condensates are trapped in an optical lattice superimposed on a harmonic magnetic potential. The dynamical response of the syst ..."
Abstract
-
Cited by 19 (2 self)
- Add to MetaCart
Abstract. We report the experimental observation of the disruption of the superfluid atomic current flowing through an array of weakly linked Bose-Einstein condensates. The condensates are trapped in an optical lattice superimposed on a harmonic magnetic potential. The dynamical response
Results 1 - 10
of
882