Sample records for networks networks networks

  1. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  2. Network Chimera Network Chimera

    E-Print Network [OSTI]

    Network Chimera Network Chimera Objective Chimera aims to understand how the network properties enough with limited resources. The Chimera team is cross-disciplinary, and includes computer scientists Impact The original hypothesis of Chimera was that a physical network could be reduced to a graph

  3. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  4. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    growth in network traffic to storage over the years. Network Traffic Growth Network Distribution 2010 Network Distribution 2010 Network Distribution 2009 Network Distribution...

  5. Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks

    E-Print Network [OSTI]

    Kjellström, Hedvig

    Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization 1 Artificial Neural Networks Properties Applications Classical Examples Biological Background 2 Single Layer

  6. Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks

    E-Print Network [OSTI]

    Kjellström, Hedvig

    Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks #12;Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization 1 Artificial Neural Networks Properties Applications Classical Examples Biological Background 2

  7. Network Economics Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    Performance/Efficiency Measure with Applications to a Variety of Network Systems · Transportation Network with transportation as the unifying application. #12;Subway Network Railroad Network Iridium Satellite Constellation Network Satellite and Undersea Cable Networks Duke Energy Gas Pipeline Network Transportation

  8. Efficient network camouflaging in wireless networks 

    E-Print Network [OSTI]

    Jiang, Shu

    2006-04-12T23:59:59.000Z

    when protected networks are wireless networks, such as sensor networks and mobile ad hoc networks. The reason is that wireless networks are typically subject to resource constraints (e.g. bandwidth, power supply) and possess some unique characteristics...

  9. Sensor networks for social networks

    E-Print Network [OSTI]

    Farry, Michael P. (Michael Patrick)

    2006-01-01T23:59:59.000Z

    This thesis outlines the development of software that makes use of Bayesian belief networks and signal processing techniques to make meaningful inferences about real-world phenomena using data obtained from sensor networks. ...

  10. Cognitive Radio Networks as Sensor Networks

    E-Print Network [OSTI]

    Bandari, Dorna; Yang, Seung R.; Zhao, Yue; Pottie, Gregory

    2007-01-01T23:59:59.000Z

    assuming the cognitive radios know their own coordinates.Networked Sensing Cognitive Radio Networks As SensorIntroduction: Cognitive Radio (CR) Networks The Need For

  11. Continuous Time Bayesian Network Approximate Inference and Social Network Applications

    E-Print Network [OSTI]

    Fan, Yu

    2009-01-01T23:59:59.000Z

    Modeling Social Network Dynamics . . . . . . . . . . . .85 Social Network Dynamic85 Static Social Network Models . . . . . . . . . . . . .

  12. NetworksNetworks andand hypernetworkshypernetworks 33

    E-Print Network [OSTI]

    Vilela Mendes, Rui

    NetworksNetworks andand hypernetworkshypernetworks 33 NetworksNetworks inin economyeconomy Rui.1 #12;TheThe networksnetworks ofof thethe corporatecorporate eliteelite TheThe Elite 16Elite 16 inin informationinformation inin thethe networknetwork !! CorporateCorporate governancegovernance practicespractices

  13. Routing in hybrid networks

    E-Print Network [OSTI]

    Gupta, Avinash

    2001-01-01T23:59:59.000Z

    Hybrid networks are networks that have wired as well as wireless components. Several routing protocols exist for traditional wired networks and mobile ad-hoc networks. However, there are very few routing protocols designed for hybrid networks...

  14. Peer-to-Peer Networks Social Networks

    E-Print Network [OSTI]

    Marbach, Peter

    Overview Peer-to-Peer Networks Social Networks Research Hybrid Peer-to-Peer Networks P2P and Online Social Networks: The Best Has Yet to Come Peter Marbach, Dept. of Computer Science University of Toronto P2P and Online Social Networks: The Best Has Yet to Come #12;Overview Peer-to-Peer Networks Social

  15. Secure and efficient wireless networks

    E-Print Network [OSTI]

    Bellardo, John Michael

    2006-01-01T23:59:59.000Z

    CA Systems and Network Administrator California Integrationgives the campus network administrators complete admissionin engineered networks, enterprise administrators try to

  16. Network Embedded Systems Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    Battery Energy Reserve Manager = Bank Each task requests an account with conditions W ­ fraction Tracking 9 #12;Virtual Battery: An Energy Reserve Abstraction for Embedded Sensor Networks Qing Cao of real battery allocated N ­ number of energy installments L ­ expected lifetime of the task C

  17. Network coding for robust wireless networks

    E-Print Network [OSTI]

    Kim, MinJi, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth ...

  18. Network sampling and classification: An investigation of network model representations

    E-Print Network [OSTI]

    Needleman, Daniel

    only one or two connectivity patterns of an observed network--such as degree distribution, or diameterNetwork sampling and classification: An investigation of network model representations Edoardo M: Connectivity pattern Network type Network metrics Network sampling Network classification Methods

  19. Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilverNepheline crystallization inNetCDF Network

  20. Networks, Information & Social Capital

    E-Print Network [OSTI]

    Aral, Sinan

    2008-01-26T23:59:59.000Z

    This paper investigates how information flows enable social networks to constitute social capital. By analyzing

  1. FES Science Network Requirements

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    FES Science Network Requirements Report of the Fusion Energy Sciences Network Requirements Workshop Conducted March 13 and 14, 2008 #12;FES Science Network Requirements Workshop Fusion Energy Sciences Program Office, DOE Office of Science Energy Sciences Network Gaithersburg, MD ­ March 13 and 14, 2008 ESnet

  2. algebraic network coding: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and robust networking. For networks which are restricted to using linear network codes, we find necessary and sufficient conditions for the feasibility of any given set of...

  3. autoassociative neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convolutional Neural Networks 5 Mixture of density networks Englebienne, Gwenn 98 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  4. attractor neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convolutional Neural Networks 5 Mixture of density networks Englebienne, Gwenn 138 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  5. analog neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convolutional Neural Networks 5 Mixture of density networks Englebienne, Gwenn 118 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  6. attractor neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convolutional Neural Networks 5 Mixture of density networks Englebienne, Gwenn 138 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  7. Survivability Considerations in Wireless Networks

    E-Print Network [OSTI]

    Ning, Jianxia

    2012-01-01T23:59:59.000Z

    pre-configured by the network administrator, otherwise thedetermined by the network administrator according to if thebut also allow a network administrator to determine the

  8. Mobility in Wireless Sensor Networks

    E-Print Network [OSTI]

    Mehta, Ankur Mukesh

    2012-01-01T23:59:59.000Z

    Channel-Specific Wireless Sensor Network Path Data”. In:Average Power in Wireless Sensor Networks through Data Ratedesign space of wireless sensor networks”. In: IEEE Wireless

  9. Interconnection networks

    DOE Patents [OSTI]

    Faber, V.; Moore, J.W.

    1988-06-20T23:59:59.000Z

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs GAMMA/sub d/(k) with degree d, diameter k, and (d + 1)exclamation/ (d /minus/ k + 1)exclamation processors for each d greater than or equal to k and GAMMA/sub d/(k, /minus/1) with degree d /minus/ 1, diameter k + 1, and (d + 1)exclamation/(d /minus/ k + 1)exclamation processors for each d greater than or equal to k greater than or equal to 4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network GAMMA/sub d/(k, /minus/1) is provided, no processor has a channel connected to form an edge in a direction delta/sub 1/. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations. 9 figs.

  10. Solving stochasic PERT networks exactly using hybrid Bayesian networks

    E-Print Network [OSTI]

    Cinicioglu, Esma N.; Shenoy, Prakash P.

    2006-09-16T23:59:59.000Z

    In this paper, we describe how a stochastic PERT network can be formulated as a Bayesian network. We approximate such PERT Bayesian network by mixtures of Gaussians hybrid Bayesian networks. Since there exists algorithms for solving mixtures...

  11. When Network Coding improves the Performances of Clustered Wireless Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    When Network Coding improves the Performances of Clustered Wireless Networks that significantly increases the performances of clustering algorithms in wireless multi-hop networks-XOR coding; wireless multi-hop networks; clustering I. INTRODUCTION Partitioning nodes

  12. Networking Call for Residential Network Members Peer Exchange...

    Energy Savers [EERE]

    Networking Call for Residential Network Members Peer Exchange Call Networking Call for Residential Network Members Peer Exchange Call March 12, 2015 12:30PM to 2:0...

  13. Characterization of network traffic on a local area network

    E-Print Network [OSTI]

    Suravarapu, Prasad Devi

    1995-01-01T23:59:59.000Z

    In this thesis we analyze network traffic on a local area network in an academic environment. We analyze the trace based on transport-level and network-level applications. Networks conversations are studied using the newly developed packet...

  14. analysis network sevan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Francesco Keywords: Knowledge Base, Social Network Analysis, Variety, Coherence, Industry lifecycles; exploration network analysis (SNA) within an evolutionary framework, to...

  15. Distributed control of coded networks

    E-Print Network [OSTI]

    Zhao, Fang, Ph. D. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    The introduction of network coding has the potential to revolutionize the way people operate networks. For the benefits of network coding to be realized, distributed solutions are needed for various network problems. In ...

  16. Dynamic NetworksDynamic Networks ApplicationsApplications

    E-Print Network [OSTI]

    Nagurney, Anna

    of today. #12;The study of the efficient operation on transportation networks dates to ancient Rome telecommunication networks and energy networks. No longer are networks independent of one another but critically. #12;MBTA Network #12;Major Highway and Railroad Networks in the US #12;Water Freight Transport Routes

  17. Bayesian networks for reconstructing transcriptional regulatory networks

    E-Print Network [OSTI]

    Borenstein, Elhanan

    distribution [koller and Friedman] Let G be a Bayesian network graph over the variables X1,...,Xn. We say that a distribution P factorizes according to G if P can be expressed as: A Bayesian network is a pair (G,P) where P, L | I G S | I, D I D : #12;7 13 The Student Bayesian network Joint distribution P(I,D,G,S,L) = 14

  18. Using Neural Networks 

    E-Print Network [OSTI]

    Gabel, S.

    2003-01-01T23:59:59.000Z

    A neural network approach is employed for estimating key efficiency parameters in a gas turbine engine. The concept is demonstrated within a limited operating region for a given engine. The neural network is developed to estimate certain...

  19. Class network routing

    DOE Patents [OSTI]

    Bhanot, Gyan (Princeton, NJ); Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2009-09-08T23:59:59.000Z

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  20. Beyond Network Equivalence

    E-Print Network [OSTI]

    Koetter, Ralf

    In earlier work, we described an equivalence result for network capacity. Roughly, that result is as follows. Given a network of noisy, memoryless, point-to-point channels, replace each channel by a noiseless, memoryless ...

  1. Network coded wireless architecture

    E-Print Network [OSTI]

    Katti, Sachin Rajsekhar

    2008-01-01T23:59:59.000Z

    Wireless mesh networks promise cheap Internet access, easy deployment, and extended range. In their current form, however, these networks suffer from both limited throughput and low reliability; hence they cannot meet the ...

  2. Connectibles : tangible social networking

    E-Print Network [OSTI]

    Kalanithi, Jeevan James

    2007-01-01T23:59:59.000Z

    This thesis presents "Connectibles," an instantiation of a tangible social network, a new type of social network application rooted in physical objects and real world social behavior. This research is inspired by social ...

  3. Using Neural Networks

    E-Print Network [OSTI]

    Gabel, S.

    A neural network approach is employed for estimating key efficiency parameters in a gas turbine engine. The concept is demonstrated within a limited operating region for a given engine. The neural network is developed to estimate certain...

  4. Social Network and Communications Institutional Change Principle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network and Communications Institutional Change Principle Social Network and Communications Institutional Change Principle Federal agencies can use social networks and...

  5. Membership Criteria: Better Buildings Residential Network | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Membership Criteria: Better Buildings Residential Network Membership Criteria: Better Buildings Residential Network Membership Criteria: Better Buildings Residential Network...

  6. Complex Networked Control Systems

    E-Print Network [OSTI]

    buildings, modern control systems are increasingly incorporating communication networks in feedback loops [5Complex Networked Control Systems W e live and operate in a networked world. We drive to work on the performance of feedback control systems [5], [6]. Signifi- cant attention is focused on devising local

  7. Financial Networks Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    in decision-making; constraints on resources: human, financial, natural, time, etc.; global reach of many, Transmission Lines Water, Gas, Oil, Electricity Anna Nagurney Financial Networks #12;Interstate Highway System Freight Network World Oil Routes Natural Gas Flows Network Systems Internet Traffic Anna Nagurney

  8. Virtual Gateway Network Documentation

    E-Print Network [OSTI]

    Segall, Adrian

    Virtual Gateway Network Documentation Composed By: Stiven Andre Nikolai Gukov #12;Table of contents.3) VGNET as a network manager 2) VGNET explained 2.1) One PC with multiple Internet access points. 2 both routers. 1.3) VGNET as a network manager Let's look at figure 3 again. The perfect scenario we may

  9. Recommendation in Social Networks

    E-Print Network [OSTI]

    Ester, Martin

    Recommendation in Social Networks Martin Ester Simon Fraser University Tutorial at RecSys 2013 October 12 , 2013 #12;Martin Ester: Recommendation in Social Networks, Tutorial at RecSys 2013 2 Outline · Introduction · Recommendation in social networks · Memory based approaches for item recommendation · Model

  10. Network topology analysis.

    SciTech Connect (OSTI)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01T23:59:59.000Z

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  11. 4. Network Flows 4.2 The Network Simplex Algorithm

    E-Print Network [OSTI]

    Krumke, Sven O.

    Contents 4. Network Flows 4.2 The Network Simplex Algorithm 1 #12;Starting Solutions Extend Set EB as all new edges, EL as all old edges 2 #12;Network Simplex Part I Require: Network N = (V , E #12;Network Simplex Part II 6: Adjust x: xij := xij + if (i, j) C+ es xij - if (i, j) C- es xij

  12. Flow-based XOR Network Coding for Lossy Wireless Networks

    E-Print Network [OSTI]

    Wu, Jie

    1 Flow-based XOR Network Coding for Lossy Wireless Networks Abdallah Khreishah, Issa M. Khalil, Pouya Ostovari, and Jie Wu Abstract--A practical way for maximizing the throughput of a wireless network. We also extend our 2-hop relay networks results to multihop wireless networks by providing a linear

  13. Distributed Network Monitoring with Bounded Link Utilization in IP Networks

    E-Print Network [OSTI]

    Li, Li Erran

    1 Distributed Network Monitoring with Bounded Link Utilization in IP Networks Li Li Center multiple pollers located at different points in the network. However, using distributed pollers could for Networking Research Lucent Bell Labs erranlli@dnrc.bell-labs.com Marina Thottan Center for Networking

  14. Chapters 6 & 8 Wireless Networks

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Chapters 6 & 8 Wireless Networks and Security Computer Networking:ATop Down Approach 6th edition.W. Ross, All Rights Reserved Wireless, Mobile Networks 6-1 #12;Wireless, Mobile Networks 6-2 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone

  15. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  16. Potential Networks, Contagious Communities, and Understanding Social Network Structure

    E-Print Network [OSTI]

    Schoenebeck, Grant

    2013-01-01T23:59:59.000Z

    In this paper we study how the network of agents adopting a particular technology relates to the structure of the underlying network over which the technology adoption spreads. We develop a model and show that the network of agents adopting a particular technology may have characteristics that differ significantly from the social network of agents over which the technology spreads. For example, the network induced by a cascade may have a heavy-tailed degree distribution even if the original network does not. This provides evidence that online social networks created by technology adoption over an underlying social network may look fundamentally different from social networks and indicates that using data from many online social networks may mislead us if we try to use it to directly infer the structure of social networks. Our results provide an alternate explanation for certain properties repeatedly observed in data sets, for example: heavy-tailed degree distribution, network densification, shrinking diameter...

  17. Random Walks and Electrical Networks Electrical Network

    E-Print Network [OSTI]

    Jonathon Peterson

    2008-01-30T23:59:59.000Z

    Feb 4, 2008 ... Random Walks and Electrical Networks. Hitting Probabilities and Voltage. Voltage. Connect a 1V battery to nodes a and b. ix,y is the current ...

  18. Efficient network camouflaging in wireless networks

    E-Print Network [OSTI]

    Jiang, Shu

    2006-04-12T23:59:59.000Z

    Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers such that important...

  19. COMPRESSIVE LINEAR NETWORK CODING FOR EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    COMPRESSIVE LINEAR NETWORK CODING FOR EFFICIENT DATA COLLECTION IN WIRELESS SENSOR NETWORKS fields, Wireless Sensor Networks Index Terms-- Belief Propagation, Network Coding, Fi- nite fields, Wireless Sensor Networks 1. INTRODUCTION A Wireless Sensor Network (WSN) consists of spatially dis

  20. On Benefits of Network Coding in Bidirected Networks and Hyper-networks

    E-Print Network [OSTI]

    Li, Zongpeng

    . It was shown that network coding helps increase the throughput and reduce the cost of data transmission to study the coding advantage in two types of parameterized networks, with richer modeling power. The firstOn Benefits of Network Coding in Bidirected Networks and Hyper-networks Xunrui Yin, Xin Wang, Jin

  1. Reconfigureable network node

    DOE Patents [OSTI]

    Vanderveen, Keith B. (Tracy, CA); Talbot, Edward B. (Livermore, CA); Mayer, Laurence E. (Davis, CA)

    2008-04-08T23:59:59.000Z

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  2. activity network sespan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    social networks, a lot Gionis, Aristides 19 Evolving dynamical networks with transient cluster activity Nonlinear Sciences (arXiv) Summary: We study transient sequential dynamics...

  3. artifical neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, Nos. 1-2 Cytological Diagnosis Based on Fuzzy Neural Networks max combined with a fuzzy neural network approach, for the discrimination of benign from malignant gastric...

  4. artifical neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, Nos. 1-2 Cytological Diagnosis Based on Fuzzy Neural Networks max combined with a fuzzy neural network approach, for the discrimination of benign from malignant gastric...

  5. artificial neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    neural networks, for phosphene localisation are used Rattray, Magnus 63 Dynamic Pattern Recognition in Sport by Means of Artificial Neural Networks Computer Technologies...

  6. artificial neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    neural networks, for phosphene localisation are used Rattray, Magnus 63 Dynamic Pattern Recognition in Sport by Means of Artificial Neural Networks Computer Technologies...

  7. analyzing interactome networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    into an organization's structure and dynamics. The creation and analysis of sample social media network datasets is described to illustrate types of enterprise networks and...

  8. adolescent social networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    into an organization's structure and dynamics. The creation and analysis of sample social media network datasets is described to illustrate types of enterprise networks and...

  9. animal social networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    into an organization's structure and dynamics. The creation and analysis of sample social media network datasets is described to illustrate types of enterprise networks and...

  10. Modeling and Control Interactive Networks

    E-Print Network [OSTI]

    Amin, S. Massoud

    Modeling and Control of Complex Interactive Networks By Massoud Amin E nergy, telecommunications complex networks, geographi- cally dispersed, nonlinear, and interacting both among themselves, distributed, highly interactive networks, nor does any such entity have the ability to evaluate, monitor

  11. Survivability Considerations in Wireless Networks

    E-Print Network [OSTI]

    Ning, Jianxia

    2012-01-01T23:59:59.000Z

    Forensics Analysis of Packet Losses in Wireless Networks 2.1Neighbor Discovery in 60 GHz Indoor Wireless Networks 4.1in Wireless Networks . . . . . . . . . . . . . 4.2.4

  12. FUNDAMENTAL PERFORMANCE LIMITS OF WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    Li, Baochun

    FUNDAMENTAL PERFORMANCE LIMITS OF WIRELESS SENSOR NETWORKS ZHIHUA HU, BAOCHUN LI Abstract. Understanding the fundamental performance limits of wireless sensor networks is critical towards. Key words. Wireless sensor networks, network capacity, network lifetime. 1. Introduction. When

  13. JAMMING COMMUNICATION NETWORKS UNDER COMPLETE ...

    E-Print Network [OSTI]

    2007-02-08T23:59:59.000Z

    This paper describes a problem of interdicting/jamming communication networks in un- ... Jamming communication networks is an important problem but has.

  14. Water Network Design by MINLP

    E-Print Network [OSTI]

    2008-02-12T23:59:59.000Z

    We propose a solution method for a water-network optimization problem using a ... The optimal design of a WDN (Water Distribution Network) consists, in its ...

  15. Comparative analysis of collaboration networks

    SciTech Connect (OSTI)

    Progulova, Tatiana; Gadjiev, Bahruz [International University for Nature, Society and Man, 19 Universitetskaya Street, Dubna, 141980 (Russian Federation)

    2011-03-14T23:59:59.000Z

    In this paper we carry out a comparative analysis of the word network as the collaboration network based on the novel by M. Bulgakov 'Master and Margarita', the synonym network of the Russian language as well as the Russian movie actor network. We have constructed one-mode projections of these networks, defined degree distributions for them and have calculated main characteristics. In the paper a generation algorithm of collaboration networks has been offered which allows one to generate networks statistically equivalent to the studied ones. It lets us reveal a structural correlation between word network, synonym network and movie actor network. We show that the degree distributions of all analyzable networks are described by the distribution of q-type.

  16. Honors Faculty Mentor Network

    E-Print Network [OSTI]

    Arnold, Jonathan

    @uga.edu ELIZABETH MANLEY, Administrative Assistant eym@uga.edu KAREN NEWCOMB, Network Administrator knewcombHonors Faculty Mentor Network Providing Students with Friends on the Faculty Mentor Handbook 2006@uga.edu REBECCA CHENEY, Program Assistant rcheney@uga.edu PAULA LANGSTON, Administrative Associate fellows

  17. Computer Networks Rutgers University

    E-Print Network [OSTI]

    Badrinath, B. R.

    Ed. (2010), by James F. Kurose and Keith W. Ross. l TCP/IP Illustrated, Volume 1: The Protocols by W. Richard Stevens. l Unix Network Programming: Networking APIs: Sockets and XTI (Volume 1) by W. Richard Stevens. l Advanced Programming in the Unix Environment by W. Richard Stevens, Addison-Wesley, 1993. l I

  18. Financial Networks Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    World Oil Routes Natural Gas Flows Network Systems Internet Traffic Anna Nagurney Financial Networks #12 Gothenburg University Gothenburg, Sweden and John F. Smith Memorial Professor Director ­ Virtual Center, 2012 School of Business, Economics and Law Gothenburg University, Sweden Anna Nagurney Financial

  19. Analyzing Network-Wide Interactions Using Graphs: Techniques and Applications

    E-Print Network [OSTI]

    Iliofotou, Marios

    2011-01-01T23:59:59.000Z

    IP networks. They enable network administrators to gain in-Network Managment Network Administrator Figure 1.1: Basica valuable tool for network administrators to detect

  20. Network on a Chip: Modeling Wireless Networks with Asynchronous VLSI

    E-Print Network [OSTI]

    Manohar, Rajit

    for Internet-scale networks (for instance, see [2, 3, 5]), as well as the design of flexible and compositionalNetwork on a Chip: Modeling Wireless Networks with Asynchronous VLSI Rajit Manohar and Clinton, Ithaca NY 14853 Abstract We introduce the notion of a network-on-a-chip: a programmable, asynchronous

  1. Byzantine Modification Detection in Multicast Networks with Random Network Coding

    E-Print Network [OSTI]

    Médard, Muriel

    network coding. Each exogenous source packet is augmented with a flexible number of hash symbols of the random network code, and can have the same (or greater) transmission capacity compared to the sourceByzantine Modification Detection in Multicast Networks with Random Network Coding Tracey Ho, Ben

  2. Introduction to Network Science 1 Introduction to Network Science

    E-Print Network [OSTI]

    Safro, Ilya

    of nuclear power plant Actors, Reactors and More #12;Introduction to Network Science 12 #12;Introduction A 80 B 60 C 0 F #12;Introduction to Network Science 2 Recommended Books (optional) #12;Introduction to Network Science 3 Recommended Books (optional) #12;Introduction to Network Science 4 facebook #12

  3. Social Network Analysis Plugin (SNAP) for Mesh Networks

    E-Print Network [OSTI]

    Kotz, David

    networks, called Mesh-Mon, that can help a team of system administrators (sysadmins) manage a wireless. In a wireless mesh network context, a system administrator should pay attention to "bridging nodes" sinceSocial Network Analysis Plugin (SNAP) for Mesh Networks Soumendra Nanda BAE Systems Burlington, MA

  4. UCIT Data Network Standards Campus Wireless Network Standard

    E-Print Network [OSTI]

    Habib, Ayman

    UCIT Data Network Standards Campus Wireless Network Standard Classification IT Infrastructure Table.1. Standardization of the U of C's 802.11 wireless networks and frequency bands is required to insure availability of the wireless network to the campus community. Standards of use will improve the wireless service and help

  5. Prolonging Network Lifetime for Target Coverage in Sensor Networks

    E-Print Network [OSTI]

    Liang, Weifa

    limits the network lifetime and impairs the network quality. To prolong the network lifetime, energy-efficiency network used for monitoring targets. One efficient method of reducing the energy consumption of sensors Department of Computer Science, The Australian National University Canberra, ACT 0200, Australia Abstract

  6. INTERACTING WITH SOCIAL NETWORKS TO IMPROVE HEALTHCARE BODY SENSOR NETWORKS

    E-Print Network [OSTI]

    Miles, Will

    INTERACTING WITH SOCIAL NETWORKS TO IMPROVE HEALTHCARE BODY SENSOR NETWORKS by DAVID BAUSCHLICHER monitor and record data while minimizing the energy expenditure of nodes in the BSN. Social networking to a social network creates the unique ability to share health related data with other users through social

  7. New Paradigm for Seismic Networks: Crowd-Sourced Seismic Networks,

    E-Print Network [OSTI]

    Greer, Julia R.

    #12;New Paradigm for Seismic Networks: Crowd-Sourced Seismic Networks, including Buildings Tom Egill Hauksson #12;SCSN: what does it encompass? · ~360 Seismic Stations · ~60 stations from partners SCSN/SCEDC total of ~26 FTE's #12;Crowd Sourced Networks · Current broadband seismic network

  8. Mobile RobotsSensor Networks Autonomous Sensor/Actuator Networks

    E-Print Network [OSTI]

    Breu, Ruth

    mobile networks with dynamic topology Optimized task allocation and communication based on application and energy constraints Secure communication and data management in mobile sensor networks Solution SpaceMobile RobotsSensor Networks Autonomous Sensor/Actuator Networks ROSES RObot assisted SEnsor

  9. Collective network routing

    DOE Patents [OSTI]

    Hoenicke, Dirk

    2014-12-02T23:59:59.000Z

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  10. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Paradox and Evolutionary Variational Inequalities · A New Network Performance/Efficiency Measure;Subway Network Railroad Network Iridium Satellite Constellation Network Satellite and Undersea Cable Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components

  11. Operations Research and the Captivating Study of Networks

    E-Print Network [OSTI]

    Nagurney, Anna

    Variational Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical;Subway Network Railroad Network Iridium Satellite Constellation Network Satellite and Undersea Cable Networks Duke Energy Gas Pipeline Network Transportation, Communication, and Energy Networks #12;Components

  12. SYNTHESIS LECTURES ON COMMUNICATION NETWORKS

    E-Print Network [OSTI]

    Huang, Jianwei

    Pricing Jean Walrand, Series Editor Jianwei Huang Lin Gao SYNTHESIS LECTURES ON COMMUNICATION NETWORKS CM& Morgan Claypool Publishers& Wireless Network Pricing Jean Walrand, Series Editor Jianwei Huang Lin Gao SYNTHESIS LECTURES ON COMMUNICATION NETWORKS CM& Morgan Claypool Publishers& Wireless Network Pricing Jean

  13. Mesoscale Analyses of Fungal Networks

    E-Print Network [OSTI]

    Lee, Sang Hoon; Porter, Mason A

    2014-01-01T23:59:59.000Z

    We give a brief application of mesoscopic response functions (MRFs) to a large set of networks of fungi and slime moulds. We construct "structural networks" by estimating cord conductances (which yield edge weights) from experimental data and "functional networks" by calculating edge weights based on how much nutrient traffic is predicted to occur on each edge. Both types of networks have the same topology, and we compute MRFs for both families of networks to illustrate two different ways of constructing taxonomies to compare large sets of fungal and slime-mould networks to each other. We demonstrate that network taxonomies allow objective groupings of networks across species, treatments, and laboratories. We believe that the groupings that we have derived through our structural and functional taxonomic analyses of fungal networks could be of considerable assistance to biologists in their attempts to capture the impact of treatment combinations on network behaviour.

  14. Optical Network Testbeds Workshop

    SciTech Connect (OSTI)

    Joe Mambretti

    2007-06-01T23:59:59.000Z

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking technologies. Several years ago, when many of these optical networking research topics were first being investigated, they were the subject of controversial debate. The new techniques challenged many long-held concepts related to architecture and technology. However, today all major networking organizations are transitioning toward infrastructure that incorporates these new concepts. This progress has been assisted through the series of Optical Networking Testbed Workshops (ONT). The first (ONT1) outlined a general framework of key issues and topics and developed a series of recommendations (www.nren.nasa.gov/workshop7). The second (ONT2) developed a common vision of optical network technologies, services, infrastructure, and organizations (www.nren.nasa.gov/workshop8). Processes that allow for a common vision encourage widespread deployment of these types of resources among advanced networking communities. Also, such a shared vision enables key concepts and technologies to migrate from basic research testbeds to wider networking communities. The ONT-3 workshop built on these earlier activities by expanding discussion to include additional considerations of the international interoperability and of greater impact of optical networking technology on networking in general. In accordance with this recognition, the workshop confirmed that future-oriented research and development is indispensable to fundamentally change the current Internet architecture to create a global network incorporating completely new concepts. The workshop also recognized that the first priority to allow for this progress is basic research and development, including international collaborative activities, which are important for the global realization of interoperability of a new generation architecture.

  15. A quantum access network

    E-Print Network [OSTI]

    Bernd Fröhlich; James F. Dynes; Marco Lucamarini; Andrew W. Sharpe; Zhiliang Yuan; Andrew J. Shields

    2014-09-02T23:59:59.000Z

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.

  16. Vehicle Technologies Office: National Idling Reduction Network...

    Office of Environmental Management (EM)

    Idling Reduction Network News Archives Vehicle Technologies Office: National Idling Reduction Network News Archives The National Idling Reduction Network brings together trucking...

  17. Reverse Engineering User Behaviors From Network Traffic

    E-Print Network [OSTI]

    Xie, Guowu

    2013-01-01T23:59:59.000Z

    Hunter enable ISPs, network administrators and researchersto help ISPs and network administrators to better understandHunter, ISPs and network administrators can learn which

  18. Wireless Sensor Networks for Home Health Care

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Wireless Sensor Networks for Home Health Care Chris R.Cooperation between wireless sensor networks and existingapplications of wireless sensor networks. In this paper we

  19. Special Issue on “Wireless Sensor Networks

    E-Print Network [OSTI]

    Yao, Kung; Zhang, Qian; Zhao, Qing

    2009-01-01T23:59:59.000Z

    Special Issue on “Wireless Sensor Networks” Kung Yao & Qianand tracking, etc. Wireless sensor networks utilize theaspects of wireless sensor networks. The first paper, “

  20. Data Transport Control in Wireless Sensor Networks

    E-Print Network [OSTI]

    Zhang, Hongwei; Naik, Vinayak S

    2008-01-01T23:59:59.000Z

    Congestion in Wireless Sensor Networks. ACM SenSys SandeepJohn Anderson (2002). Wireless Sensor Networks for HabitatWorkshop on Wireless Sensor Networks and Applications Miklos

  1. Better Buildings Residential Network Case Study: Partnerships...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Network Case Study: Partnerships Better Buildings Residential Network Case Study: Partnerships Better Buildings Residential Network Case Study: Partnerships, from the U.S....

  2. Fact Sheet: Better Buildings Residential Network

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fact Sheet BETTER BUILDINGS RESIDENTIAL NETWORK Learn more at betterbuildings.energy.govbbrn What Is the Residential Network? The Better Buildings Residential Network connects...

  3. BES Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Tierney, Brian; Dart, Eli; Biocca, A.; Carlson, R.; Chen, J.; Cotter, S.; Dattoria, V.; Davenport, J.; Gaenko, A.; Kent, P.; Lamm, M.; Miller, S.; Mundy, C.; Ndousse, T.; Pederson, M.; Perazzo, A.; Popescu, R.; Rouson, D.; Sekine, Y.; Sumpter, B.; Wang, C.-Z.; Whitelam, S.; Zurawski, J.

    2011-02-01T23:59:59.000Z

    The Energy Sciences Network (ESnet) is the primary provider of network connectivityfor the US Department of Energy Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of the Office ofScience programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years.

  4. Thermal network reduction

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1983-06-01T23:59:59.000Z

    A method is presented for reducing the number of elements required in a thermal network representation of a building. The method is based on matching the actual building response at two frequencies, the diurnal response and 3-day response. The procedure provides a straightforward methodology for combining all the various materials inside a discrete building zone into a few nodes while retaining a high degree of accuracy in the dynamic response. An example is given showing a comparison between a large network and the reduced network.

  5. Thermal network reduction

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1983-01-01T23:59:59.000Z

    A method is presented for reducing the number of elements required in a thermal network representation of a building. The method is based on matching the actual building response at two frequencies, the diurnal response and 3-day response. The procedure provides a straightforward methodology for combining all the various materials inside a discrete building zone into a few nodes while retaining a high degree of accuracy in the dynamic response. An example is given showing a comparison between a large network and the reduced network.

  6. Control over Wireless NetworksControl over Wireless Networks Karl Henrik Johansson

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    Control over Wireless NetworksControl over Wireless Networks Karl Henrik Johansson School wireless networksOutline: Control over wireless networks · Motivating examples · Benefits and barriersMotivation for control over wireless networkscontrol over wireless networks · Wireless industrial automation

  7. The expandable network disk

    E-Print Network [OSTI]

    Muthitacharoen, Athicha, 1976-

    2008-01-01T23:59:59.000Z

    This thesis presents a virtual disk cluster called END, the Expandable Network Disk. END aggregates storage on a cluster of servers into a single virtual disk. END's main goals are to offer good performance during normal ...

  8. ENVIRONMENTAL LAW NETWORK

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ENVIRONMENTAL LAW NETWORK INTERNATIONAL RÉSEAU INTERNATIONAL DE DROIT DE L´ENVIRONNEMENT INTERNATIONALES NETZWERK UMWELTRECHT EU Enforcement Policy of Community Environmental law as presented in the Commission Communication on implementing European Community Environmental law Marta Ballesteros The direct

  9. BES Science Network Requirements

    E-Print Network [OSTI]

    Dart, Eli

    2011-01-01T23:59:59.000Z

    the Directors of the Office of Science, Office of AdvancedOffice of Basic Energy Sciences. This is LBNL report LBNL-BES Science Network Requirements Report of the Basic Energy

  10. Search using social networks

    E-Print Network [OSTI]

    Ammar, Ammar (Ammar T.)

    2010-01-01T23:59:59.000Z

    In this thesis, we present an approach to the problem of personalized web search which makes use of the searcher's social network, in addition to the hyper-link based score used in most search engines. This combination of ...

  11. Covert Communication Networks

    E-Print Network [OSTI]

    Nix, Timothy Glen

    2013-08-02T23:59:59.000Z

    of participation in the network to both other members of the group and external eavesdroppers, and finally on resilience against disconnection. In this dissertation, we describe the challenges and requirements for such a system. We consider the topologies...

  12. Causal networks in EIA

    SciTech Connect (OSTI)

    Perdicoulis, Anastassios [Departamento de Engenharia Biologica e Ambiental, Universidade de Tras-os-Montes e Alto Douro, Apartado 1013, 5001-801 Vila Real (Portugal)]. E-mail: tasso@utad.pt; Glasson, John [Oxford Brookes University, Oxford Institute for Sustainable Development, School of the Built Environment, Headington Campus, Gipsy Lane, Oxford OX3 0BP (United Kingdom)]. E-mail: jglasson@brookes.ac.uk

    2006-08-15T23:59:59.000Z

    Causal networks have been used in Environmental Impact Assessment (EIA) since its early days, but they appear to have a minimal use in modern practice. This article reviews the typology of causal networks in EIA as well as in other academic and professional fields, verifies their contribution to EIA against the principles and requirements of the process, and discusses alternative scenarios for their future in EIA.

  13. Network line plotting

    E-Print Network [OSTI]

    Pry, William Freeman

    1967-01-01T23:59:59.000Z

    has been described correctly. When the network has been determined to be "clean", oz free of error, several minimum path trees are built (test trees) and checked. Test trees are examined to insure that lirk hnpedances and distances are correct... and that the minimum paths have been correctly calculated. Having insured that the test trees are clean, the trees for all zones are built, the network loaded with the desired tzip volumes, and the resulting loaded netv. orl- analyzed. While the calculated results...

  14. Optimization in Networks

    E-Print Network [OSTI]

    Adilson E. Motter; Zoltan Toroczkai

    2007-07-07T23:59:59.000Z

    The recent surge in the network modeling of complex systems has set the stage for a new era in the study of fundamental and applied aspects of optimization in collective behavior. This Focus Issue presents an extended view of the state of the art in this field and includes articles from a large variety of domains where optimization manifests itself, including physical, biological, social, and technological networked systems.

  15. Cooperative Diversity Routing in Wireless Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan and Majid Ghaderi Department routing, cooperative commu- nication, cooperative diversity, wireless networks. I. INTRODUCTION Energy efficiency is a challenging problem in wireless networks, especially in ad hoc and sensor networks, where

  16. Collaborative Firewalling in Wireless Networks Mahmoud Taghizadeh

    E-Print Network [OSTI]

    Liu, Alex X.

    Collaborative Firewalling in Wireless Networks Mahmoud Taghizadeh Department of ECE Michigan State elements to enforce access policies in computer networks. Open network architecture, shared wireless medium for wireless networks in which nodes collaboratively perform packet filtering to address resource squandering

  17. Wireless sensor networks for measuring traffic

    E-Print Network [OSTI]

    Varaiya, Pravin

    Wireless sensor networks for measuring traffic University of California, Berkeley Sing Yiu Cheung, Sinem Coleri, and Pravin Varaiya 2 Outline · Traffic measurement · Wireless Sensor Networks · Vehicle wireless sensor networks compete? 7 Outline · Traffic measurement · Wireless Sensor Networks · Vehicle

  18. Foundations of Artificial Intelligence Neural Networks

    E-Print Network [OSTI]

    Qu, Rong

    Foundations of Artificial Intelligence Neural Networks Building Artificial Brains #12;Background Session 2 Software Demonstrations Real World Applications #12;Artificial Neural Networks ... consists to operate. Wiki #12;Relationship between Artificial Neural Networks & the Human Brain Neural networks

  19. Semantic Social Network Analysis, a concrete case

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Semantic Social Network Analysis, a concrete case Guillaume Erétéo, Orange Labs, guillaume permitting a high degree of interaction between participants, and social network analysis (SNA) seeks) shared by the members of these networks. These enriched representations of social networks, combined

  20. atm networks pc: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ATM networks at the cell level. Owing to its object Gburzynski, Pawel 18 PMS: a PVC Management System for ATM Networks CiteSeer Summary: . Reported in this paper is the...

  1. amacrine cell network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    but also helps improve the QoS of the core network and saves the carriers' OPEX and CAPEX on their core networks. Ouyang, Ye; 10.5121ijngn.2010.2105 2010-01-01 64 The...

  2. Building a Network Simulation Model of the Teragrid Network

    E-Print Network [OSTI]

    Jiang, Wen

    Building a Network Simulation Model of the Teragrid Network Thomas Hacker Preston Smith* Computer are building largescale cyberinfrastructure systems, which couple computing, storage, data publishing is increasingly powered by simulation and analysis that combines high performance computers

  3. adaptive dynamic networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Epidemic dynamics on an adaptive network Condensed Matter (arXiv) Summary: Many real world networks are...

  4. Introduction to Network Analysis 1 Introduction to Network Analysis

    E-Print Network [OSTI]

    Safro, Ilya

    of movie actors Transportation and logistics network of nuclear power plant Actors, Reactors and More #12). Points Grade 92 A 80 B 60 C 0 F #12;Introduction to Network Analysis 2 Recommended Books (optional

  5. area network system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of the experiment. The network management system is implemented based on a commercial SCADA system (PVSS II). We show here how a large scale network can be monitored and...

  6. Flexible application driven network striping over Wireless Wide Area Networks

    E-Print Network [OSTI]

    Qureshi, Asfandyar

    2005-01-01T23:59:59.000Z

    Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping systems usually employ a packet scheduling policy ...

  7. Advanced Queueing Theory Networks of queues

    E-Print Network [OSTI]

    Boucherie, Richard J.

    , partial balance, product-form distribution, blocking, insensitivity, BCMP networks, mean-value analysis equations · Closed network: · Open network: #12;9closed network : equilibrium distribution · Theorem: The equilibrium distribution for the closed Jackson network containing N jobs is · Proof #12;10closed network

  8. Vulnerability Analysis of Complex Networks from Transportation Networks to

    E-Print Network [OSTI]

    Nagurney, Anna

    and Electric Power Supply Chains Anna Nagurney John F. Smith Memorial Professor Department of Finance to Dynamic Networks · Where Are We Now? An Empirical Case Study to Real-World Electric Power Supply ChainsVulnerability Analysis of Complex Networks from Transportation Networks to the Internet

  9. Towards Data-Driven Declarative Networking in Delay Tolerant Networks

    E-Print Network [OSTI]

    Tucci, Sara

    .lastname}@cl.cam.ac.uk ABSTRACT A Delay Tolerant Network (DTN) provides content storage as a core network service across The Internet has transformed the way we seek information, but it requires strong connectivity with no tolerance are sparsely distributed so that networks are often partitioned due to geographical separation or node movement

  10. Critical Infrastructure Networks and Supernetworks: New Tools for Dynamics,

    E-Print Network [OSTI]

    Nagurney, Anna

    Critical Infrastructure Networks and Supernetworks: New Tools for Dynamics, Network Efficiency Variational Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical, Communication, and Energy Networks #12;Components of Common Physical Networks Network System Nodes Links Flows

  11. Computer Systems and Network Manager

    E-Print Network [OSTI]

    Computer Systems and Network Manager Fort Collins, Colorado POSITION A Computers Systems activities. RESPONSIBILITIES The successful candidate will perform computer systems and network administration, including computer hardware, systems software, applications software, and all configurations

  12. Video transmission over wireless networks 

    E-Print Network [OSTI]

    Zhao, Shengjie

    2005-08-29T23:59:59.000Z

    Compressed video bitstream transmissions over wireless networks are addressed in this work. We first consider error control and power allocation for transmitting wireless video over CDMA networks in conjunction with multiuser detection. We map a...

  13. Video transmission over wireless networks

    E-Print Network [OSTI]

    Zhao, Shengjie

    2005-08-29T23:59:59.000Z

    Compressed video bitstream transmissions over wireless networks are addressed in this work. We first consider error control and power allocation for transmitting wireless video over CDMA networks in conjunction with multiuser detection. We map a...

  14. Designing Flexible Heat Exchanger Networks

    E-Print Network [OSTI]

    Gautam, R.; Chen, H. S.; Wareck, J. S.

    Procedures and methods used for designing flexible heat exchanger networks are described. The general approach consists of defining the flexibility problem as a set of cases. Pinch Technology is then used to develop an initial network design...

  15. DISTRIBUTED SHORTESTPATH PROTOCOLS TIMEDEPENDENT NETWORKS

    E-Print Network [OSTI]

    Orda, Ariel

    DISTRIBUTED SHORTEST­PATH PROTOCOLS for TIME­DEPENDENT NETWORKS Ariel Orda Raphael Rom+ Department and the dynamic behavior of networks, since a distributed solution enables constant tracking of changes 32000 October 1992 Revised May 1994, October 1995 ABSTRACT This paper addresses algorithms for networks

  16. VEHICLE NETWORKS: ACHIEVING REGULAR FORMATION

    E-Print Network [OSTI]

    VEHICLE NETWORKS: ACHIEVING REGULAR FORMATION MADALENA CHAVES, ROBERT DAY, LUCIA GOMEZ a network of vehicles exchanging information among themselves with the intention of achieving a specified the performance of the vehicle network. A stochastic model for information flow is also considered, allowing

  17. Relational Dynamic Bayesian Networks

    E-Print Network [OSTI]

    Domingos, P; Weld, D; 10.1613/jair.1625

    2011-01-01T23:59:59.000Z

    Stochastic processes that involve the creation of objects and relations over time are widespread, but relatively poorly studied. For example, accurate fault diagnosis in factory assembly processes requires inferring the probabilities of erroneous assembly operations, but doing this efficiently and accurately is difficult. Modeled as dynamic Bayesian networks, these processes have discrete variables with very large domains and extremely high dimensionality. In this paper, we introduce relational dynamic Bayesian networks (RDBNs), which are an extension of dynamic Bayesian networks (DBNs) to first-order logic. RDBNs are a generalization of dynamic probabilistic relational models (DPRMs), which we had proposed in our previous work to model dynamic uncertain domains. We first extend the Rao-Blackwellised particle filtering described in our earlier work to RDBNs. Next, we lift the assumptions associated with Rao-Blackwellization in RDBNs and propose two new forms of particle filtering. The first one uses abstracti...

  18. Synchronization in complex networks

    SciTech Connect (OSTI)

    Arenas, A.; Diaz-Guilera, A.; Moreno, Y.; Zhou, C.; Kurths, J.

    2007-12-12T23:59:59.000Z

    Synchronization processes in populations of locally interacting elements are in the focus of intense research in physical, biological, chemical, technological and social systems. The many efforts devoted to understand synchronization phenomena in natural systems take now advantage of the recent theory of complex networks. In this review, we report the advances in the comprehension of synchronization phenomena when oscillating elements are constrained to interact in a complex network topology. We also overview the new emergent features coming out from the interplay between the structure and the function of the underlying pattern of connections. Extensive numerical work as well as analytical approaches to the problem are presented. Finally, we review several applications of synchronization in complex networks to different disciplines: biological systems and neuroscience, engineering and computer science, and economy and social sciences.

  19. aco-bp neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Convolutional Neural Networks 5 Mixture of density networks Englebienne, Gwenn 87 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  20. Valley Entrepreneurs' Network (VEN) Monthly Network Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsing Maps toValidatingCloudPoissonVEN Monthly Network

  1. Data Network Equipment Energy Use and Savings Potential in Buildings

    E-Print Network [OSTI]

    Lanzisera, Steven

    2010-01-01T23:59:59.000Z

    and interviews with network administrators and serviceinterviews with network administrators, home network owners,selected by the network administrator. Switches and routers

  2. Cubic-based 3-D Localization for Wireless Sensor Networks

    E-Print Network [OSTI]

    Shwe, Hnin Yu; Chong, Peter HJ

    2013-01-01T23:59:59.000Z

    Scheme in Stereo Wireless Sensor Networks,” in Advances infor mobile wireless sensor networks," Ad Hoc Networks, vol.and B. D. O. Anderson, "Wireless sensor network localization

  3. ASCR Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Tierney, Brian

    2009-08-24T23:59:59.000Z

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the US Department of Energy Office of Science, the single largest supporter of basic research in the physical sciences in the United States. In support of the Office of Science programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In April 2009 ESnet and the Office of Advanced Scientific Computing Research (ASCR), of the DOE Office of Science, organized a workshop to characterize the networking requirements of the programs funded by ASCR. The ASCR facilities anticipate significant increases in wide area bandwidth utilization, driven largely by the increased capabilities of computational resources and the wide scope of collaboration that is a hallmark of modern science. Many scientists move data sets between facilities for analysis, and in some cases (for example the Earth System Grid and the Open Science Grid), data distribution is an essential component of the use of ASCR facilities by scientists. Due to the projected growth in wide area data transfer needs, the ASCR supercomputer centers all expect to deploy and use 100 Gigabit per second networking technology for wide area connectivity as soon as that deployment is financially feasible. In addition to the network connectivity that ESnet provides, the ESnet Collaboration Services (ECS) are critical to several science communities. ESnet identity and trust services, such as the DOEGrids certificate authority, are widely used both by the supercomputer centers and by collaborations such as Open Science Grid (OSG) and the Earth System Grid (ESG). Ease of use is a key determinant of the scientific utility of network-based services. Therefore, a key enabling aspect for scientists beneficial use of high performance networks is a consistent, widely deployed, well-maintained toolset that is optimized for wide area, high-speed data transfer (e.g. GridFTP) that allows scientists to easily utilize the services and capabilities that the network provides. Network test and measurement is an important part of ensuring that these tools and network services are functioning correctly. One example of a tool in this area is the recently developed perfSONAR, which has already shown its usefulness in fault diagnosis during the recent deployment of high-performance data movers at NERSC and ORNL. On the other hand, it is clear that there is significant work to be done in the area of authentication and access control - there are currently compatibility problems and differing requirements between the authentication systems in use at different facilities, and the policies and mechanisms in use at different facilities are sometimes in conflict. Finally, long-term software maintenance was of concern for many attendees. Scientists rely heavily on a large deployed base of software that does not have secure programmatic funding. Software packages for which this is true include data transfer tools such as GridFTP as well as identity management and other software infrastructure that forms a critical part of the Open Science Grid and the Earth System Grid.

  4. TKN Telecommunication Networks Group

    E-Print Network [OSTI]

    Wichmann, Felix

    Lightpaths 10 3.3 Differences to related work 10 4 Scenarios 11 4.1 Networks and traffic 11 4.2 Power and CapEx components 15 5.3 Costs of energy savings 16 6 Conclusion 19 References 20 #12;2 List of Acronyms CapEx

  5. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S. (Richland, WA); TeGrotenhuis, Ward E. (Kennewick, WA); Whyatt, Greg A. (West Richland, WA)

    2007-09-18T23:59:59.000Z

    Various aspects and applications of microsystem process networks are described. The design of many types of Microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  6. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S. (Richland, WA); TeGrotenhuis, Ward E. (Kennewick, WA); Whyatt, Greg A. (West Richland, WA)

    2006-10-24T23:59:59.000Z

    Various aspects and applications of microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having exergetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  7. Microsystem process networks

    DOE Patents [OSTI]

    Wegeng, Robert S [Richland, WA; TeGrotenhuis, Ward E [Kennewick, WA; Whyatt, Greg A [West Richland, WA

    2010-01-26T23:59:59.000Z

    Various aspects and applications or microsystem process networks are described. The design of many types of microsystems can be improved by ortho-cascading mass, heat, or other unit process operations. Microsystems having energetically efficient microchannel heat exchangers are also described. Detailed descriptions of numerous design features in microcomponent systems are also provided.

  8. Caching in wireless networks

    E-Print Network [OSTI]

    Niesen, Urs

    We consider the problem of delivering content cached in a wireless network of n nodes randomly located on a square of area n. In the most general form, this can be analyzed by considering the 2[superscript n] timesn-dimensional ...

  9. Sensor Networks and Consensus

    E-Print Network [OSTI]

    Schenato, Luca

    3 Dic 2009 1/32 Sensor Networks and Consensus An application: Localization and Tracking Distributed Sensors Calibration Randomized Kalman Filter Distributed Kalman Smoother Simone Del Favero PhD Thesis: Localization and Tracking Distributed Sensors Calibration Randomized Kalman Filter Distributed Kalman Smoother

  10. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  11. Lattice Gauge Tensor Networks

    E-Print Network [OSTI]

    Pietro Silvi; Enrique Rico; Tommaso Calarco; Simone Montangero

    2014-10-12T23:59:59.000Z

    We present a unified framework to describe lattice gauge theories by means of tensor networks: this framework is efficient as it exploits the high amount of local symmetry content native of these systems describing only the gauge invariant subspace. Compared to a standard tensor network description, the gauge invariant one allows to speed-up real and imaginary time evolution of a factor that is up to the square of the dimension of the link variable. The gauge invariant tensor network description is based on the quantum link formulation, a compact and intuitive formulation for gauge theories on the lattice, and it is alternative to and can be combined with the global symmetric tensor network description. We present some paradigmatic examples that show how this architecture might be used to describe the physics of condensed matter and high-energy physics systems. Finally, we present a cellular automata analysis which estimates the gauge invariant Hilbert space dimension as a function of the number of lattice sites and that might guide the search for effective simplified models of complex theories.

  12. BER Science Network Requirements

    SciTech Connect (OSTI)

    Dart, Eli; Tierney, Brian

    2010-11-01T23:59:59.000Z

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the US Department of Energy Office of Science, the single largest supporter of basic research in the physical sciences in the United States. In support of the Office of Science programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In April 2010 ESnet and the Office of Biological and Environmental Research, of the DOE Office of Science, organized a workshop to characterize the networking requirements of the science programs funded by BER. The requirements identified at the workshop are summarized and described in more detail in the case studies and the Findings section. A number of common themes emerged from the case studies and workshop discussions. One is that BER science, like many other disciplines, is becoming more and more distributed and collaborative in nature. Another common theme is that data set sizes are exploding. Climate Science in particular is on the verge of needing to manage exabytes of data, and Genomics is on the verge of a huge paradigm shift in the number of sites with sequencers and the amount of sequencer data being generated.

  13. TKN Telecommunication Networks Group

    E-Print Network [OSTI]

    Wichmann, Felix

    consumption. Quite some effort has already been undertaken to address this issue, striving for low-energy trends in the power consumption, the NICs and APs are classified according to the following aspects Group Power consumption of WLAN network elements Salvatore Chiaravalloti, Filip Idzikowski, Lukasz

  14. Transactional Network Platform: Applications

    SciTech Connect (OSTI)

    Katipamula, Srinivas; Lutes, Robert G.; Ngo, Hung; Underhill, Ronald M.

    2013-10-31T23:59:59.000Z

    In FY13, Pacific Northwest National Laboratory (PNNL) with funding from the Department of Energy’s (DOE’s) Building Technologies Office (BTO) designed, prototyped and tested a transactional network platform to support energy, operational and financial transactions between any networked entities (equipment, organizations, buildings, grid, etc.). Initially, in FY13, the concept demonstrated transactions between packaged rooftop air conditioners and heat pump units (RTUs) and the electric grid using applications or "agents" that reside on the platform, on the equipment, on a local building controller or in the Cloud. The transactional network project is a multi-lab effort with Oakridge National Laboratory (ORNL) and Lawrence Berkeley National Laboratory (LBNL) also contributing to the effort. PNNL coordinated the project and also was responsible for the development of the transactional network (TN) platform and three different applications associated with RTUs. This document describes two applications or "agents" in details, and also summarizes the platform. The TN platform details are described in another companion document.

  15. Transportation Network Equilibrium --The Formalism for Networks Today from the Internet

    E-Print Network [OSTI]

    Nagurney, Anna

    and Complex Networks · A New Network Performance/Efficiency Measure with Applications to Network Systems- Dependent (Demand-Varying) Braess Paradox · Extension of the Efficiency Measure to Dynamic Networks Telecommunications Energy Supply Chains Interregional Trade Industrial Organization Location Theory Spatial

  16. Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges

    E-Print Network [OSTI]

    Wu, Jie

    1 Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela problem in wireless sensor networks with adjustable sensing range. Communication and sensing consume Wireless sensor networks (WSNs) constitute the foundation of a broad range of applications related

  17. E-Print Network 3.0 - automated network analysis Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    automation, which resulted in better performance. Conclusion: In decentralized unmanned vehicle networks... , decentralized network, automation ... Source: Cummings, Mary "Missy"...

  18. An Efficiency Measure for Dynamic Networks with

    E-Print Network [OSTI]

    Nagurney, Anna

    networks with time-varying traffics. "... traffic over the Internet doubling every 100 days..." (Frances of Other Dynamic Networks Oil & Natural gas network Electricity generation and distributionElectricity generation and distribution network Supply chain network #12;Varying Demand in Global OilVarying Demand

  19. Power Control in Wireless Cellular Networks

    E-Print Network [OSTI]

    Chiang, Mung

    Power Control in Wireless Cellular Networks #12;#12;Power Control in Wireless Cellular Networks R in Networking sample Vol. x, No y (2008) 1­156 c 2008 Power Control in Wireless Cellular Networks, and connectivity. Power control in both uplink and downlink of a cellular network has been extensively studied

  20. Optimal Deployment of Large Wireless Sensor Networks

    E-Print Network [OSTI]

    Toumpis, Stavros

    1 Optimal Deployment of Large Wireless Sensor Networks S. Toumpis, Member, IEEE, and Leandros, Sensor networks. I. INTRODUCTION A. Wireless Sensor Networks Wireless sensor networks are comprised of sensors that are equipped with wireless transceivers and so are able to form a wireless network [3

  1. Transportation Networks and Location A Geometric Approach

    E-Print Network [OSTI]

    Palop del Río, Belén

    Transportation Networks and Location A Geometric Approach Belén Palop1,2 1Departamento de March 2009 Florida State University #12;Belén Palop, UVa, SUNY Outline Transportation Network Model;Transportation Network Model Belén Palop, UVa, SUNY Outline Transportation Network Model Network placement

  2. Chapter 10 Mining Social-Network

    E-Print Network [OSTI]

    Ullman, Jeffrey D.

    340 #12;Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network such networks. An important question about a social network is how to identify "communities," that is, subsets

  3. Chapter 10 Mining Social-Network

    E-Print Network [OSTI]

    Davis, James E.

    340 #12;Chapter 10 Mining Social-Network Graphs There is much information to be gained by analyzing the large-scale data that is derived from social networks. The best-known example of a social network such networks. An important question about a social network is to identify "communities," that is, subsets

  4. Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding

    E-Print Network [OSTI]

    Wong, Vincent

    Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Vahid Shah that randomized network coding can improve the reliability of wireless sensor networks with lossy links. With network coding, the loss rate of a chosen path in a wireless sensor network is the maximum link loss rate

  5. Near Optimal Broadcast with Network Coding in Large Homogeneous Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Near Optimal Broadcast with Network Coding in Large Homogeneous Wireless Sensor Networks C of wireless "homogeneous" sensor networks contained of the plane: wireless lattice networks, and dense unit of application is wireless sensor net- works, and indeed network coding has been used in wireless networks

  6. Privacy-enhanced social network routing in opportunistic networks Iain Parris, Greg Bigwood and Tristan Henderson

    E-Print Network [OSTI]

    Henderson, Tristan

    Privacy-enhanced social network routing in opportunistic networks Iain Parris, Greg Bigwood. Forwarding messages in such a network often involves the use of social network routing-- sending messages via nodes in the sender or recipient's social network. Simple social network routing, however, may broadcast

  7. Are all Social Networks Structurally Similar? A Comparative Study using Network Statistics and

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Are all Social Networks Structurally Similar? A Comparative Study using Network Statistics--The modern age has seen an exponential growth of social network data available on the web. Analysis social networks and how they are different from other networks such as protein interaction networks

  8. Scalable Opportunistic Forwarding Algorithms in Delay Tolerant Networks using Similarity Hashing

    E-Print Network [OSTI]

    Wu, Jie

    networks [5], deep space satellite networks, underwater acoustic buoy networks, and many dedicated networks are typically power- constrained

  9. advocates network wepan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics because the nodes that contribute to the least-time consumption of free energy preferably attach to each other. Network evolution is a path-dependent and...

  10. area networks deployment: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    networks of such autonomous solar robots is provided. Index Terms Mobile Robot, Solar Power, Antarctica. I. Laura Ray; Er Price; Er Streeter; Daniel Denton; James H. Lever 138...

  11. analytic network process: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Romualdo; Van Mieghem, Piet; Vespignani, Alessandro 2014-01-01 14 Dataflow Process Networks CiteSeer Summary: We review a model of computation used in industrial...

  12. amp signaling networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    transduction networks are commonly viewed as circuits that pass along informationin the process amplifying signals, enhancing sensitivity, or performing other signal-processing...

  13. area networking infrastructure: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in scientific terms, our problem can systems problem including interconnected SCADAembedded networks, corporate intranets, and Internet Neves, Nuno 374 Adapting cities...

  14. alternative splicing networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to be used for network analyses and simulations. The case discussed refers to a tourism destination, the fundamental subsystem of an industry which can be considered one of...

  15. artificial neutral network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    it was proposed that the theory of neutral mutations Fernandez, Thomas 48 Dynamics of artificial spin ice: a continuous honeycomb network MIT - DSpace Summary: We model the...

  16. artificial immune networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    if the learning resides purely in the weights of fixed Fernandez, Thomas 115 Dynamics of artificial spin ice: a continuous honeycomb network MIT - DSpace Summary: We model the...

  17. artificial neuron networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    machine-learning algorithm, inspired by the immune Kent, University of 68 Dynamics of artificial spin ice: a continuous honeycomb network MIT - DSpace Summary: We model the...

  18. artificial neuronal networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    machine-learning algorithm, inspired by the immune Kent, University of 68 Dynamics of artificial spin ice: a continuous honeycomb network MIT - DSpace Summary: We model the...

  19. acquisition computer network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    H. Richter, R. Kleber, M. Ohlenroth acquisition purposes commercially available SCI Zachmann, Gabriel 15 Model-Driven Data Acquisition in Sensor Networks CiteSeer Summary:...

  20. autonomous vehicular networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    W. Tobaben , Sanath Yekollu , and Hareesh Kolpuru Electrical and Computer Engineering Raytheon Program 1. INTRODUCTION The objective of the Autonomous Networked Tactical Sentries...

  1. autonomous island networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    W. Tobaben , Sanath Yekollu , and Hareesh Kolpuru Electrical and Computer Engineering Raytheon Program 1. INTRODUCTION The objective of the Autonomous Networked Tactical Sentries...

  2. area network wlan: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wireless network, 802.11, WLAN, security, scalability. 1 Keren Tan; Chris Mcdonald; Bennet Vance; Chrisil Arackaparambil; Sergey Bratus; David Kotz 266 A 60 GHz Wireless Home...

  3. applying neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    discrimination of benign from malignant gastric neural network classifier, an efficient pattern recognition approach, is used to classify benign Likas, Aristidis 48 A conjugate...

  4. adaptive neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    their spatial scale. Applications of the new techn... Jonathan A. Marshall 1995-01-01 46 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  5. applying neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    discrimination of benign from malignant gastric neural network classifier, an efficient pattern recognition approach, is used to classify benign Likas, Aristidis 48 A conjugate...

  6. automata neural networks: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and genetic programming. In this line of research, we have also Cho, Sung-Bae 115 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  7. adaptive neural network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    their spatial scale. Applications of the new techn... Jonathan A. Marshall 1995-01-01 46 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  8. air monitoring network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: Monitor Network Pulse Oximeter: Measures blood oxygen levels and pulse Accelerometer: Measures motion measures cardiac activity (ECG), oxygen saturation,...

  9. Ourmon and Network Monitoring Performance James R. Binkley Bart Massey

    E-Print Network [OSTI]

    Massey, Bart

    at Portland State University. Ourmon monitors a target network both to highlight ab- normal network traffic

  10. Behavior Profiling and Analysis in Wireless Home Networks

    E-Print Network [OSTI]

    Zhang, Junshan

    system for wireless home networks. builds a baseline profile for each computer within the home network

  11. Modular sensor network node

    DOE Patents [OSTI]

    Davis, Jesse Harper Zehring (Berkeley, CA); Stark, Jr., Douglas Paul (Tracy, CA); Kershaw, Christopher Patrick (Hayward, CA); Kyker, Ronald Dean (Livermore, CA)

    2008-06-10T23:59:59.000Z

    A distributed wireless sensor network node is disclosed. The wireless sensor network node includes a plurality of sensor modules coupled to a system bus and configured to sense a parameter. The parameter may be an object, an event or any other parameter. The node collects data representative of the parameter. The node also includes a communication module coupled to the system bus and configured to allow the node to communicate with other nodes. The node also includes a processing module coupled to the system bus and adapted to receive the data from the sensor module and operable to analyze the data. The node also includes a power module connected to the system bus and operable to generate a regulated voltage.

  12. Self-Aware Networks and QoS Erol Gelenbe, Fellow IEEE, Ricardo Lent, Arturo Nunez

    E-Print Network [OSTI]

    Gelenbe, Erol

    and services. Examples include Enterprise Networks, Home Networks (Domotics), Sensor Net- works, Networks

  13. Building Computer Network Attacks

    E-Print Network [OSTI]

    Futoransky, Ariel; Richarte, Gerardo; Sarraute, Carlos

    2010-01-01T23:59:59.000Z

    In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetration tests, and attack simulations, allowing a system administrator to evaluate the vulnerabilities of his network.

  14. Network Performance MONASH UNIVERSITY

    E-Print Network [OSTI]

    Sekercioglu, Y. Ahmet

    "&" at the end of a command line tells to the shell command line interpreter to run the command in back- ground with the Emacs2 text editor: emacs Makefile &3. 5. Type these lines into the Makefile: 1 hworld: hworld.c 2 . netperf-lab-warmup.tex,v1.6 (teaching/digicomm) 1 #12;Network Performance 7. Type the lines of the C

  15. HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    HYBRID MODELING OF COMMUNICATION NETWORKS USING MODELICA Daniel F¨arnqvist Katrin Strandemar and simulation of communication networks using the modeling language Modelica are discussed. Congestion control model, that Modelica provides an efficient platform for the analysis of communication networks

  16. Dynamic Networks: Recent Results and Applications

    E-Print Network [OSTI]

    Nagurney, Anna

    . #12;Duke Energy Gas Pipeline Network #12;Components of Common Physical Networks Network System Nodes, Railroad Track Automobiles, Trains, and Planes, Manufacturing and logistics Workstations, Distribution Exchanges Fiber Optic Cables Radio Links Voice, Data, Video Energy Pumping Stations, Plants Pipelines

  17. Multiple Scales in Small-World Networks

    E-Print Network [OSTI]

    Kasturirangan, Rajesh

    1999-08-11T23:59:59.000Z

    Small-world architectures may be implicated in a range of phenomena from networks of neurons in the cerebral cortex to social networks and propogation of viruses. Small-world networks are interpolations of regular and ...

  18. Aircraft System Identification Using Artificial Neural Networks

    E-Print Network [OSTI]

    Valasek, John

    Aircraft System Identification Using Artificial Neural Networks Kenton Kirkpatrick Jim May Jr. John Meeting January 9, 2013 Compos Volatus #12;Overview Motivation System Identification Artificial Neural Networks 2 Artificial Neural Networks ANNSID Conclusions and Open Challenges #12;Motivation 3 #12

  19. Context-aware computing for wireless networks

    E-Print Network [OSTI]

    Ergüt, Salih

    2010-01-01T23:59:59.000Z

    Packet Delay in Wireless Networks 2 Client Side Active QueueCellular and Sensor Networks Wireless Positioning Overviewin Mobile, Ad Hoc and Wireless Networks, pages 1–10, 2006. [

  20. Software Defined Wireless Networks: Unbridling SDNs

    E-Print Network [OSTI]

    Perkins, Dmitri

    Software Defined Wireless Networks: Unbridling SDNs Salvatore Costanzo, Laura Galluccio, Giacomo at analyzing how SDN can be beneficial in wireless infrastructureless networking environments with special emphasis on wireless personal area networks (WPAN). Furthermore, a possible approach (called SDWN

  1. Characterizing User Mobility in Wireless Networks

    E-Print Network [OSTI]

    Nunes, Bruno Astuto Arouche

    2012-01-01T23:59:59.000Z

    Symmetry of User Mobility in Wireless Networks 3.1 MobilityAnalysis of a local-area wireless network. In ACM MOBI- COMand evaluation of wireless networks and their protocols.

  2. Evolution and statistics of biological regulatory networks

    E-Print Network [OSTI]

    Chandalia, Juhi Kiran, 1979-

    2005-01-01T23:59:59.000Z

    In this thesis, I study the process of evolution of the gene regulatory network in Escherichia coli. First, I characterize the portion of the network that has been documented, and then I simulate growth of the network. In ...

  3. Wireless Sensor Network Infrastructure : Construction and Evaluation

    E-Print Network [OSTI]

    Boyer, Edmond

    Wireless Sensor Network Infrastructure : Construction and Evaluation Kamal Beydoun, Violeta Felea main features for efficient energy management in wireless sensor networks. This paper aims to present a distributed and low-cost topology construction algorithm for wireless sensor networks, addressing

  4. Evolutionary approaches toward practical network coding

    E-Print Network [OSTI]

    Kim, Minkyu, 1976-

    2008-01-01T23:59:59.000Z

    There have been numerous studies showing various benefits of network coding. However, in order to have network coding widely deployed in real networks, it is also important to show that the amount of overhead incurred by ...

  5. Improving performance of TCP over wireless networks

    E-Print Network [OSTI]

    Mehta, Miten N.

    1998-01-01T23:59:59.000Z

    TCP has been designed and tuned to perform well on a phics. wired network made up of links with low bit-error rates. Wireless networks and heterogeneous networks consisting of wired and wireless links have many different characteristics compared...

  6. A VALIDATION INDEX FOR ARTIFICIAL NEURAL NETWORKS

    E-Print Network [OSTI]

    Roberts, Stephen

    A VALIDATION INDEX FOR ARTIFICIAL NEURAL NETWORKS Stephen Roberts, Lionel Tarassenko, James Pardey and estimation properties of artificial neural networks. Like many `traditional' statistical techniques & David Siegwart Neural Network Research Group Department of Engineering Science University of Oxford, UK

  7. Online Social Networks and People's Psychology

    E-Print Network [OSTI]

    Hoang, Hai

    2013-01-01T23:59:59.000Z

    102-139. Online Social Networks and People’s Psychology III.and Table 4). Online Social Networks and People’s PsychologyOnline Social Networks and People’s Psychology Bibliography

  8. Monotonic Target Assignment for Robotic Networks

    E-Print Network [OSTI]

    Smith, Stephen L; Bullo, Francesco

    2009-01-01T23:59:59.000Z

    Target assignment for robotic networks: Worst-case andTARGET ASSIGNMENT FOR ROBOTIC NETWORKS [6] H. W. Kuhn, “TheTarget Assignment for Robotic Networks Stephen L. Smith,

  9. Towards the Science of Network Measurement

    E-Print Network [OSTI]

    Chang, Rocky Kow-Chuen

    Towards the Science of Network Measurement Rocky K. C. Chang The Internet Infrastructure and Security Laboratory November 20, 2012 #12;Network measurement problems · Topology characterization · ... 2 #12;Why measuring network path? Performancemetrics Latency Delay variation (jitter) Connectivity

  10. Asymptotics of Relativistic Spin Networks

    E-Print Network [OSTI]

    John W Barrett; Christopher M Steele

    2003-01-31T23:59:59.000Z

    The stationary phase technique is used to calculate asymptotic formulae for SO(4) Relativistic Spin Networks. For the tetrahedral spin network this gives the square of the Ponzano-Regge asymptotic formula for the SU(2) 6j symbol. For the 4-simplex (10j-symbol) the asymptotic formula is compared with numerical calculations of the Spin Network evaluation. Finally we discuss the asymptotics of the SO(3,1) 10j-symbol.

  11. Insecurity of Wireless Networks

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01T23:59:59.000Z

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  12. Mobileflow: Applying SDN to Mobility in Wireless Networks

    E-Print Network [OSTI]

    Al-Shaikhli, Raghdah

    2014-08-10T23:59:59.000Z

    , there are two dominant technologies for providing wireless network access: cellular broadband networks and wireless local area networks (Wi-Fi). Cellular networks offer ubiquitous coverage, high reliability, and support mobility; yet such networks require...

  13. Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg is to create distributed protocols that reduce the uncertainty by distributing the knowledge of the network anonymous networks. Keywords: Anonymous networks, directed networks, distributed protocols. 1 Introduction

  14. Collective dynamics in sparse networks

    E-Print Network [OSTI]

    Stefano Luccioli; Simona Olmi; Antonio Politi; Alessandro Torcini

    2012-08-03T23:59:59.000Z

    The microscopic and macroscopic dynamics of random networks is investigated in the strong-dilution limit (i.e. for sparse networks). By simulating chaotic maps, Stuart-Landau oscillators, and leaky integrate-and-fire neurons, we show that a finite connectivity (of the order of a few tens) is able to sustain a nontrivial collective dynamics even in the thermodynamic limit. Although the network structure implies a non-additive dynamics, the microscopic evolution is extensive (i.e. the number of active degrees of freedom is proportional to the number of network elements).

  15. Imprinted Networks as Chiral Pumps

    E-Print Network [OSTI]

    Y. Mao; M. Warner

    2001-01-12T23:59:59.000Z

    We investigate the interaction between a chirally imprinted network and a solvent of chiral molecules. We find, a liquid crystalline polymer network is preferentially swollen by one component of a racemic solvent. This ability to separate is linked to the chiral order parameter of the network, and can be reversibly controlled via temperature or a mechanical deformation. It is maximal near the point at which the network loses its imprinted structure. One possible practical application of this effect would be a mechanical device for sorting mixed chiral molecules.

  16. Fusion Energy Sciences Network Requirements

    E-Print Network [OSTI]

    Dart, Eli

    2014-01-01T23:59:59.000Z

    Division, and the Office of Fusion Energy Sciences. This isFusion Energy Sciences NetworkRequirements Office of Fusion Energy Sciences Energy

  17. Selfish Routing in Capacitated Networks

    E-Print Network [OSTI]

    Correa, Jose R.

    2003-08-01T23:59:59.000Z

    According to Wardrop's first principle, agents in a congested network choose their routes selfishly, a behavior that is captured by the Nash equilibrium of the underlying ...

  18. Helper's Network Gazette November 1994

    E-Print Network [OSTI]

    1994-01-01T23:59:59.000Z

    all current members are included, the prize being a beautiful etched glass mug with a Beth Blighton head of Vincent on one side and the B&B logo on the other. If you're in doubt when you're due to renew, look at your certificate to see when you joined... including all Helpers' Network has to offer: The Helpers' Network Gazette (a monthly newsletter); The Helpers' Network Quality Fanzine Review ("Q-fer"); audio and video tapes; and T-shirts and totebags with the Helpers' Network logo. Those who join or renew...

  19. Power network analysis and optimization

    E-Print Network [OSTI]

    Zhang, Wanping

    2009-01-01T23:59:59.000Z

    chip power supply network optimization using multigrid-basedchip decoupling capacitor optimization for high- performanceSapatnekar, “Analysis and optimization of structured power/

  20. CONVERGENT NETWORK APPROXIMATION FOR THE ...

    E-Print Network [OSTI]

    2007-09-12T23:59:59.000Z

    Even though the smaller networks produce useless negative lower bounds, they .... for MCM path planning, in Detection and Remediation Technologies for.

  1. Communication in Home Area Networks

    E-Print Network [OSTI]

    Wang, Yubo

    2012-01-01T23:59:59.000Z

    and implementation of smart home energy management systemsStandard Technologies for Smart Home Area Networks EnablingInteroperability framework for smart home systems”, Consumer

  2. 2013 Alumni Network Award Winners

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    interests. #12;Winter­Spring 2014 BOSTONIA , . March 19, 2014 An Evening with Digital2013 Alumni Network Award Winners Are Announced Alumni volunteers around the globe are recognized

  3. EA-1964: National Ecological Observation Network (NEON)

    Broader source: Energy.gov [DOE]

    The National Science Foundation (NSF) prepared an EA that evaluated potential environmental impacts of the proposed National Ecological Observation Network (NEON), a continental-scale network of...

  4. Progress of the Engine Combustion Network

    Broader source: Energy.gov (indexed) [DOE]

    the Progress of the Engine Combustion Network Engine Combustion Network Lyle M. Pickett Sandia National Laboratories Sponsor: DOE Office of Vehicle Technologies Program Manager:...

  5. Ultraviolet Communication Network Modeling and Analysis

    E-Print Network [OSTI]

    Wang, Leijie

    2011-01-01T23:59:59.000Z

    systems for unattended ground sensor networks. In Proc.link for unattended ground sensors. In Proc. SPIE, volumeenvironment sensing, unattended ground sensor networks, and

  6. Calibrating Artificial Neural Networks by Global Optimization

    E-Print Network [OSTI]

    Janos D. Pinter

    2010-07-21T23:59:59.000Z

    Jul 21, 2010 ... Abstract: An artificial neural network (ANN) is a computational model ... emulating the key features and operations of biological neural networks.

  7. Peak Oil Awareness Network | Open Energy Information

    Open Energy Info (EERE)

    Awareness Network Jump to: navigation, search Name: Peak Oil Awareness Network Place: Crested Butte, Colorado Zip: 81224 Website: http:www.PeakOilAwarenessNet Coordinates:...

  8. Better Buildings Residential Network Membership Form | Department...

    Energy Savers [EERE]

    Membership Form Better Buildings Residential Network Membership Form Membership form from the U.S. Department of Energy's Better Buildings Residential Network Recommended...

  9. area network umts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    but also helps improve the QoS of the core network and saves the carriers' OPEX and CAPEX on their core networks. Ouyang, Ye; 10.5121ijngn.2010.2105 2010-01-01 17 UMTS-WiMAX...

  10. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  11. Wireless Network Interface Energy Conservation for Bottlenecked First Mile Networks

    E-Print Network [OSTI]

    Chandra, Surendar

    user using the limited upstream capacity of the home broad- band link. We analyze the behavior of two- posed by this behavior on a client side energy saving mechanism. We also describe techniques that allowWireless Network Interface Energy Conservation for Bottlenecked First Mile Networks Surendar

  12. Ecological NetworksEcological Networks 15 September 2009

    E-Print Network [OSTI]

    Albert, Réka

    Antagonistic networks ­ Food webs Host parasite/parasitoid webs­ Hostparasite/parasitoid webs · Mutualistic networks ­ Plantseed disperser webs ­ Plantpollinator webs ­ Plantant webs Ings et al 2009 J Animal Ecol #12;Food websFood webs · Directed links denoteDirected links denote direction of energy flow http

  13. General Network Lifetime and Cost Models for Evaluating Sensor Network

    E-Print Network [OSTI]

    Heinzelman, Wendi

    General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies Zhao Cheng, Mark Perillo, and Wendi B. Heinzelman, Senior Member, IEEE Abstract--In multihop wireless sensor to energy imbalance among sensors often appear. Sensors closer to a data sink are usually required

  14. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    SciTech Connect (OSTI)

    Yoo, Wucherl; Sim, Alex

    2014-07-07T23:59:59.000Z

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  15. Network Upgrade for the SLC: PEP II Network

    SciTech Connect (OSTI)

    Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

    2011-09-09T23:59:59.000Z

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

  16. Networks in Finance Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    Chapter 1 Networks in Finance Anna Nagurney Department of Finance and Operations Management as Chapter 17 in the Handbook on IT and Finance, D. Seese, C. Weinhardt, and F. Schlottmann, Editors, Springer (2008), Berlin, Germany. Summary. This handbook chapter traces the history of networks in finance

  17. RNEDE: Resilient Network Design Environment

    SciTech Connect (OSTI)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01T23:59:59.000Z

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  18. Nordic network for Sustainable Energy

    E-Print Network [OSTI]

    Nordic network for Sustainable Energy Systems in Isolated Locations (NordSESIL) Gordon A. Mackenzie of the Nordic region to access sustainable energy solutions by creating and stimulating a network of relevant sustainable energy projects happening' in isolated areas of the Nordic region. #12;Partners, organisation (1

  19. Network layer Connectionless datagram forwarding

    E-Print Network [OSTI]

    (passed down by transport layer) into datagrams Destination host delivers segments up to transport layer by the cold war " If there exists a path, routers will put it in the routing table automatically Forwarding in the original order Physical Link Network Transport Application Physical Link Network Transport Application

  20. LHC Network Measurement Joe Metzger

    E-Print Network [OSTI]

    1 LHC Network Measurement Joe Metzger Nov 6 2007 LHCOPN Meeting at CERN Energy Sciences Network & Capacity RRDMA Input Errors & Output Drops PS-SNMPMA Done ?? Beta Aug 1, Package Sep 1 Visualize perf On-demand AMI MA & Scheduler Hades Owamp MP Beta Sep 15, Package Oct 1 October Done Archive perf

  1. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07T23:59:59.000Z

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  2. Neural Networks Perceptrons and Backpropagation

    E-Print Network [OSTI]

    Bremen, Universität

    neural network Inputs x = (x1, x2) = (a1, a2) a5 = g(W3,5a3 + W4,5a4) a5 = g(W3,5g(W1,3a1 + W2,3a2) + W4,5g(W1,4a1 + W2,4a2)) function hW(x) is computed Neural Networks 8 / 17 #12;Network structure Network network Inputs x = (x1, x2) = (a1, a2) a5 = g(W3,5a3 + W4,5a4) a5 = g(W3,5g(W1,3a1 + W2,3a2) + W4,5g(W1,4a

  3. Ranking species in mutualistic networks

    E-Print Network [OSTI]

    Domínguez-García, Virginia

    2015-01-01T23:59:59.000Z

    Understanding the architectural subtleties of ecological networks, believed to confer them enhanced stability and robustness, is a subject of outmost relevance. Mutualistic interactions have been profusely studied and their corresponding bipartite networks, such as plant-pollinator networks, have been reported to exhibit a characteristic "nested" structure. Assessing the importance of any given species in mutualistic networks is a key task when evaluating extinction risks and possible cascade effects. Inspired in a recently introduced algorithm --similar in spirit to Google's PageRank but with a built-in non-linearity-- here we propose a method which --by exploiting their nested architecture-- allows us to derive a sound ranking of species importance in mutualistic networks. This method clearly outperforms other existing ranking schemes and can become very useful for ecosystem management and biodiversity preservation, where decisions on what aspects of ecosystems to explicitly protect need to be made.

  4. Linear Quantum Feedback Networks

    E-Print Network [OSTI]

    J. Gough; R. Gohm; M. Yanagisawa

    2008-07-15T23:59:59.000Z

    The mathematical theory of quantum feedback networks has recently been developed for general open quantum dynamical systems interacting with bosonic input fields. In this article we show, for the special case of linear dynamical systems Markovian systems with instantaneous feedback connections, that the transfer functions can be deduced and agree with the algebraic rules obtained in the nonlinear case. Using these rules, we derive the the transfer functions for linear quantum systems in series, in cascade, and in feedback arrangements mediated by beam splitter devices.

  5. Historical Network Maps

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football High SchoolBundles toHiring-TP59.01 C5;44 Network Maps

  6. Phoebus: Network Middleware for Next-Generation Network Computing

    SciTech Connect (OSTI)

    Martin Swany

    2012-06-16T23:59:59.000Z

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  7. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    COSC 472 Network Security Annie Lu 1 COSC 472 Network Security · Instructor: Dr. Enyue (Annie) Lu Network Security Annie Lu 2 Course overview · Chapter 1: Introduction · Part I: Cryptography · Chapter 2 · Part II ­III: Network Security · Chapter 4: key Distribution & User Authentication · Chapter 5: Network

  8. Joint Network/Channel Decoding for Heterogeneous MultiSource/MultiRelay Cooperative Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Joint Network/Channel Decoding for Heterogeneous Multi­Source/Multi­Relay Cooperative Networks for multi­source multi­relay heterogeneous wireless networks. When convolutional and network codes are used Error Protection (UEP) properties, which might be useful for heterogeneous wireless networks in which

  9. The two faces of network dynamics Evolving network models describe the dynamics (assembly, evolution)

    E-Print Network [OSTI]

    Albert, Réka

    with a random network with a given degree distribution P(k). Mark edges with probability T. DisregardThe two faces of network dynamics Evolving network models describe the dynamics (assembly, evolution) OF networks by the addition/removal of nodes and edges. It is possible to have network dynamics

  10. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks

    E-Print Network [OSTI]

    Wang, Lingyu

    evaluate our algorithm and metrics through simulation. Keywords: Security Metrics, Diversity, Network towards formally modeling network diversity as a security metric, for the purpose of evaluating a networkModeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks

  11. RINSE: the Real-time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)

    E-Print Network [OSTI]

    Liu, Xiaowen "Jason"

    RINSE: the Real-time Immersive Network Simulation Environment for Network Security Exercises-time Immer- sive Network Simulation Environment for network security exercises (RINSE) to meet this need to support large-scale network security preparedness and training ex- ercises, involving hundreds of players

  12. High Performance Network Monitoring

    SciTech Connect (OSTI)

    Martinez, Jesse E [Los Alamos National Laboratory

    2012-08-10T23:59:59.000Z

    Network Monitoring requires a substantial use of data and error analysis to overcome issues with clusters. Zenoss and Splunk help to monitor system log messages that are reporting issues about the clusters to monitoring services. Infiniband infrastructure on a number of clusters upgraded to ibmon2. ibmon2 requires different filters to report errors to system administrators. Focus for this summer is to: (1) Implement ibmon2 filters on monitoring boxes to report system errors to system administrators using Zenoss and Splunk; (2) Modify and improve scripts for monitoring and administrative usage; (3) Learn more about networks including services and maintenance for high performance computing systems; and (4) Gain a life experience working with professionals under real world situations. Filters were created to account for clusters running ibmon2 v1.0.0-1 10 Filters currently implemented for ibmon2 using Python. Filters look for threshold of port counters. Over certain counts, filters report errors to on-call system administrators and modifies grid to show local host with issue.

  13. Social networks and the Semantic Web

    E-Print Network [OSTI]

    Baeza-Yates, Ricardo

    Social networks and the Semantic Web Peter Mika Business Informatics group Dept. of Computer technology for the social sciences Social network mining from the Web Semantics-based data management Browsing and visualization Case study Network Analysis of Semantic Web research 2. Network Analysis

  14. Logistical Networking Sharing More than the Wires

    E-Print Network [OSTI]

    Plank, Jim

    Network as approaches to flexible implementation of advanced network protocols. We describe the Internet. The goal of computer networking is typically taken to be communication, i.e. the transmission of data1 Logistical Networking Sharing More than the Wires Micah Beck, Terry Moore, Jim Plank, Martin

  15. OFC Review 2013 Software Defined Network (SDN)

    E-Print Network [OSTI]

    California at Davis, University of

    and transmission rate w/o hardware change Dedicated PCE to scale OpenFlow architectutre #12;Network ArchitectureOFC Review 2013 Software Defined Network (SDN) M. Farhan Habib May 10, 2013 Friday Group Meeting Networks Lab @ UCD #12;NTu3F: SDN in Today's Network #12;SDN: What and Why · Traditional distributed

  16. Multi-camera networks Andrea Cavallaro

    E-Print Network [OSTI]

    Cavallaro, Andrea

    medicine Multi-camera networks: scale Personal video conferencing gaming Home energy efficiency domotics

  17. Energy Proportional Datacenter Networks Dennis Abts

    E-Print Network [OSTI]

    Tomkins, Andrew

    and performance envelopes dynamically. Using a network simulator, driven by both synthetic workloads]: Network communica- tions; Topology; B.4.3 [Interconnections]: Fiber optics; Topology General Terms-1-4503-0053-7/10/06 ...$10.00. Keywords Low-power networking, Datacenter networks, Interconnection net- works 1. INTRODUCTION

  18. Localized Bridging Centrality for Distributed Network Analysis

    E-Print Network [OSTI]

    Kotz, David

    network administrators identify critical nodes that are important for the robustness of the network administrator (sysadmin) manage a wireless mesh network or would allow an automated management system understand a system administrator to manage a mesh network in a more effective manner. While the system administrator

  19. Power Management in Wireless Networks Kevin Klues

    E-Print Network [OSTI]

    Jain, Raj

    Power Management in Wireless Networks Kevin Klues Abstract This paper presents a survey on the various power saving techniques used in wireless networking today. The work presented covers topics at each layer of a wireless networking protocol stack. The types of wireless networks considered include

  20. Restructuring our electricity networks to promote decarbonisation

    E-Print Network [OSTI]

    Watson, Andrew

    ............................................29 V. HOW TO EFFICIENTLY MEET EUROPEAN RET TARGETS INCENTIVE REGULATION AND THE NETWORK OPERATOR

  1. DISTRIBUTED OPPORTUNISTIC TRANSMISSION FOR WIRELESS SENSOR NETWORKS

    E-Print Network [OSTI]

    Islam, M. Saif

    DISTRIBUTED OPPORTUNISTIC TRANSMISSION FOR WIRELESS SENSOR NETWORKS Qing Zhao and Lang Tong School Strategy We consider the problem of information retrieval in sensor networks with mobile access points on Communica- tion and Networks under Grant DAAD19-01-2-0011. ¢ Fig. 1: Sensor networks with mobile access

  2. Semiring Artificial Neural Networks and Weighted Automata

    E-Print Network [OSTI]

    Hoelldobler, Steffen

    Semiring Artificial Neural Networks and Weighted Automata And an Application to Digital Image neural networks and weighted automata. For this task, we introduce semiring artificial neural networks, that is, artificial neural networks which implement the addition and the multiplication of semirings. We

  3. Introduction to Artificial Intelligence Neural Networks

    E-Print Network [OSTI]

    Qu, Rong

    Introduction to Artificial Intelligence (G51IAI) Dr Rong Qu Neural Networks #12;G51IAI ­ Introduction to AI Neural Networks Chapter 20 ­ Artificial Intelligence : A Modern Approach (AIMA) Russell ­ Introduction to AI Neural Networks More precisely: Artificial Neural Networks Simulating, on a computer, what

  4. Artificial Neural Network Portion of Coil Study

    E-Print Network [OSTI]

    Putten, Peter van der

    Artificial Neural Network Portion of Coil Study LTC William M. Crocoll School of Systems TO ARTIFICIAL NEURAL NETWORKS A neural network is a massively parallel system comprised of many highly of the brain (Dayhoff, 1990). A major task for a neural network is to learn and maintain a model of the world

  5. Artificial Bee Colony Training of Neural Networks

    E-Print Network [OSTI]

    Bullinaria, John

    Artificial Bee Colony Training of Neural Networks John A. Bullinaria and Khulood AlYahya School of artificial Neural Networks (NNs). Of course, there already exist many hybrid neural network learning for optimization, that has previously been applied successfully to the training of neural networks. This paper ex

  6. Dynamics of Social Networks HOLGER EBEL,1

    E-Print Network [OSTI]

    Bornholdt, Stefan

    Dynamics of Social Networks HOLGER EBEL,1 JO¨ RN DAVIDSEN,2 AND STEFAN BORNHOLDT3 1 Institute with experimental data of social networks, as for example, coauthorship networks in high energy physics. © 2003 Wiley Periodicals, Inc. Key Words: complex networks; social systems; scaling laws I n many kinds

  7. Talent Acquisition Talent Development Social Network Essentials

    E-Print Network [OSTI]

    Bordenstein, Seth

    Talent Acquisition Talent Development Social Network Essentials for Students Dan Ryan April 1, 2013 #12;What are your goals for today? #12;Beginning steps · Resume/CV · Networking · Social networks relevant information ­ Internships ­ Research ­ Study abroad #12;What is Networking? · A two-way process

  8. Network Coding for Large Scale Content Distribution

    E-Print Network [OSTI]

    Keinan, Alon

    Network Coding for Large Scale Content Distribution IEEE Infocom 2005 Christos Gkantsidis College propose a new scheme for content distribution of large files that is based on network coding. With network coding, each node of the distribution network is able to generate and transmit encoded blocks

  9. Introduction to Network Science 1 Stanley Milgram

    E-Print Network [OSTI]

    Safro, Ilya

    :statistics is poor at the tailof the distribution Solution I: different sizes of bins #12;Introduction to Network Cumulative Distribution Newman "Networks, an Introduction" Advantages: · no bins · easy calculation · can #12;Introduction to Network Science 7 Cumulative Distribution From Newman "Networks, an Introduction

  10. Distributed Compressed Sensing in Dynamic Networks

    E-Print Network [OSTI]

    Eldar, Yonina

    Distributed Compressed Sensing in Dynamic Networks Stacy Patterson Department of Computer Science theoretical results to develop a distributed version of IHT for dynamic networks. Evaluations show that our throughout the network, it is desirable to perform this recovery within the network in a distributed fashion

  11. Integrating Correlated Bayesian Networks Using Maximum Entropy

    SciTech Connect (OSTI)

    Jarman, Kenneth D.; Whitney, Paul D.

    2011-08-30T23:59:59.000Z

    We consider the problem of generating a joint distribution for a pair of Bayesian networks that preserves the multivariate marginal distribution of each network and satisfies prescribed correlation between pairs of nodes taken from both networks. We derive the maximum entropy distribution for any pair of multivariate random vectors and prescribed correlations and demonstrate numerical results for an example integration of Bayesian networks.

  12. Real-time network simulation support for

    E-Print Network [OSTI]

    Liu, Xiaowen "Jason"

    Real-time network simulation support for scalable routing experiments Yue Li*, Jason Liu, and Raju-time network simulation with the realism of open- source routing protocol implementations. The infrastructure experiments on light-weight virtual machines. Keywords: network simulation; real-time simulation; network

  13. Edge Direction and the Structure of Networks

    E-Print Network [OSTI]

    Foster, Jacob G; Grassberger, Peter; Paczuski, Maya

    2009-01-01T23:59:59.000Z

    Directed networks are ubiquitous, from food webs to the World Wide Web, but the directionality of their interactions has been disregarded in most studies of global network structure. One important global property is the tendency of nodes with similar numbers of edges to be connected. This tendency, called assortativity, affects crucial structural and dynamic properties of real-world networks. Here we demonstrate the importance of edge direction by studying assortativity in directed networks. We define a set of four directed assortativity measures. By comparison to randomized networks, we discover significant features of three network classes: online/social networks, food webs, and word-adjacency networks. The full set of measures is needed to reveal patterns common to the class or to separate networks that have been previously classified together. Our measures expose limitations of existing theoretical models, and show that many networks are not purely assortative or disassortative but a mixture of the two.

  14. artificially generated gravity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (Nolfi and Floreano, 2000), neural networks design files of body com- ponents for 3D printing, and for compiling neural-network controllers to run artificial neural networks....

  15. About the Better Buildings Residential Network | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buildings Residential Network About the Better Buildings Residential Network The Better Buildings Residential Network connects energy efficiency programs and partners to share...

  16. Better Buildings Network View | March 2015 | Department of Energy

    Energy Savers [EERE]

    Better Buildings Network View | March 2015 Better Buildings Network View | March 2015 The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's...

  17. Scalable, efficient, and fault-tolerant data center networking

    E-Print Network [OSTI]

    Walraed-Sullivan, Meg; Walraed-Sullivan, Meg

    2012-01-01T23:59:59.000Z

    cost that the network administrator is willing to pay.overhead on the network administrator. ALIAS provides thethese entries as a network administrator would prefer. Super

  18. A Continuous Time Bayesian Network Approach for Intrusion Detection

    E-Print Network [OSTI]

    Xu, Jing

    2010-01-01T23:59:59.000Z

    also challenges network administrators to deal with identitya fact of life for network administrators. Detecting attackscan help the network administrator tell whether the current

  19. Adaptive Scheduling in Ad Hoc and Cellular Wireless Networks

    E-Print Network [OSTI]

    Tan, Choo Chin

    2013-01-01T23:59:59.000Z

    organization wireless networks and wireless mobile ad-hocfor heterogeneous wireless network”, in Proc. of IEEER. Khalaf, “Ad hoc wireless networks with mobile backbones,”

  20. Multi-hop routing for wireless mesh networks

    E-Print Network [OSTI]

    Bhorkar, Abhijeet

    2012-01-01T23:59:59.000Z

    in Wireless Mesh Networks . . . . . . . . . . . . . 1.2in Mobile, Ad Hoc, and Wireless Networks (WiOpt), [45] Amanin ICDCS Workshop on Wireless Networks and Mobile Computing,

  1. Maximizing the throughput of large ad hoc wireless networks

    E-Print Network [OSTI]

    Hua, Yingbo; Huang, Yi; J, Garcia-Luna-Aceves J

    2006-01-01T23:59:59.000Z

    The transport capacity of wireless networks over fadingimprovement of ad hoc wireless networks using directionalThe capacity of wireless networks,” IEEE Trans. Inform.

  2. Traffic Management and Net Neutrality in Wireless Networks

    E-Print Network [OSTI]

    Jordan, Scott

    2011-01-01T23:59:59.000Z

    and resource allocation in wireless multimedia networks.between wired and wireless networks, and hence on potentialManagement for Wireless Networks. Artech House Publishers,

  3. Power Scheduling for Multi-Hop Wireless Networks

    E-Print Network [OSTI]

    Yu, Yuan

    2009-01-01T23:59:59.000Z

    The capacity of wireless networks,” IEEE Trans. Inform.capacity of hybrid wireless networks,” in Infocom, 2003, pp.larization for MIMO wireless networks,” IEEE Transactions on

  4. Energy Efficient Distributed Data Fusion In Multihop Wireless Sensor Networks

    E-Print Network [OSTI]

    Huang, Yi

    2010-01-01T23:59:59.000Z

    processing for a wireless sensor networks. Each circle ’S’techniques in wireless sensor networks: A survey,” IEEEestimation for wireless sensor networks, part i: Gaussian

  5. Improving the performance of distributed simulations of wireless sensor networks

    E-Print Network [OSTI]

    Jin, Zhong-Yi

    2010-01-01T23:59:59.000Z

    Overview of Wireless Sensor Networks . . 2.1.2 Difficultiesin parallel a wireless sensor network with two duty cycledin parallel a wireless sensor network with three nodes that

  6. Scalable Coverage Maintenance for Dense Wireless Sensor Networks

    E-Print Network [OSTI]

    Lu, Jun; Wang, Jinsu; Suda, Tatsuya

    2007-01-01T23:59:59.000Z

    get coverage in wireless sensor networks,” in Proceedings ofscheme for large wireless sensor networks,” in Pro- ceedingsWorkshop on Wireless Sensor Networks and Applications (

  7. Data-driven modeling of phenomena in wireless sensor networks

    E-Print Network [OSTI]

    Kamthe, Ankur U.

    2012-01-01T23:59:59.000Z

    experimentation in wireless sensor networks. Commun. ACM,of Phenomena in Wireless Sensor Networks A dissertationBoavida, editors, Wireless Sensor Networks, volume 5970 of

  8. Decentralized TDOA Sensor Pairing in Multihop Wireless Sensor Networks

    E-Print Network [OSTI]

    Meng, Wei; Lihua, Xie; Wendong, Xiao

    2013-01-01T23:59:59.000Z

    localization in wireless sensor networks,” IEEE Signallocalization in wireless sensor networks,” IEEE Trans.techniques for wireless sensor networks: A survey,” IEEE

  9. Reliable and Efficient Programming Abstractions for Wireless Sensor Networks

    E-Print Network [OSTI]

    Kothari, Nupur; Gummadi, Ramakrishna; Millstein, Todd; Govindan, Ramesh

    2007-01-01T23:59:59.000Z

    Macro-programming wireless sensor networks using Kairos. InAbstractions for Wireless Sensor Networks Nupur Kothari ?Keywords Wireless Sensor Networks, Macroprogramming, En-

  10. Using Mobile Technology and Social Networking to Crowdsource Citizen Science

    E-Print Network [OSTI]

    Robson, Christine

    2012-01-01T23:59:59.000Z

    Using Mobile Technology and Social Networking to CrowdsourceFall 2012 Using Mobile Technology and Social Networking toAbstract Using Mobile Technology and Social Networking to

  11. On synchronous robotic networks - Part I: Models, tasks, and complexity

    E-Print Network [OSTI]

    Frazzoli, Emilio; Bullo, Francesco; Cortes, Jorge; Martinez, Sonia

    2007-01-01T23:59:59.000Z

    E. Frazzoli, “On synchronous robotic networks Part II: Timeto control design for mobile robotic networks. Application2007 On Synchronous Robotic Networks—Part I: Models, Tasks,

  12. Distributed Motion Constraints for Algebraic Connectivity of Robotic Networks

    E-Print Network [OSTI]

    Schuresko, Michael; Cortés, Jorge

    2009-01-01T23:59:59.000Z

    E. : On synchronous robotic networks - Part I: models,a simulation environment for robotic networks. http://function associated to the robotic network. 2.1 The Graph

  13. access ad hoc: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  14. access control mechanism: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  15. Better Buildings Network View | April 2014 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 2014 More Documents & Publications Better Buildings Network View | December 2014 Better Buildings Residential Network Orientation Better Buildings Network View | November...

  16. Better Buildings Network View | January 2015 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    5 More Documents & Publications Better Buildings Network View | December 2014 Better Buildings Network View | November 2014 Better Buildings Residential Network Orientation...

  17. Better Buildings Network View | November 2014 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    November 2014 More Documents & Publications Better Buildings Network View | July-August 2014 Better Buildings Network View | December 2014 Better Buildings Network View | January...

  18. Better Buildings Network View | June 2014 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    June 2014 Better Buildings Network View | June 2014 The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network....

  19. Better Buildings Network View | January 2014 | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Better Buildings Network View | January 2014 The Better Buildings Network View monthly newsletter from the U.S. Department of Energy's Better Buildings Residential Network....

  20. Better Buildings Network View | February 2015 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    5 More Documents & Publications Better Buildings Network View | November 2014 Better Buildings Network View | September 2014 Better Buildings Residential Network Case Study:...

  1. A publish-subscribe implementation of network management

    E-Print Network [OSTI]

    Simosa, Jorge D. (Jorge David)

    2013-01-01T23:59:59.000Z

    As modern networks become highly integrated, heterogeneous, and experience exponential growth, the task of network management becomes increasingly unmanageable for network administrators and designers. The Knowledge Plane ...

  2. A Publish-Subscribe Implementation of Network Management

    E-Print Network [OSTI]

    Simosa, Jorge D.

    2013-06-04T23:59:59.000Z

    As modern networks become highly integrated, heterogeneous, and experience exponential growth, the task of network management becomes increasingly unmanageable for network administrators and designers. The Knowledge Plane ...

  3. Biomass Rapid Analysis Network (BRAN)

    SciTech Connect (OSTI)

    Not Available

    2003-10-01T23:59:59.000Z

    Helping the emerging biotechnology industry develop new tools and methods for real-time analysis of biomass feedstocks, process intermediates and The Biomass Rapid Analysis Network is designed to fast track the development of modern tools and methods for biomass analysis to accelerate the development of the emerging industry. The network will be led by industry and organized and coordinated through the National Renewable Energy Lab. The network will provide training and other activities of interest to BRAN members. BRAN members will share the cost and work of rapid analysis method development, validate the new methods, and work together to develop the training for the future biomass conversion workforce.

  4. Helper's Network Gazette February 1994

    E-Print Network [OSTI]

    1994-01-01T23:59:59.000Z

    Helper's Network Gazette - February 1994 file:///K|/...Helper's%20Gazette%20Newsletter/Beauty%20and%20the%20Beast%20Helper's%20Gazette%201994-02%20(February)%20.htm[3/31/2013 5:37:08 PM] Helpers' Network Gazette - February 1994 a monthly newsletter... for friends of "Beauty and the Beast" Central Hotline: 513-961-3317 or East Hotline: 201-779-6040 Helper's Network, 379 Amazon Ave., Cincinnati, OH 45220-1148 Valentine's Fallout The Valentine's Day B&B Marathon seems to have been only a qualified success: Ray...

  5. CSP 543: Multimedia Networking Atel Puri, Tsuhan Chen, Multimedia Systems, Standards, and Networks, ISBN 082479303X

    E-Print Network [OSTI]

    Heller, Barbara

    CSP 543: Multimedia Networking Texts Atel Puri, Tsuhan Chen, Multimedia Systems, Standards for multimedia networks. Topics covered include coding, compression, streaming, synchronization, QoS, and adaptation. Current tools for multimedia networking will be surveyed. Issues with multimedia application

  6. The application of network coding to multicast routing in wireless networks

    E-Print Network [OSTI]

    Jennings, Michael (Michael Vincent)

    2007-01-01T23:59:59.000Z

    This thesis considers the application of network coding and opportunistic routing to improve the performance of multicast flows in wireless networks. Network coding allows routers to randomly mix packets before forwarding ...

  7. Proactive mobile wireless networks : an infrastructureless wireless network architecture for delay-sensitive applications

    E-Print Network [OSTI]

    Dai, Lillian Lei, 1978-

    2008-01-01T23:59:59.000Z

    Infrastructureless wireless networks are an important class of wireless networks that is best suited for scenarios where there is temporary and localized telecommunication demand. Such networks consist of wireless devices ...

  8. atm research network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to cells The ATM Layer TransmissionSwitchingReception Congestion Jain, Raj 3 PMS: a PVC Management System for ATM Networks CiteSeer Summary: . Reported in this paper is the...

  9. A Biologically Inspired Networking Model for Wireless Sensor Networks 

    E-Print Network [OSTI]

    Charalambous, Charalambos

    2011-02-22T23:59:59.000Z

    in sensor nodes demand energy-aware network control. In this thesis, we propose an energy- efficient topology management model inspired by biological inter-cellular signaling schemes. The model allows sensor nodes to cluster around imminent targets in a...

  10. astrocyte networks theory: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Epilepsy. 1 Paris-Sud XI, Universit de 3 Nonlinear gap junctions enable long-distance propagation of pulsating calcium waves in astrocyte networks Nonlinear Sciences (arXiv)...

  11. Network Infusion to Infer Information Sources in Networks

    E-Print Network [OSTI]

    Feizi, Soheil

    2014-12-02T23:59:59.000Z

    Several models exist for diffusion of signals across biological, social, or engineered networks. However, the inverse problem of identifying the source of such propagated information appears more difficult even in the ...

  12. automotive communication network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 101 SCADA IMPLEMENTATION USING GSM NETWORK FOR COMMUNICATION CiteSeer Summary: Abstract-...

  13. Online Data Gathering for Maximizing Network Lifetime in Sensor Networks

    E-Print Network [OSTI]

    Liang, Weifa

    database, sensornet query optimization. Ç 1 INTRODUCTION RECENT advances in microelectronic technology have, IEEE, and Yuzhen Liu Abstract--Energy-constrained sensor networks have been deployed widely sensors have significant power constraints (battery life), energy efficient methods must be employed

  14. actor network perspective: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    actors and the powerful investment of the public sector in the development of this industry, both as an actor and as a sponsor. Networks in this study primarily refer to...

  15. artificial canal network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 41 Dynamics of artificial spin ice: a continuous honeycomb network MIT - DSpace Summary: We model the...

  16. A Biologically Inspired Networking Model for Wireless Sensor Networks

    E-Print Network [OSTI]

    Charalambous, Charalambos

    2011-02-22T23:59:59.000Z

    Wireless sensor networks (WSNs) have emerged in strategic applications such as target detection, localization, and tracking in battlefields, where the large-scale na- ture renders centralized control prohibitive. In addition, the finite batteries...

  17. agency national network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to this effort-98-1-0225, DARPA Order G409 Quarterly Progress Report 1 October 1999 - 31 December 1999 David L. Mills Electrical previous research in network time...

  18. Wireless Network Simplification: the Gaussian N-Relay Diamond Network

    E-Print Network [OSTI]

    " as opposed to s 1 2 ... N d h1s h2s hNs h1d h2d hNd Fig. 1. The Gaussian N-relay diamond network. The source is the loss in the capacity if we simplify the network by removing all but k of the N relays (for example, if we remove all but one of the relays). The performance loss can depend on the channel gains. Indeed

  19. Distributed downhole drilling network

    DOE Patents [OSTI]

    Hall, David R.; Hall, Jr., H. Tracy; Fox, Joe; Pixton, David S.

    2006-11-21T23:59:59.000Z

    A high-speed downhole network providing real-time data from downhole components of a drilling strings includes a bottom-hole node interfacing to a bottom-hole assembly located proximate the bottom end of a drill string. A top-hole node is connected proximate the top end of the drill string. One or several intermediate nodes are located along the drill string between the bottom-hole node and the top-hole node. The intermediate nodes are configured to receive and transmit data packets transmitted between the bottom-hole node and the top-hole node. A communications link, integrated into the drill string, is used to operably connect the bottom-hole node, the intermediate nodes, and the top-hole node. In selected embodiments, a personal or other computer may be connected to the top-hole node, to analyze data received from the intermediate and bottom-hole nodes.

  20. Quantum social networks

    E-Print Network [OSTI]

    Adan Cabello; Lars Eirik Danielsen; Antonio J. Lopez-Tarrida; Jose R. Portillo

    2012-07-15T23:59:59.000Z

    We introduce a physical approach to social networks (SNs) in which each actor is characterized by a yes-no test on a physical system. This allows us to consider SNs beyond those originated by interactions based on pre-existing properties, as in a classical SN (CSN). As an example of SNs beyond CSNs, we introduce quantum SNs (QSNs) in which actor is characterized by a test of whether or not the system is in a quantum state. We show that QSNs outperform CSNs for a certain task and some graphs. We identify the simplest of these graphs and show that graphs in which QSNs outperform CSNs are increasingly frequent as the number of vertices increases. We also discuss more general SNs and identify the simplest graphs in which QSNs cannot be outperformed.

  1. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    E-Print Network [OSTI]

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106

    2012-01-01T23:59:59.000Z

    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  2. all-or-none network events: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    einzel@ece.rochester.edu Abstract. As wireless sensor networks gain Heinzelman, Wendi 90 Fuzzy neural network pattern recognition algorithm for classification of the events in...

  3. artificial neural networks-particle: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    neural networks, for phosphene localisation are used Rattray, Magnus 69 Dynamic Pattern Recognition in Sport by Means of Artificial Neural Networks Computer Technologies...

  4. SENSID: a Sensor Network Situation

    E-Print Network [OSTI]

    Cardell-Oliver, Rachel

    Engineering, The University of Western Australia, 2005 #12;Abstract In the field of environmental monitoring not allow the network to react to events. It also wastes valuable energy by transmitting all data regardless

  5. Ideally Glassy Hydrogen Bonded Networks

    E-Print Network [OSTI]

    J. C. Phillips

    2005-08-05T23:59:59.000Z

    The axiomatic theory of ideally glassy networks, which has proved effective in describing phase diagrams and properties of chalcogenide and oxide glasses and their foreign interfaces, is broadened here to include intermolecular interactions in hydrogen-bonded polyalcohols such as glycerol, monosaccharides (glucose), and the optimal bioprotective hydrogen-bonded disaccharide networks formed from trehalose. The methods of Lagrangian mechanics and Maxwellian scaffolds are useful at the molecular level when bonding hierarchies are characterized by constraint counting similar to the chemical methods used by Huckel and Pauling. Whereas Newtonian molecular dynamical methods are useful for simulating large-scale interactions for times of order 10 ps, constraint counting describes network properties on glassy (almost equilibrated) time scales, which may be of cosmological order for oxide glasses, or years for trehalose. The ideally glassy network of trehalose may consist of extensible tandem sandwich arrays.

  6. Social networks for lonely objects

    E-Print Network [OSTI]

    Kestner, John Anthony

    2010-01-01T23:59:59.000Z

    Visions of ubiquitous computing describe a network of devices that quietly supports human goals, but this may also add complexity to an already frustrating relationship between humans and their electronic objects. As we ...

  7. Bayesian Discovery of Threat Networks

    E-Print Network [OSTI]

    Smith, Steven T; Senne, Kenneth D; Bernstein, Garrett; Philips, Scott

    2013-01-01T23:59:59.000Z

    A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid interaction model introduced to simulate random covert networks with realistic properties.

  8. Optimization problems in network connectivity

    E-Print Network [OSTI]

    Panigrahi, Debmalya

    2012-01-01T23:59:59.000Z

    Besides being one of the principal driving forces behind research in algorithmic theory for more than five decades, network optimization has assumed increased significance in recent times with the advent and widespread use ...

  9. Energy efficiency in wireless networks

    E-Print Network [OSTI]

    Jung, Eun-Sun

    2005-11-01T23:59:59.000Z

    Energy is a critical resource in the design of wireless networks since wireless devices are usually powered by batteries. Battery capacity is finite and the progress of battery technology is very slow, with capacity expected to make little...

  10. Survivable paths in multilayer networks

    E-Print Network [OSTI]

    Parandehgheibi, Marzieh

    2012-01-01T23:59:59.000Z

    We consider the problem of protection in multilayer networks. In single-layer net- works, a pair of disjoint paths can be used to provide protection for a source-destination pair. However, this approach cannot be directly ...

  11. Social Learning in Social Networks

    E-Print Network [OSTI]

    Lamberson, PJ

    This paper analyzes a model of social learning in a social network. Agents decide whether or not to adopt a new technology with unknown payoffs based on their prior beliefs and the experiences of their neighbors in the ...

  12. Energy efficiency in wireless networks 

    E-Print Network [OSTI]

    Jung, Eun-Sun

    2005-11-01T23:59:59.000Z

    Energy is a critical resource in the design of wireless networks since wireless devices are usually powered by batteries. Battery capacity is finite and the progress of battery technology is very slow, with capacity expected ...

  13. Transient approximations in queueing networks

    E-Print Network [OSTI]

    Andrewartha, John Michael

    1989-01-01T23:59:59.000Z

    TRANSIENT APPROXIMATIONS IN QUEUEING NETWORKS A Thesis by JOHN MICHAEL ANDREWARTHA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE May 1989... Major Subject: Electrical Engineering TRANSIENT APPROXIMATIONS IN QUEUEING NETWORKS A Thesis JOHN MICHAEL ANDREWARTHA Approved as to style and content by: P. E. Cantrell (Chair of Committee) m P7~ W. K. Tsai (Member) J. D. Gibson (Member) R...

  14. Google matrix analysis of directed networks

    E-Print Network [OSTI]

    Leonardo Ermann; Klaus M. Frahm; Dima L. Shepelyansky

    2014-09-01T23:59:59.000Z

    In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tools to classify and rank enormous amount of network information in a way adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency on various examples including World Wide Web, Wikipedia, software architecture, world trade, social and citation networks, brain neural networks, DNA sequences and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos and Random Matrix theory.

  15. The Cost of Attack in Competing Networks

    E-Print Network [OSTI]

    Podobnik, B; Lipic, T; Perc, M; Buldu, J M; Stanley, H E

    2015-01-01T23:59:59.000Z

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor nodes after their long inactivity. However, due to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilie...

  16. Google matrix analysis of directed networks

    E-Print Network [OSTI]

    Leonardo Ermann; Klaus M. Frahm; Dima L. Shepelyansky

    2015-06-19T23:59:59.000Z

    In past ten years, modern societies developed enormous communication and social networks. Their classification and information retrieval processing become a formidable task for the society. Due to the rapid growth of World Wide Web, social and communication networks, new mathematical methods have been invented to characterize the properties of these networks on a more detailed and precise level. Various search engines are essentially using such methods. It is highly important to develop new tools to classify and rank enormous amount of network information in a way adapted to internal network structures and characteristics. This review describes the Google matrix analysis of directed complex networks demonstrating its efficiency on various examples including World Wide Web, Wikipedia, software architecture, world trade, social and citation networks, brain neural networks, DNA sequences and Ulam networks. The analytical and numerical matrix methods used in this analysis originate from the fields of Markov chains, quantum chaos and Random Matrix theory.

  17. Tensor network states and geometry

    E-Print Network [OSTI]

    G. Evenbly; G. Vidal

    2011-06-06T23:59:59.000Z

    Tensor network states are used to approximate ground states of local Hamiltonians on a lattice in D spatial dimensions. Different types of tensor network states can be seen to generate different geometries. Matrix product states (MPS) in D=1 dimensions, as well as projected entangled pair states (PEPS) in D>1 dimensions, reproduce the D-dimensional physical geometry of the lattice model; in contrast, the multi-scale entanglement renormalization ansatz (MERA) generates a (D+1)-dimensional holographic geometry. Here we focus on homogeneous tensor networks, where all the tensors in the network are copies of the same tensor, and argue that certain structural properties of the resulting many-body states are preconditioned by the geometry of the tensor network and are therefore largely independent of the choice of variational parameters. Indeed, the asymptotic decay of correlations in homogeneous MPS and MERA for D=1 systems is seen to be determined by the structure of geodesics in the physical and holographic geometries, respectively; whereas the asymptotic scaling of entanglement entropy is seen to always obey a simple boundary law -- that is, again in the relevant geometry. This geometrical interpretation offers a simple and unifying framework to understand the structural properties of, and helps clarify the relation between, different tensor network states. In addition, it has recently motivated the branching MERA, a generalization of the MERA capable of reproducing violations of the entropic boundary law in D>1 dimensions.

  18. Entanglement Distribution in Optical Networks

    E-Print Network [OSTI]

    Alex Ciurana; Vicente Martin; Jesus Martinez-Mateo; Bernhard Schrenk; Momtchil Peev; Andreas Poppe

    2014-09-21T23:59:59.000Z

    The ability to generate entangled photon-pairs over a broad wavelength range opens the door to the simultaneous distribution of entanglement to multiple users in a network by using centralized sources and flexible wavelength-division multiplexing schemes. Here we show the design of a metropolitan optical network consisting of tree-type access networks whereby entangled photon-pairs are distributed to any pair of users, independent of their location. The network is constructed employing commercial off-the-shelf components and uses the existing infrastructure, which allows for moderate deployment costs. We further develop a channel plan and a network-architecture design to provide a direct optical path between any pair of users, thus allowing classical and one-way quantum communication as well as entanglement distribution. This allows the simultaneous operation of multiple quantum information technologies. Finally, we present a more flexible backbone architecture that pushes away the load limitations of the original network design by extending its reach, number of users and capabilities.

  19. Transportation Science and the Dynamics of Critical Infrastructure Networks with

    E-Print Network [OSTI]

    Nagurney, Anna

    Inequalities · A New Network Performance/Efficiency Measure with Applications to Critical Infrastructure, and Energy Networks #12;Components of Common Physical Networks Network System Nodes Links Flows Transportation Intersections, Homes, Workplaces, Airports, Railyards Roads, Airline Routes, Railroad Track

  20. Scheduling in switched queueing networks with heavy-tailed trac

    E-Print Network [OSTI]

    Markakis, Mihalis G

    2013-01-01T23:59:59.000Z

    We study scheduling problems arising in switched queueing networks, a class of stochastic systems that are often used to model data communication networks, such as uplinks and downlinks of cellular networks, networks of ...

  1. A Multiple Network Approach to Corporate Governance

    E-Print Network [OSTI]

    Bonacina, Fausto; Moretto, Enrico; Stefani, Silvana; Torriero, Anna

    2014-01-01T23:59:59.000Z

    In this work, we consider Corporate Governance ties among companies from a multiple network perspective. Such a structurenaturally arises from the close interrelation between the Shareholding Network and the Board of Directors network. Inorder to capture the simultaneous effects on both networks on Corporate Governance, we propose to model the Corporate Governance multiple network structure via tensor analysis. In particular, we consider the TOPHITS model, based on the PARAFAC tensor decomposition, to show that tensor techniques can be successfully applied in this context. After providing some empirical results from the Italian financial market in the univariate case, we will show that a tensor-based multiple network approach can reveal important information.

  2. Optimization of synchronization in gradient clustered networks

    E-Print Network [OSTI]

    Xingang Wang; Liang Huang; Ying-Cheng Lai; Choy Heng Lai

    2007-11-23T23:59:59.000Z

    We consider complex clustered networks with a gradient structure, where sizes of the clusters are distributed unevenly. Such networks describe more closely actual networks in biophysical systems and in technological applications than previous models. Theoretical analysis predicts that the network synchronizability can be optimized by the strength of the gradient field but only when the gradient field points from large to small clusters. A remarkable finding is that, if the gradient field is sufficiently strong, synchronizability of the network is mainly determined by the properties of the subnetworks in the two largest clusters. These results are verified by numerical eigenvalue analysis and by direct simulation of synchronization dynamics on coupled-oscillator networks.

  3. Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications

    E-Print Network [OSTI]

    Abbasi, Alireza; Wigand, Rolf T

    2015-01-01T23:59:59.000Z

    We propose new direction to understanding evolutionary dynamics of complex networks using two different types of collaboration networks: academic collaboration networks; and, disaster collaboration networks. The results show that academic collaboration network has all properties of small-world networks and can be considered a real small-world network with the result of its structural analysis maybe being extendable for other real-networks who share the common grounds of small-world properties.

  4. Better Buildings Residential Network Reporting and Benefits Template

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Reporting and Benefits Template, from the U.S. Department of Energy Better Buildings Residential Network.

  5. Better Buildings Residential Network Reporting and Benefits FAQ

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Reporting and Benefits FAQ, from the U.S. Department of Energy Better Buildings Residential Network.

  6. GLOBAL OPTIMIZATION OF PIPE NETWORKS BY THE INTERVAL ...

    E-Print Network [OSTI]

    2011-11-20T23:59:59.000Z

    GLOBAL OPTIMIZATION OF PIPE NETWORKS. BY THE INTERVAL ANALYSIS APPROACH: THE BELGIUM NETWORK CASE. J. FRÉDÉRIC BONNANS ...

  7. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  8. Better Buildings Network View | May 2014 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    May 2014 More Documents & Publications Better Buildings Network View | July-August 2014 Better Buildings Network View | June...

  9. A Flexible Reservation Algorithm for Advance Network Provisioning

    E-Print Network [OSTI]

    Balman, Mehmet

    2010-01-01T23:59:59.000Z

    A Flexible Reservation Algorithm for Advance Networkusers’ requirements. Flexible Network Reservation: Wea new service, called Flexible Network Reservation Service,

  10. A Transportation Network EfficiencyA Transportation Network Efficiency Measure that Captures Flows,Measure that Captures Flows,

    E-Print Network [OSTI]

    Nagurney, Anna

    Guire, and Winsten (1956), that electric power generation and distribution networks can be reformulated and solved of Electric Power Supply Chain NetworksPower Supply Chain Networks Electric Power Supply Transportation Chain Component Importanceto Network Component Importance Identification and Vulnerability

  11. On the Throughput Capacity of Heterogeneous Wireless Networks

    E-Print Network [OSTI]

    Latchman, Haniph A.

    On the Throughput Capacity of Heterogeneous Wireless Networks Pan Li, Member, IEEE, and Yuguang of wireless networks. However, it is commonly assumed that all nodes in the network are identical. The issue of heterogeneous wireless networks with general network settings. Specifically, we consider an extended network

  12. A Network Efficiency Measure with Applications to Critical Infrastructure

    E-Print Network [OSTI]

    Nagurney, Anna

    Satellite and Undersea Cable Networks British Electricity Grid Some Critical Infrastructure Networks #12 by Beckmann, McGuire, and Winsten (1956), that electric power generation and distribution networks can Reformulation of Electric Power Supply Chain Networks Electric Power Supply Transportation Chain Network Network

  13. Challenging Issues in Multimedia Transmission over Wireless Networks Based on Network Coding

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Challenging Issues in Multimedia Transmission over Wireless Networks Based on Network Coding Nguyen.debbah@supelec.fr Abstract--To meet increasing throughput, delay and reliability demands, future wireless networks will have. This paper focuses on two research directions for multimedia transmission over wireless networks based

  14. Closing the Loop over Wireless Networks:Closing the Loop over Wireless Networks: Fundamentals and Applications

    E-Print Network [OSTI]

    Johansson, Karl Henrik

    4/9/2008 1 Closing the Loop over Wireless Networks:Closing the Loop over Wireless Networks Johansson, Pan Gun Park, Emmanuel Witrant Closing the Loop over Wireless Networks:Closing the Loop over Wireless Networks: Fundamentals and Applications Karl H. Johansson Electrical Engineering, Royal Institute

  15. Extension of the Semantic Sensor Network Ontology for Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Extension of the Semantic Sensor Network Ontology for Wireless Sensor Networks: The Stimulus Wireless Se- mantic Sensor Network ontology, in an agri-environmental scenario to illustrate the interest technolo- gies, Wireless Sensor Network (WSN) becomes widely used. WSN usually consists of a set

  16. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li: cslui@cse.cuhk.edu.hk Abstract--Pollution attack is a severe security problem in network-coding enabled spreading of polluted packets to deplete network resources. We address this security problem even when

  17. SUBMITTED TO IEEE/ACM TRANSACTIONS ON NETWORKING 1 Lattice Networks: Capacity Limits, Optimal Routing

    E-Print Network [OSTI]

    Beferull-Lozano, Baltasar

    networks. Such networks are used in regular settings like grid computing and can be seen that achieve the maximum rate. Index Terms Lattice networks, square grid, torus, routing, queueing theory] and wired circuits such as CMOS circuits and CCD-based devices [4]. Lattice networks are also known as grid

  18. Psy 992 Social Network Analysis Syllabus 1 Social Network Analysis (Psy 992)

    E-Print Network [OSTI]

    Liu, Taosheng

    Psy 992 Social Network Analysis Syllabus 1 Social Network Analysis (Psy 992) Fall 2012 Instructor: Social network analysis is a distinct approach to research that focuses on the structure of relationships collection methodologies, and analysis of social networks. Specifically, we will begin the course by focusing

  19. Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey

    E-Print Network [OSTI]

    Kaiser, Gail E.

    Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey The Social Networks and Online Privacy Concerns Survey is part of a research project survey #12;0% 100% Yes Unsure No Yes Unsure No Social Networks and Online Privacy Concerns Survey

  20. Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks

    E-Print Network [OSTI]

    Moura, José

    Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks Saeed A study distributed detection in a sensor network where the sensors cooperate by exchanging information distributed decision making algorithms in the network. This is a difficult problem since it corresponds

  1. Progressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks

    E-Print Network [OSTI]

    Chen, Yuanzhu Peter

    . This paper considers the multi-hop transmission prob- lem in wireless ad-hoc networks. In a three-node sce of multi- hop transmission. The new framework, exploiting the technology of progressive network codingProgressive Network Coding for Message-Forwarding in Ad-Hoc Wireless Networks Xingkai Bao and Jing

  2. On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks

    E-Print Network [OSTI]

    Lui, John C.S.

    1 On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks Ray K. Lam Dah. This paper studies the use of pricing as an incentive mechanism to stimulate participation and collaboration in public wireless mesh networks. Our focus is on the "economic behavior" of the network nodes-- the pricing

  3. NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System

    E-Print Network [OSTI]

    Ezeife, Christie

    NeuDetect: A Neural Network Data Mining Wireless Network Intrusion Detection System C.I. Ezeife wireless intrusion detection systems, this paper presents a method of applying artificial neural networks mining clas- sification technique to wireless network intrusion detection system. The proposed system

  4. The Community Seismic Network and Quake-Catcher Network: enabling structural health monitoring through instrumentation by

    E-Print Network [OSTI]

    Greer, Julia R.

    The Community Seismic Network and Quake-Catcher Network: enabling structural health monitoring ABSTRACT A new type of seismic network is in development that takes advantage of community volunteers to install low-cost ac- celerometers in houses and buildings. The Community Seismic Network and Quake

  5. Networked Computing in Wireless Sensor Networks for Structural Health Monitoring

    E-Print Network [OSTI]

    Jindal, Apoorva

    2010-01-01T23:59:59.000Z

    This paper studies the problem of distributed computation over a network of wireless sensors. While this problem applies to many emerging applications, to keep our discussion concrete we will focus on sensor networks used for structural health monitoring. Within this context, the heaviest computation is to determine the singular value decomposition (SVD) to extract mode shapes (eigenvectors) of a structure. Compared to collecting raw vibration data and performing SVD at a central location, computing SVD within the network can result in significantly lower energy consumption and delay. Using recent results on decomposing SVD, a well-known centralized operation, into components, we seek to determine a near-optimal communication structure that enables the distribution of this computation and the reassembly of the final results, with the objective of minimizing energy consumption subject to a computational delay constraint. We show that this reduces to a generalized clustering problem; a cluster forms a unit on w...

  6. Flexible network wireless transceiver and flexible network telemetry transceiver

    DOE Patents [OSTI]

    Brown, Kenneth D. (Grain Valley, MO)

    2008-08-05T23:59:59.000Z

    A transceiver for facilitating two-way wireless communication between a baseband application and other nodes in a wireless network, wherein the transceiver provides baseband communication networking and necessary configuration and control functions along with transmitter, receiver, and antenna functions to enable the wireless communication. More specifically, the transceiver provides a long-range wireless duplex communication node or channel between the baseband application, which is associated with a mobile or fixed space, air, water, or ground vehicle or other platform, and other nodes in the wireless network or grid. The transceiver broadly comprises a communication processor; a flexible telemetry transceiver including a receiver and a transmitter; a power conversion and regulation mechanism; a diplexer; and a phased array antenna system, wherein these various components and certain subcomponents thereof may be separately enclosed and distributable relative to the other components and subcomponents.

  7. Motivation Literature Network Performance Measure Network Robustness SCN Model Fin. Net. Model Conclusions Network Efficiency/Performance Measurement

    E-Print Network [OSTI]

    Nagurney, Anna

    Conclusions Network Efficiency/Performance Measurement with Vulnerability and Robustness Analysis Conclusions 1 Motivation 2 Literature Review 3 Network Efficiency/Performance Measure Variational Inequality Robustness SCN Model Fin. Net. Model Conclusions 1 Motivation 2 Literature Review 3 Network Efficiency/Performance

  8. Digital control networks for virtual creatures 

    E-Print Network [OSTI]

    Bainbridge, Christopher James

    2010-01-01T23:59:59.000Z

    Robot control systems evolved with genetic algorithms traditionally take the form of floating-point neural network models. This thesis proposes that digital control systems, such as quantised neural networks and logical ...

  9. Activity based interfaces in online social networks

    E-Print Network [OSTI]

    Laraqui, Jawad

    2007-01-01T23:59:59.000Z

    The goal of the project is to explore how activity-based interfaces can create more meaningful experiences for the users and builders of online social networking sites. Medina, a social-networking site based on the idea ...

  10. OFC/NFOEC '12 Summary --Elastic Networks

    E-Print Network [OSTI]

    California at Davis, University of

    DWDMNetworks regarding CAPEX and Power Consumption Axel Klekamp ALU Traffic Engineering and Network Planning consumption and CAPEX for MLR and Elastic Networks. No. of transponders and fibers used is less in elastic

  11. Poisoning the Kad Network Thomas Locher1

    E-Print Network [OSTI]

    Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 all messages. Additionally, we briefly discuss how our network poisoning attacks can also be used

  12. Fragile Networks: Identifying Vulnerabilities and Synergies

    E-Print Network [OSTI]

    Nagurney, Anna

    , Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions as the major theme. #12;Interdisciplinary Impact of Networks Networks Energy Manufacturing Telecommunications

  13. Virtual infrastructure for wireless ad hoc networks

    E-Print Network [OSTI]

    Gilbert, Seth, 1976-

    2007-01-01T23:59:59.000Z

    One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

  14. Scalable and Efficient Self-configuring Networks

    E-Print Network [OSTI]

    Singh, Jaswinder Pal

    Network Technical Obstacles Approach 10 Strategic Approach for Practical Solutions Clean Slate Backwards slate on network Clean slate on end hosts Backwards compatible · Heterogeneity of end-host environments

  15. Re-engineering knowledge networks for development

    E-Print Network [OSTI]

    Raghavan, Amrith, 1976-

    2004-01-01T23:59:59.000Z

    This thesis examines the evolution of Internet based knowledge networks (e-knowledge networks) in the domain of sustainable development. The objective of this thesis is to use an engineering systems approach to understand ...

  16. Sensor network localization based on natural phenomena

    E-Print Network [OSTI]

    Kim, Daniel Sang

    2006-01-01T23:59:59.000Z

    Autonomous localization is crucial for many sensor network applications. The goal of this thesis is to develop a distributed localization algorithm for the PLUG indoor sensor network by analyzing sound and light sensory ...

  17. Epidemic Propagation In Overlaid Wireless Networks

    SciTech Connect (OSTI)

    Yanmaz, Evsen [Los Alamos National Laboratory

    2008-01-01T23:59:59.000Z

    Witb tbe emergence of computer worms tbat can spread over air interfaces, wireless ad boc and sensor networks can be vulnerable to node compromises even if the deployed network is not connected to the backbone. Depending on the physical topology of the wireless network, even a single infected node can compromise the whole network. In this work, epidemic (e.g., worm) propagation in a static wireless network is studied, where a number of inCected mobile nodes are injected over the existing network. It is shown that the epidemic spread threshold and size depend on the physical topology of the underlying static wireless network as well as the mobility model employed by the infected mobile nodes. More specifically, results show that in a Cully-connected static wirelessnctwork targeted attacks are more effective, wbereas Cor a random topology random attacks can be sufficient to compromise the whole network.

  18. Network Television and the Digital Threat

    E-Print Network [OSTI]

    Lapan, Lisa

    2009-01-01T23:59:59.000Z

    NETWORK TV AND THE DIGITAL THREAT tertainment are availableNETWORK TV AND THE DIGITAL THREAT luring users to watch the91 Ryan Nakashima, Digital Threat Prompts Movie Industry

  19. Essays on social networks in development economics

    E-Print Network [OSTI]

    Chandrasekhar, Arun Gautham

    2012-01-01T23:59:59.000Z

    This thesis examines the role that social networks play in developing economies. The first two chapters analyze econometric issues that arise when researchers work with sampled network data. The final two chapters study ...

  20. Adaptive sampling in autonomous marine sensor networks

    E-Print Network [OSTI]

    Eickstedt, Donald Patrick

    2006-01-01T23:59:59.000Z

    In this thesis, an innovative architecture for real-time adaptive and cooperative control of autonomous sensor platforms in a marine sensor network is described in the context of the autonomous oceanographic network scenario. ...

  1. On the robustness of clustered sensor networks 

    E-Print Network [OSTI]

    Cho, Jung Jin

    2009-05-15T23:59:59.000Z

    Smart devices with multiple on-board sensors, networked through wired or wireless links, are distributed in physical systems and environments. Broad applications of such sensor networks include manufacturing quality control and wireless sensor...

  2. Information Flow Analysis of Interactome Networks

    E-Print Network [OSTI]

    Liu, Kesheng

    Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or ...

  3. Robust Clock Synchronization in Wireless Sensor Networks

    E-Print Network [OSTI]

    Saibua, Sawin

    2010-10-12T23:59:59.000Z

    Clock synchronization between any two nodes in a Wireless Sensor Network (WSNs) is generally accomplished through exchanging messages and adjusting clock offset and skew parameters of each node’s clock. To cope with unknown network message delays...

  4. australia: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the receiver. Since network elements along the path also modify the TTL, the capacity and stealth in the future due to new high-speed network technologies. Covert channels can be...

  5. Semantic associative network for text analysis (SANTA)

    E-Print Network [OSTI]

    Airhart, Robert William

    2000-01-01T23:59:59.000Z

    Based on theories of associations, the Semantic Associative Network for Text Analysis (SANTA) has been developed. Nodes in the network represent words and links between nodes represent the association strengths between them. The links are adjusted...

  6. Exploiting Heterogeneity in Sensor Networks Mark Yarvis

    E-Print Network [OSTI]

    Singh, Suresh

    lifetime and reliability without significantly increasing the cost. For example, Intel has deployed a pilot provide in-network data proc- essing, longer-term storage, and access to building network infrastructures

  7. Training Algorithms for Networks of Spiking Neurons

    E-Print Network [OSTI]

    Singh, Nityendra

    2014-12-08T23:59:59.000Z

    Neural networks represent a type of computing that is based on the way that the brain performs computations. Neural networks are good at fitting non-linear functions and recognizing patterns. It is believed that biological neurons work similar...

  8. The Multi-Network Design Problem

    E-Print Network [OSTI]

    Balakrishnan, Anantaram

    This paper studies a new multi-facility network synthesis problem, called the Multi-level Network Design (MLND) problem, that arises in the topological design of hierarchical communication, transportation, and electric ...

  9. Online Games, Virtual Worlds, and Social Networks

    E-Print Network [OSTI]

    Hemmers, Oliver

    JOUR 447: Online Games, Virtual Worlds, and Social Networks Virtual Island Making #12;One element in the look and design of the virtual islands. JOUR 447: Online Games, Virtual Worlds, and Social Networks

  10. A Sociospatial Approach to Understanding Terrorist Networks

    SciTech Connect (OSTI)

    Medina, Richard M [ORNL; Hepner, George F. [University of Utah

    2011-01-01T23:59:59.000Z

    Terrorist networks operate in hybrid space where activities in social and geographic spaces are necessary for logistics and security. The Islamist terrorist network is analyzed as a sociospatial system using social network analysis, Geographic Information Science (GISc), and novel techniques designed for hybrid space analyses. This research focuses on identifying distance and sociospatial dependencies within the terrorist network. A methodology for analyzing sociospatial systems is developed and results lead to a greater understanding of terrorist network structures and activities. Distance and sociospatial dependencies are shown to exist for the Islamist terrorist network structure. These findings are discordant with recent literature that focuses on terrorist network tendencies toward decentralization in the information age. In this research, the Islamist terrorist network is theorized to use multiple structures of hierarchical and decentralized organization for effectiveness, efficiency, and resilience. Implications for counterterrorism policy and strategies are given.

  11. An Anonymous Social Network of Opinions

    E-Print Network [OSTI]

    Haralabopoulos, Giannis

    2015-01-01T23:59:59.000Z

    Research interest on Online Social Networks, has increased dramatically over the last decade, mainly because online networks provide a vast source of social information. Graph structure, user connections, growth, information exposure and diffusion of online social networks, are some of the most frequently researched subjects. However, some areas of these networks are overlooked or even unconsidered, such as anonymity, equality and bias. In the limited bibliography available, such features seem to be influential to social interactions. Based on an extensive thinking of these studies, we aim to determine how universal anonymity affects: bias, user equality, information propagation, sharing and exposure, connection establishment and network structure. Thus we propose a new Anonymous Online Social Network, which will facilitate every type of monitoring and data analysis. A network that will provide an insight to our scientific pursues, which would be impossible to research in traditional Online Social Networks.

  12. Issues in autonomous mobile sensor networks

    E-Print Network [OSTI]

    Dharne, Avinash Gopal

    2009-05-15T23:59:59.000Z

    Autonomous mobile sensor networks consist of a number of autonomous mobile robots equipped with various sensors and tasked with a common mission. This thesis considers the topology control of such an ad hoc mobile sensor network. In particular, I...

  13. Decision Models for Bulk Energy Transportation Networks

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    emissions prices? How would CO2 regulations impact coal, gas, electricity, & SO2 markets? 3. Disruptions1 Decision Models for Bulk Energy Transportation Networks Electrical Engineering Professor Jim Mc: · integrated fuel, electricity networks · environmental impacts · electricity commodity markets · behavior

  14. Shortest Paths, Network Design and Associated Polyhedra

    E-Print Network [OSTI]

    Magnanti, Thomas L.

    We study a specialized version of network design problems that arise in telecommunication, transportation and other industries. The problem, a generalization of the shortest path problem, is defined on an undirected network ...

  15. Peak Oil Food Network | Open Energy Information

    Open Energy Info (EERE)

    Butte, Colorado Zip: 81224 Website: http:www.PeakOilFoodNetwork. References: Peak Oil Food Network1 This article is a stub. You can help OpenEI by expanding it. The Peak...

  16. Examining Anomalous Network Performance with Confidence

    SciTech Connect (OSTI)

    Settlemyer, Bradley W [ORNL] [ORNL; Hodson, Stephen W [ORNL] [ORNL; Kuehn, Jeffery A [ORNL] [ORNL; Poole, Stephen W [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Variability in network performance is a major obstacle in effectively analyzing the throughput of modern high performance computer systems. High performance interconnection networks offer excellent best-case network latencies; however, highly parallel applications running on parallel machines typically require consistently high levels of performance to adequately leverage the massive amounts of available computing power. Performance analysts have usually quantified network performance using traditional summary statistics that assume the observational data is sampled from a normal distribution. In our examinations of network performance, we have found this method of analysis often provides too little data to understand anomalous network performance. In particular, we examine a multi-modal performance scenario encountered with an Infiniband interconnection network and we explore the performance repeatability on the custom Cray SeaStar2 interconnection network after a set of software and driver updates.

  17. Diagnosing Anomalous Network Performance with Confidence

    SciTech Connect (OSTI)

    Settlemyer, Bradley W [ORNL] [ORNL; Hodson, Stephen W [ORNL] [ORNL; Kuehn, Jeffery A [ORNL] [ORNL; Poole, Stephen W [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Variability in network performance is a major obstacle in effectively analyzing the throughput of modern high performance computer systems. High performance interconnection networks offer excellent best-case network latencies; however, highly parallel applications running on parallel machines typically require consistently high levels of performance to adequately leverage the massive amounts of available computing power. Performance analysts have usually quantified network performance using traditional summary statistics that assume the observational data is sampled from a normal distribution. In our examinations of network performance, we have found this method of analysis often provides too little data to understand anomalous network performance. In particular, we examine a multi-modal performance scenario encountered with an Infiniband interconnection network and we explore the performance repeatability on the custom Cray SeaStar2 interconnection network after a set of software and driver updates.

  18. Improved techniques for passive optical networks

    E-Print Network [OSTI]

    Jorgesen, Douglas Ryan Tourtillott

    2010-01-01T23:59:59.000Z

    for WDM Access Networks with Downstream DPSK and UpstreamReturn to Zero (RZ) Coded Downstream and NRZ Upstream Re-Access Network Scheme with Downstream Manchester Coding and

  19. Underwater Data Collection Using Robotic Sensor Networks

    E-Print Network [OSTI]

    Hollinger, Geoffrey A.

    We examine the problem of utilizing an autonomous underwater vehicle (AUV) to collect data from an underwater sensor network. The sensors in the network are equipped with acoustic modems that provide noisy, range-limited ...

  20. Percolation of secret correlations in a network

    E-Print Network [OSTI]

    Raul, Garcia-Patron

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks—more precisely, the question of percolation of secret correlations in a network. It is known that ...

  1. Computing with Mobile Agents in Distributed Networks

    E-Print Network [OSTI]

    Kranakis, Evangelos

    .......................... 1-12 1.7 Network Decontamination and Black Holes ....... 1-15 Network decontamination · Black holes the decontamination problem and black hole search. 1.2 Modeling Mobile Agents in Distribu

  2. Bayesian network learning and applications in Bioinformatics

    E-Print Network [OSTI]

    Lin, Xiaotong

    2012-08-31T23:59:59.000Z

    in biological processes, such as the relationships among genes and genes' products in regulatory networks and signaling pathways. This con- cept leads to a novel algorithm for dynamic Bayesian network learning. We apply it to time-series microarray gene...

  3. Clock synchronization for mobile ad hoc networks 

    E-Print Network [OSTI]

    Chandra, Rajan

    2013-02-22T23:59:59.000Z

    As mobile networking advances, there is a need for services such as clock synchronization that improve performance and support the development of higher-level applications. This can be achieved by adapting existing algorithms (such as the Network...

  4. Optimal Energy Savings in Cellular Access Networks

    E-Print Network [OSTI]

    , for a holistic approach to energy efficient networking. In this paper we tackle the issue of energy-aware manage customer premises networking equipment. This situation, coupled with increasing energy costs, has generated

  5. An algorithmic approach to social networks

    E-Print Network [OSTI]

    Liben-Nowell, David

    2005-01-01T23:59:59.000Z

    Social networks consist of a set of individuals and some form of social relationship that ties the individuals together. In this thesis, we use algorithmic techniques to study three aspects of social networks: (1) we analyze ...

  6. Improving Network Reliability: Analysis, Methodology, and Algorithms

    E-Print Network [OSTI]

    Booker, Graham B.

    2010-07-14T23:59:59.000Z

    The reliability of networking and communication systems is vital for the nation's economy and security. Optical and cellular networks have become a critical infrastructure and are indispensable in emergency situations. This dissertation outlines...

  7. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Attacks Against Water SCADA Systems . . . . . . . . . .2 d (bottom) [simulated results]. . Gignac SCADA supervisoryGignac canal network and SCADA system . . . . . . . . .

  8. INFORMATION ENGINEERING Principles, Technologies, Networks, and Applications

    E-Print Network [OSTI]

    Huang, Jianwei

    AccessApplications Smartgrids,GreenCommunications TelecommunicationSwitching Peer-to-PeerSystems OnlineSocialNetworks Internet

  9. The Tenet Architecture for Tiered Sensor Networks

    E-Print Network [OSTI]

    2006-01-01T23:59:59.000Z

    architec- ture for structural health monitoring. In S. -C.network for structural health monitoring: Performance and

  10. E-print Network Topics: I

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    field integrated physical mapping integrated piezoelectric actuator integrated pig manure integrated pilot plant integrated pipeline network integrated pixel readout...

  11. A User Driven Dynamic Circuit Network Implementation

    SciTech Connect (OSTI)

    Guok, Chin; Robertson, David; Chaniotakis, Evangelos; Thompson, Mary; Johnston, William; Tierney, Brian

    2008-10-01T23:59:59.000Z

    The requirements for network predictability are becoming increasingly critical to the DoE science community where resources are widely distributed and collaborations are world-wide. To accommodate these emerging requirements, the Energy Sciences Network has established a Science Data Network to provide user driven guaranteed bandwidth allocations. In this paper we outline the design, implementation, and secure coordinated use of such a network, as well as some lessons learned.

  12. Percolation of secret correlations in a network

    SciTech Connect (OSTI)

    Leverrier, Anthony; Garcia-Patron, Raul [ICFO-Institut de Ciencies Fotoniques, 08860 Castelldefels (Barcelona) (Spain); Research Laboratory of Electronics, MIT, Cambridge, MA 02139 (United States) and Max-Planck Institut fur Quantenoptik, Hans-Kopfermann Str. 1, D-85748 Garching (Germany)

    2011-09-15T23:59:59.000Z

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks--more precisely, the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.

  13. Associative memory in phasing neuron networks

    SciTech Connect (OSTI)

    Nair, Niketh S [ORNL; Bochove, Erik J. [United States Air Force Research Laboratory, Kirtland Air Force Base; Braiman, Yehuda [ORNL

    2014-01-01T23:59:59.000Z

    We studied pattern formation in a network of coupled Hindmarsh-Rose model neurons and introduced a new model for associative memory retrieval using networks of Kuramoto oscillators. Hindmarsh-Rose Neural Networks can exhibit a rich set of collective dynamics that can be controlled by their connectivity. Specifically, we showed an instance of Hebb's rule where spiking was correlated with network topology. Based on this, we presented a simple model of associative memory in coupled phase oscillators.

  14. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    SciTech Connect (OSTI)

    Kim, M; Leskovec, J

    2011-11-14T23:59:59.000Z

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  15. Clock synchronization for mobile ad hoc networks

    E-Print Network [OSTI]

    Chandra, Rajan

    2013-02-22T23:59:59.000Z

    Time Protocol) used in wired networks (e.g. Internet) to Mobile Ad Hoc Networks (MANets). It may also be achieved by developing other algorithms that achieve clock synchronization and may be suitable for MANets. Using the Network Time Protocol (NTP...

  16. Network With Costs: Timing and Flow Decomposition

    E-Print Network [OSTI]

    Bruck, Jehoshua (Shuki)

    Network With Costs: Timing and Flow Decomposition Shreeshankar Bodas, Jared Grubb, Sriram Sridharan-- This paper analyzes a capacitated network with costs from an information theoretic point of view. Determines a flow decomposition for a network with costs starting from an information theoretic point of view

  17. Communication in automation, including networking and wireless

    E-Print Network [OSTI]

    Antsaklis, Panos

    Communication in automation, including networking and wireless Nicholas Kottenstette and Panos J and networking in automation is given. Digital communication fundamentals are reviewed and networked control are presented. 1 Introduction 1.1 Why communication is necessary in automated systems Automated systems use

  18. Detecting Network Vulnerabilities Through Graph Theoretical Methods

    E-Print Network [OSTI]

    Geddes, Cameron Guy Robinson

    vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

  19. Robust Network Design: Formulations, Valid Inequalities, and ...

    E-Print Network [OSTI]

    2011-08-31T23:59:59.000Z

    Aug 31, 2011 ... network equipment guaranteeing a routing for all considered (data) traffic ... leads to a wastage of network capacities, investments, and energy. ... cost-efficient telecommunication networks the uncertainty of future ..... Since this model is at the center of this paper, we prove the dimension of its polyhedron.

  20. On Achieving Optimal Throughput with Network Coding

    E-Print Network [OSTI]

    Li, Baochun

    to the problem of optimizing end-to- end throughput in undirected data networks. We first illustrate the powerOn Achieving Optimal Throughput with Network Coding Zongpeng Li, Baochun Li, Dan Jiang, Lap Chi Lau Abstract-- With the constraints of network topologies and link capacities, achieving the optimal end

  1. The CloudNets Network Virtualization Architecture

    E-Print Network [OSTI]

    Schmid, Stefan

    Nets Network Virtualization Architecture Johannes Grassler jgrassler@inet.tu-berlin.de 05. Februar, 2014 Johannes Grassler jgrassler@inet.tu-berlin.de The CloudNets Network Virtualization Architecture #12;..... . .... . .... . ..... . .... . .... . .... . ..... . .... . .... . .... . ..... . .... . .... . .... . ..... . .... . ..... . .... . .... . Johannes Grassler jgrassler@inet.tu-berlin.de The CloudNets Network Virtualization Architecture #12

  2. Challenges in Multimedia Networking Aurel A. Lazar

    E-Print Network [OSTI]

    Columbia University

    1 Challenges in Multimedia Networking Aurel A. Lazar Department of Electrical Engineering@ctr.columbia.edu Abstract We analyze the challenges encountered in realizing scalable multimedia networks with quality the network and the multimedia devices, (ii) multimedia abstrac- tions with QOS guarantees, and (iii

  3. THE GEOMETRY OF NETWORKS OLIVER KNILL

    E-Print Network [OSTI]

    Knill, Oliver

    in fashion? It is not only that the world wide web, social networks, research on proteins, or nano, nanotechnology, web tomography, social networks or loop quantum gravity. In math- ematics it allows to look · word connections and associations · the brain as a neural network · artificial intelligence questions

  4. EEL 6591: Wireless Networks Spring 2014

    E-Print Network [OSTI]

    Latchman, Haniph A.

    EEL 6591: Wireless Networks Spring 2014 Instructor: Professor Yuguang "Michael" Fang Contact: 435-Hall, 2002. References: 1. Broadband Wireless Multimedia Networks by Benny Bing, John Wiley, 2013. 2. Wireless and Mobile Network Architecture by Yi-Bing Lin and Imrich Chlamtac, John Wiley & Sons, 2000. 3

  5. Networks in Buildings: Which Path Forward?

    SciTech Connect (OSTI)

    Nordman, Bruce

    2008-08-17T23:59:59.000Z

    To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

  6. Radioactive Target Detection Using Wireless Sensor Network

    E-Print Network [OSTI]

    Zhang, Tonglin

    Chapter 31 Radioactive Target Detection Using Wireless Sensor Network Tonglin Zhang Abstract for wireless sensor network data to detect and locate a hidden nuclear target in a large study area. The method assumes multiple radiation detectors have been used as sensor nodes in a wireless sensor network

  7. Gradient Clock Synchronization in Wireless Sensor Networks

    E-Print Network [OSTI]

    Gradient Clock Synchronization in Wireless Sensor Networks Philipp Sommer Computer Engineering- olution. Without doubt, time is a first-class citizen in wireless sensor networks. Without accurate time if the nodes in the wireless sensor network manage to have an adequate agreement of time. Indeed

  8. Optimal Deployment of Impromptu Wireless Sensor Networks

    E-Print Network [OSTI]

    Kumar, Anurag

    Optimal Deployment of Impromptu Wireless Sensor Networks Prasenjit Mondal, K. P. Naveen and Anurag to deploy sensors (such as motion sensors, or even imaging sensors) and a wireless interconnection network an impromptu deploy- ment of a wireless sensor network in a building. Fig. 2. Problem studied in this paper

  9. A Virtual Infrastructure for Wireless Sensor Networks

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    &CHAPTER 4 A Virtual Infrastructure for Wireless Sensor Networks STEPHAN OLARIU and QINGWEN XU Old, and wireless communications 107 Handbook of Sensor Networks: Algorithms and Architectures, Edited by I and communication infra- structures, called wireless sensor networks, will have a significant impact on a wide array

  10. Detecting Phantom Nodes in Wireless Sensor Networks

    E-Print Network [OSTI]

    Kim, Dae-Shik

    Detecting Phantom Nodes in Wireless Sensor Networks Joengmin Hwang, Tian He and Yongdae Kim With thousands of tiny devices, Wireless Sensor Networks (WSNs) can support ubiquitous surveillance with a very number of phantom nodes. Key words: Sensor networks, localization, secure localization, location

  11. OFC'13 Summary ---Access Networks-I

    E-Print Network [OSTI]

    California at Davis, University of

    They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

  12. Boolean models for genetic regulatory networks

    E-Print Network [OSTI]

    Xiao, Yufei

    2009-05-15T23:59:59.000Z

    networks is achieved by Paula Sebastiani et al. [8], by using Bayesian networks, and the constructed network can predict the occurrence of stroke in 114 sickle cell anemia patients with 98.2% accuracy. Another successful work is by Katia Basso, et al. [9...

  13. Neural networks for fast image compression

    E-Print Network [OSTI]

    Li, Mu

    1998-01-01T23:59:59.000Z

    of one network have been used in the system. Each neural network was trained with some image blocks which have similar characteristics. In order to decrease the time for the learning process of the neural networks to converge, an adaptive back...

  14. Object Oriented Artificial Neural Network Implementations

    E-Print Network [OSTI]

    Slatton, Clint

    1 Object Oriented Artificial Neural Network Implementations W. Curt Lefebvre Jose C. Principe Neuro artificial neural networks (ANNs). The conven- tion for ANN simulation has been a direct implementation to develop a graphical artificial neural network simulation environment motivated towards the pro- cessing

  15. Online learning processes artificial neural networks

    E-Print Network [OSTI]

    Heskes, Tom

    On­line learning processes in artificial neural networks Tom M. Heskes Bert Kappen Department, The Netherlands. Abstract We study on­line learning processes in artificial neural networks from a general point. Elsevier, pages 199-- 233. #12; On­line learning processes in artificial neural networks 1 1 Introduction 1

  16. Modeling Social Networks with Sampled Data 1

    E-Print Network [OSTI]

    Washington at Seattle, University of

    Modeling Social Networks with Sampled Data 1 Technical Report no. 523 Department of Statistics of these relations. Recently, social network studies have focused a great deal of attention on random graph models of networks whose nodes represent individual social actors and whose edges represent a specified relationship

  17. A Network Emulation Tool Kenneth Baclawski

    E-Print Network [OSTI]

    Baclawski, Kenneth B.

    Emulation Tool (NET) is a software sim- ulation of a computer network. NET is designed for research system. Two methods are provided for customizing NET to simulate a particular computer network. One can specify the parameters of a stan- dard network provided by NET, or one can program a new communication

  18. Introduction to Network Science 1 Random Models

    E-Print Network [OSTI]

    Safro, Ilya

    to the degree distribution in random model ... #12;Introduction to Network Science 4 In contrast to the degree distribution in random model ... #12;Introduction to Network Science 5 Newman, "Random graphs as models of vertices. Average component size #12;Introduction to Network Science 15 Distribution of component sizes #12;

  19. Environmental Cyberinfrastructure Needs For Distributed Sensor Networks

    E-Print Network [OSTI]

    Hamilton, Michael P.

    1 Environmental Cyberinfrastructure Needs For Distributed Sensor Networks 12-14 August 2003;2 Environmental Cyberinfrastructure Needs for Distributed Sensor Networks A Report from a National Science Cyberinfrastructure Needs for Distributed Sensor Networks: A Report from a National Science Foundation Sponsored

  20. Distributed Online Frequency Assignment in Cellular Networks ?

    E-Print Network [OSTI]

    Devoto, Stephen H.

    Distributed Online Frequency Assignment in Cellular Networks ? (Extended Abstract) Jeannette a general framework for studying distributed online frequency assignment in cellular networks. The problem at the corresponding network cell. In this setting, we present several distributed online algorithms for this problem

  1. Globally Integrated Power and Clock Distribution Network

    E-Print Network [OSTI]

    Friedman, Eby G.

    Globally Integrated Power and Clock Distribution Network Renatas Jakushokas and Eby G. Friedman and clock distribution networks are fundamentally different in terms of signal frequency and current flow signals may be integrated to eliminate the on-chip global clock distribution network. This combined

  2. Properties of real networks: degree distribution

    E-Print Network [OSTI]

    Albert, Réka

    Properties of real networks: degree distribution Nodes with small degrees are most frequent;Degree distributions in networks of science collaborations Coauthor, neurosci. 21. )( kkP Coauthor, HEP (2001) )(kP #12;Metabolic networks have a power-law degree distribution H. Jeong et al., Nature 407, 651

  3. Characterizing Residential Broadband Networks Marcel Dischinger

    E-Print Network [OSTI]

    Saroiu, Stefan

    Characterizing Residential Broadband Networks Marcel Dischinger MPI for Software Systems mdischin and rapidly growing proportion of users connect to the Internet via residential broadband networks such as Dig- ital Subscriber Lines (DSL) and cable. Residential networks are often the bottleneck in the last mile

  4. Contribution Games in Networks Elliot Anshelevich

    E-Print Network [OSTI]

    Contribution Games in Networks Elliot Anshelevich Martin Hoefer Abstract We consider network contribution games, where each agent in a network has a budget of effort that he can contribute to different collaborative projects or relationships. Depending on the contribution of the involved agents a relationship

  5. DCnet Research Network David L. Mills

    E-Print Network [OSTI]

    Mills, David L.

    dedicated to various network research projects in electrical engineering and computer science ­ Entire network or each subnet separately can be logically and electrically isolated from campus networks.4.1.25 albert Intel Pentium II 200 Linux program development 128.4.1.26 seminole Sun Blade 1500 Solaris 2.8 grad

  6. Inferring Ecological Networks From Species Abundance Data

    E-Print Network [OSTI]

    Edinburgh, University of

    (LASSO), Sparse Bayesian Regression (SBR), Graphical Gaussian Models (GGMs) and Bayesian Networks (BNs to thank Marco Grzegorczyk for the answering my question about Bayesian networks and the MCMC methodsInferring Ecological Networks From Species Abundance Data Frank Dondelinger Master of Science

  7. Origin and Structure of Dynamic Cooperative Networks

    E-Print Network [OSTI]

    Hauert, Christoph

    Origin and Structure of Dynamic Cooperative Networks Lucas Wardil & Christoph Hauert Department the local structure of the social network. Here we propose a simple theoretical framework to model dynamic among coop- erators2­4 . Social networks represent a dynamical abstraction of social structures

  8. Monitoring Energy Consumption In Wireless Sensor Networks

    E-Print Network [OSTI]

    Turau, Volker

    Monitoring Energy Consumption In Wireless Sensor Networks Matthias Witt, Christoph Weyer, it may impair the ability of the sensor network to function. Therefore, minimizing energy consumption energy consumption in both standby and active modes is the basis of wireless networks. Energy preserving

  9. Network Security Validation Using Game Theory

    E-Print Network [OSTI]

    Mavronicolas, Marios

    1 Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer.papadopoulou,a.gregoriades}@euc.ac.cy Abstract: Non-functional requirements (NFR) such as network security recently gained widespread attention the immunity property of the distributed systems that depended on these networks. Security requirements

  10. In the networked society people, knowledge, devices,

    E-Print Network [OSTI]

    Zhao, Yuxiao

    . The work will mix theoretical work with simulation evaluations, based on existing or emerging Ericsson vertical positioning component. Furthermore, network based solution requirements are typically tighter indoor. The developed network-based algorithms will be based on various radio network measurements from

  11. Electrical Network Supervisor Status Report

    E-Print Network [OSTI]

    Poulsen, S

    2001-01-01T23:59:59.000Z

    During year 2000 CERN has installed the Electrical Network Supervisor (ENS) for the monitoring and control of the equipment of the electrical distribution network located in about 100 substations throughout the different sites. In the first phase the system has been installed in parallel with the original CERN-developed system and databases and mimic diagrams have been prepared to cover parts of the distribution network. The system has been integrated with the general ST supervision systems for alarms monitoring and measurement logging, and the data from the ENS are gradually being integrated. In the second phase an extension of the system has been tested to include a direct industrial interface with the electrical equipment without the need for the existing CERN equipment interfaces. During the 2000-2001 shutdown the supervision will be renovated in a number of zones to operate a complete industrial system covering all aspects of the supervision from equipment interfaces to end-user applications.

  12. Interests Diffusion in Social Networks

    E-Print Network [OSTI]

    D'Agostino, Gregorio; De Nicola, Antonio; Tucci, Salvatore

    2015-01-01T23:59:59.000Z

    Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a p...

  13. Virtualized Network Control: Final Report

    SciTech Connect (OSTI)

    Ghani, Nasir [University of New Mexico

    2013-02-01T23:59:59.000Z

    This document is the final report for the Virtualized Network Control (VNC) project, which was funded by the United States Department of Energy (DOE) Office of Science. This project was also informally referred to as Advanced Resource Computation for Hybrid Service and TOpology NEtworks (ARCHSTONE). This report provides a summary of the project's activities, tasks, deliverable, and accomplishments. It also provides a summary of the documents, software, and presentations generated as part of this projects activities. Namely, the Appendix contains an archive of the deliverables, documents, and presentations generated a part of this project.

  14. Chimera states in heterogeneous networks

    E-Print Network [OSTI]

    Carlo R. Laing

    2008-12-17T23:59:59.000Z

    Chimera states in networks of coupled oscillators occur when some fraction of the oscillators synchronise with one another, while the remaining oscillators are incoherent. Several groups have studied chimerae in networks of identical oscillators, but here we study these states in a heterogeneous model for which the natural frequencies of the oscillators are chosen from a distribution. We obtain exact results by reduction to a finite set of differential equations. We find that heterogeneity can destroy chimerae, destroy all states except chimerae, or destabilise chimerae in Hopf bifurcations, depending on the form of the heterogeneity.

  15. Helper's Network Gazette August 1994

    E-Print Network [OSTI]

    1994-01-01T23:59:59.000Z

    Beast%20Helper's%20Gazette%201994-08%20(August)%20.htm[3/31/2013 5:37:11 PM] the choice of a t-shirt (pale blue, with a heart on the sleeve) or a handsome (really!) navy canvas totebag, each with the HN logo. Nan's tote, which she takes to work every day... with the B&B logo on one side and a Beth Blighton portrait of Vincent on the other: very lovely! NOTICES & FACTOIDS The summer Q-fer (Helpers' Network Quality Fanzine Review) is available: $8 full, $5 update, from Helpers' Network. CALENDARS Four 1995 B...

  16. Network model of human language

    E-Print Network [OSTI]

    Markosova, Maria

    2007-01-01T23:59:59.000Z

    The phenomenon of human language is widely studied from various points of view. It is interesting not only for social scientists, antropologists or philosophers, but also for those, interesting in the network dynamics. In several recent papers word web, or language as a graph has been investigated. In this paper I revise recent studies of syntactical word web. I present a model of growing network in which such processes as node addition, edge rewiring and new link creation are taken into account. I argue, that this model is a satisfactory minimal model explaining measured data.

  17. Feedback, power control, and beamforming : methods for situational aware wireless networks

    E-Print Network [OSTI]

    Huang, Yichao

    2012-01-01T23:59:59.000Z

    Outage balancing in multiuser MISO networks: network dualityOutage balancing in multiuser MISO networks: network dualitywith partial feedback for MISO downlink transmission using

  18. Multi-Channel and Multi-Rate Adaptation for High-Throughput Wireless Networks

    E-Print Network [OSTI]

    Nguyen, Duy Duc

    2012-01-01T23:59:59.000Z

    layer. Unlike wired networks, wireless networks have to deal2 Background Wireless Networks Wireless technology is allWLAN), wireless mesh networks, wireless metropolitan area

  19. Tea classification based on artificial olfaction using bionic olfactory neural network

    E-Print Network [OSTI]

    Yang, X L; Fu, J; Lou, Z G; Wang, L Y; Li, G; Freeman, Walter J III

    2006-01-01T23:59:59.000Z

    conventional artificial neural network (ANN), chaos shoulda con- ventional artificial neural network, BP network, isconventional artificial neural network, it is an accurate

  20. Exploiting Social Networks for Sensor Data Sharing with SenseShare

    E-Print Network [OSTI]

    Schmid, Thomas; Srivastava, Mani B

    2007-01-01T23:59:59.000Z

    Sensing Exploiting Social Networks for Sensor Data Sharinghttp://nesl.ee.ucla.edu Introduction: Social Networks andData Sharing Social Networks Social networks create groups

  1. Continuous Time Bayesian Networks for Host Level Network Intrusion Detection

    E-Print Network [OSTI]

    Shelton, Christian R.

    R. Shelton Department of Computer Science and Engineering University of California, Riverside continuous time Bayesian networks learned from historic non-attack data and flag future event sequences whose. In this paper, we look at the problem of detecting such attacks at the host level. Instead of constructing

  2. Understanding Spreading Patterns on Social Networks Based on Network Topology

    E-Print Network [OSTI]

    Saxena, Akrati; Gupta, Yayati

    2015-01-01T23:59:59.000Z

    Ever since the proposal of first epidemic model, scientists have been attempting to estimate the growth of a disease/contagion while in its premature stage. Despite being the focus of researchers for a long time, understanding epidemiology remains as error prone as a weather forecast, mainly because of the unavailability of large amount of data. An epidemic spread is analogous to the diffusion of memes in social networking sites. Diffusion of memes can be easily studied provided large datasets and computational powers to extract information from online networks. So, studying a meme spreading pattern can help us in understanding epidemiology. In this paper, we analyse the impact of the topology of a social network, specifically its meso scale properties- community structure and core-periphery structure, on a meme traversing over it. We propose a meme propagation model for synthetic scale free graphs which resemble real world graphs and observe the process of a meme going viral on such a network. We also valida...

  3. absorption effects network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    absorption effects network First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Character Rotation...

  4. accident research network: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accident research network First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Structure Evolution of...

  5. Modeling the Dynamics of Compromised Networks

    SciTech Connect (OSTI)

    Soper, B; Merl, D M

    2011-09-12T23:59:59.000Z

    Accurate predictive models of compromised networks would contribute greatly to improving the effectiveness and efficiency of the detection and control of network attacks. Compartmental epidemiological models have been applied to modeling attack vectors such as viruses and worms. We extend the application of these models to capture a wider class of dynamics applicable to cyber security. By making basic assumptions regarding network topology we use multi-group epidemiological models and reaction rate kinetics to model the stochastic evolution of a compromised network. The Gillespie Algorithm is used to run simulations under a worst case scenario in which the intruder follows the basic connection rates of network traffic as a method of obfuscation.

  6. An introduction to artificial neural networks

    E-Print Network [OSTI]

    C. A. L. Bailer-Jones; R. Gupta; H. P. Singh

    2001-02-13T23:59:59.000Z

    Artificial neural networks are algorithms which have been developed to tackle a range of computational problems. These range from modelling brain function to making predictions of time-dependent phenomena to solving hard (NP-complete) problems. In this introduction we describe a single, yet very important, type of network known as a feedforward network. This network is a mathematical model which can be trained to learn an arbitrarily complex relationship between a data and a parameter domain, so can be used to solve interpolation and classification problems. We discuss the structure, training and interpretation of these networks, and their implementation, taking the classification of stellar spectra as an example.

  7. Metropolitan area network support at Fermilab

    SciTech Connect (OSTI)

    DeMar, Phil; Andrews, Chuck; Bobyshev, Andrey; Crawford, Matt; Colon, Orlando; Fry, Steve; Grigaliunas, Vyto; Lamore, Donna; Petravick, Don; /Fermilab

    2007-09-01T23:59:59.000Z

    Advances in wide area network service offerings, coupled with comparable developments in local area network technology have enabled many research sites to keep their offsite network bandwidth ahead of demand. For most sites, the more difficult and costly aspect of increasing wide area network capacity is the local loop, which connects the facility LAN to the wide area service provider(s). Fermilab, in coordination with neighboring Argonne National Laboratory, has chosen to provide its own local loop access through leasing of dark fiber to nearby network exchange points, and procuring dense wave division multiplexing (DWDM) equipment to provide data channels across those fibers. Installing and managing such optical network infrastructure has broadened the Laboratory's network support responsibilities to include operating network equipment that is located off-site, and is technically much different than classic LAN network equipment. Effectively, the Laboratory has assumed the role of a local service provider. This paper will cover Fermilab's experiences with deploying and supporting a Metropolitan Area Network (MAN) infrastructure to satisfy its offsite networking needs. The benefits and drawbacks of providing and supporting such a service will be discussed.

  8. Information Theoretic Approach to Social Networks

    E-Print Network [OSTI]

    Kafri, Oded

    2014-01-01T23:59:59.000Z

    We propose an information theoretic model for sociological networks. The model is a microcanonical ensemble of states and particles. The states are the possible pairs of nodes (i.e. people, sites and alike) which exchange information. The particles are the energetic information bits. With analogy to bosons gas, we define for these networks model: entropy, volume, pressure and temperature. We show that these definitions are consistent with Carnot efficiency (the second law) and ideal gas law. Therefore, if we have two large networks: hot and cold having temperatures TH and TC and we remove Q energetic bits from the hot network to the cold network we can save W profit bits. The profit will be calculated from W equal or smaller than Q (1-TH/TC), namely, Carnot formula. In addition it is shown that when two of these networks are merged the entropy increases. This explains the tendency of economic and social networks to merge.

  9. Corporate competition: A self-organized network

    E-Print Network [OSTI]

    Braha, Dan; Bar-Yam, Yaneer

    2011-01-01T23:59:59.000Z

    A substantial number of studies have extended the work on universal properties in physical systems to complex networks in social, biological, and technological systems. In this paper, we present a complex networks perspective on interfirm organizational networks by mapping, analyzing and modeling the spatial structure of a large interfirm competition network across a variety of sectors and industries within the United States. We propose two micro-dynamic models that are able to reproduce empirically observed characteristics of competition networks as a natural outcome of a minimal set of general mechanisms governing the formation of competition networks. Both models, which utilize different approaches yet apply common principles to network formation give comparable results. There is an asymmetry between companies that are considered competitors, and companies that consider others as their competitors. All companies only consider a small number of other companies as competitors; however, there are a few compan...

  10. Pinning impulsive control algorithms for complex network

    SciTech Connect (OSTI)

    Sun, Wen [School of Information and Mathematics, Yangtze University, Jingzhou 434023 (China)] [School of Information and Mathematics, Yangtze University, Jingzhou 434023 (China); Lü, Jinhu [Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China)] [Academy of Mathematics and Systems Science, Chinese Academy of Sciences, Beijing 100190 (China); Chen, Shihua [College of Mathematics and Statistics, Wuhan University, Wuhan 430072 (China)] [College of Mathematics and Statistics, Wuhan University, Wuhan 430072 (China); Yu, Xinghuo [School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 (Australia)] [School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 (Australia)

    2014-03-15T23:59:59.000Z

    In this paper, we further investigate the synchronization of complex dynamical network via pinning control in which a selection of nodes are controlled at discrete times. Different from most existing work, the pinning control algorithms utilize only the impulsive signals at discrete time instants, which may greatly improve the communication channel efficiency and reduce control cost. Two classes of algorithms are designed, one for strongly connected complex network and another for non-strongly connected complex network. It is suggested that in the strongly connected network with suitable coupling strength, a single controller at any one of the network's nodes can always pin the network to its homogeneous solution. In the non-strongly connected case, the location and minimum number of nodes needed to pin the network are determined by the Frobenius normal form of the coupling matrix. In addition, the coupling matrix is not necessarily symmetric or irreducible. Illustrative examples are then given to validate the proposed pinning impulsive control algorithms.

  11. Multicommodity Flows and Cuts in Polymatroidal Networks

    E-Print Network [OSTI]

    Chekuri, Chandra; Raja, Adnan; Viswanath, Pramod

    2011-01-01T23:59:59.000Z

    We consider multicommodity flow and cut problems in {\\em polymatroidal} networks where there are submodular capacity constraints on the edges incident to a node. Polymatroidal networks were introduced by Lawler and Martel and Hassin in the single-commodity setting and are closely related to the submodular flow model of Edmonds and Giles; the well-known maxflow-mincut theorem holds in this more general setting. Polymatroidal networks for the multicommodity case have not, as far as the authors are aware, been previously explored. Our work is primarily motivated by applications to information flow in wireless networks. We also consider the notion of undirected polymatroidal networks and observe that they provide a natural way to generalize flows and cuts in edge and node capacitated undirected networks. We establish poly-logarithmic flow-cut gap results in several scenarios that have been previously considered in the standard network flow models where capacities are on the edges or nodes. Our results have alread...

  12. Peer to Peer Networks Management Survey

    E-Print Network [OSTI]

    Amad, Mourad; Aïssani, Djamil

    2012-01-01T23:59:59.000Z

    Peer-to-Peer systems are based on the concept of resources localization and mutualisation in dynamic context. In specific environment such as mobile networks, characterized by high variability and dynamicity of network conditions and performances, where nodes can join and leave the network dynamically, resources reliability and availability constitute a critical issue. The resource discovery problem arises in the context of peer to peer (P2P) networks, where at any point of time a peer may be placed at or removed from any location over a general purpose network. Locating a resource or service efficiently is one of the most important issues related to peer-to-peer networks. The objective of a search mechanism is to successfully locate resources while incurring low overhead and low delay. This paper presents a survey on P2P networks management: classification, applications, platforms, simulators and security.

  13. Advanced Networking Voice over IP

    E-Print Network [OSTI]

    Lo Cigno, Renato Antonio

    are not uniform across coutries. Architecture is still biased by the original monopoly system The structure technique on the local loop, filtered between 300 and 3400 Hz to allow direct curret for powering the phone ­ routing and setup ­ resource finding and reservation #12;Renato.LoCigno@disi.unitn.it Advanced Networking

  14. Shear shocks in fragile networks

    E-Print Network [OSTI]

    Stephan Ulrich; Nitin Upadhyaya; Bas van Opheusden; Vincenzo Vitelli

    2013-07-29T23:59:59.000Z

    A minimal model for studying the mechanical properties of amorphous solids is a disordered network of point masses connected by unbreakable springs. At a critical value of its mean connectivity, such a network becomes fragile: it undergoes a rigidity transition signaled by a vanishing shear modulus and transverse sound speed. We investigate analytically and numerically the linear and non-linear visco-elastic response of these fragile solids by probing how shear fronts propagate through them. Our approach, that we tentatively label shear front rheology, provides an alternative route to standard oscillatory rheology. In the linear regime, we observe at late times a diffusive broadening of the fronts controlled by an effective shear viscosity that diverges at the critical point. No matter how small the microscopic coefficient of dissipation, strongly disordered networks behave as if they were over-damped because energy is irreversibly leaked into diverging non-affine fluctuations. Close to the transition, the regime of linear response becomes vanishingly small: the tiniest shear strains generate strongly non-linear shear shock waves qualitatively different from their compressional counterparts in granular media. The inherent non-linearities trigger an energy cascade from low to high frequency components that keep the network away from attaining the quasi-static limit. This mechanism, reminiscent of acoustic turbulence, causes a super-diffusive broadening of the shock width.

  15. Organization of growing random networks

    SciTech Connect (OSTI)

    Krapivsky, P. L.; Redner, S.

    2001-06-01T23:59:59.000Z

    The organizational development of growing random networks is investigated. These growing networks are built by adding nodes successively, and linking each to an earlier node of degree k with an attachment probability A{sub k}. When A{sub k} grows more slowly than linearly with k, the number of nodes with k links, N{sub k}(t), decays faster than a power law in k, while for A{sub k} growing faster than linearly in k, a single node emerges which connects to nearly all other nodes. When A{sub k} is asymptotically linear, N{sub k}(t){similar_to}tk{sup {minus}{nu}}, with {nu} dependent on details of the attachment probability, but in the range 2{lt}{nu}{lt}{infinity}. The combined age and degree distribution of nodes shows that old nodes typically have a large degree. There is also a significant correlation in the degrees of neighboring nodes, so that nodes of similar degree are more likely to be connected. The size distributions of the in and out components of the network with respect to a given node{emdash}namely, its {open_quotes}descendants{close_quotes} and {open_quotes}ancestors{close_quotes}{emdash}are also determined. The in component exhibits a robust s{sup {minus}2} power-law tail, where s is the component size. The out component has a typical size of order lnt, and it provides basic insights into the genealogy of the network.

  16. Network Flow Optimization under Uncertainty

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Network model in words Minimize the cost of satisfying demands for electric energy By: imports, exports and electricity Subject to: conservation of energy flows (net after losses), lower and upper bounds on flows is a reactive approach: how would the optimal solution have changed if I'd only known? · Proactive approaches

  17. Host Event Based Network Monitoring

    SciTech Connect (OSTI)

    Jonathan Chugg

    2013-01-01T23:59:59.000Z

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  18. Good Research in Network Theory

    E-Print Network [OSTI]

    Chiang, Mung

    Good Research in Network Theory Mung Chiang Princeton University IEEE INFOCOM 2010 Panel #12;There's no Shortage of Answers already · "There's nothing more practical than good theory" · "A good theory is like a good joke" · "Good theory makes a difference: PageRank, CDMA, Dynamic alternate routing, Aloha, Packet

  19. The Effect of Caching in Sustainability of Large Wireless Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Effect of Caching in Sustainability of Large Wireless Networks Georgios S. Paschos Informatics the scalability and the efficiency for the future networks. In this landscape, wireless networks are considered]. Despite their worldwide deployment, wireless networks are mostly confined tof wireless networks is limited

  20. Disaster Recovery in Wireless Networks: A Homology-Based Algorithm

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Disaster Recovery in Wireless Networks: A Homology-Based Algorithm A. Vergne, I. Flint, L of wireless networks after a disaster. Considering a damaged wireless network, presenting coverage holes or cover problem. I. INTRODUCTION Wireless networks are present everywhere, must it be sensor networks

  1. A Unified Network Performance Importance Identification and the

    E-Print Network [OSTI]

    Nagurney, Anna

    Guire, and Winsten (1956), that electric power generation and distribution networks can be reformulated and solved, in press. #12;The Transportation Network Equilibrium Reformulation of Electric Power Supply Chain Networks The Transportation Network Equilibrium Reformulation of Electric Power Supply Chain Networks Electric Power Supply

  2. Linear Codes, Target Function Classes, and Network Computing Capacity

    E-Print Network [OSTI]

    Franceschetti, Massimo

    Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy Submitted: May 6, 2011 Abstract We study the use of linear codes for network computing in single in network coding are applicable to network computing as well. Network computing problems arise in various

  3. Structure of neighborhoods in a large social network Alina Stoica

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Structure of neighborhoods in a large social network Alina Stoica Orange Labs and Liafa Paris Keywords social networks, roles, patterns, complex networks, personal networks 1. INTRODUCTION The study of social networks has changed a lot since the early pioneering works of anthropologists who decided

  4. A Research Overview of the Telecommunication Networks Group

    E-Print Network [OSTI]

    Wichmann, Felix

    , architectures, ... ­ Performance evaluation using simulation and prototypes #12;5 Holger Karl TKN Research Groups: Overview Application-aware wireless networks Optical networks Security Active networking for mobility/security Mobility mechanisms in IP networks Transport protocols for mobile networks Ad

  5. Controlling Complex Networks with Compensatory Perturbations

    E-Print Network [OSTI]

    Sean P. Cornelius; William L. Kath; Adilson E. Motter

    2011-05-18T23:59:59.000Z

    The response of complex networks to perturbations is of utmost importance in areas as diverse as ecosystem management, emergency response, and cell reprogramming. A fundamental property of networks is that the perturbation of one node can affect other nodes, in a process that may cause the entire or substantial part of the system to change behavior and possibly collapse. Recent research in metabolic and food-web networks has demonstrated the concept that network damage caused by external perturbations can often be mitigated or reversed by the application of compensatory perturbations. Compensatory perturbations are constrained to be physically admissible and amenable to implementation on the network. However, the systematic identification of compensatory perturbations that conform to these constraints remains an open problem. Here, we present a method to construct compensatory perturbations that can control the fate of general networks under such constraints. Our approach accounts for the full nonlinear behavior of real complex networks and can bring the system to a desirable target state even when this state is not directly accessible. Applications to genetic networks show that compensatory perturbations are effective even when limited to a small fraction of all nodes in the network and that they are far more effective when limited to the highest-degree nodes. The approach is conceptually simple and computationally efficient, making it suitable for the rescue, control, and reprogramming of large complex networks in various domains.

  6. Cross-linked structure of network evolution

    SciTech Connect (OSTI)

    Bassett, Danielle S., E-mail: dsb@seas.upenn.edu [Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104 (United States); Department of Physics, University of California, Santa Barbara, California 93106 (United States); Sage Center for the Study of the Mind, University of California, Santa Barbara, California 93106 (United States); Wymbs, Nicholas F.; Grafton, Scott T. [Department of Psychology and UCSB Brain Imaging Center, University of California, Santa Barbara, California 93106 (United States)] [Department of Psychology and UCSB Brain Imaging Center, University of California, Santa Barbara, California 93106 (United States); Porter, Mason A. [Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford OX2 6GG (United Kingdom) [Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford OX2 6GG (United Kingdom); CABDyN Complexity Centre, University of Oxford, Oxford, OX1 1HP (United Kingdom); Mucha, Peter J. [Carolina Center for Interdisciplinary Applied Mathematics, Department of Mathematics, University of North Carolina, Chapel Hill, North Carolina 27599 (United States) [Carolina Center for Interdisciplinary Applied Mathematics, Department of Mathematics, University of North Carolina, Chapel Hill, North Carolina 27599 (United States); Department of Applied Physical Sciences, University of North Carolina, Chapel Hill, North Carolina 27599 (United States)

    2014-03-15T23:59:59.000Z

    We study the temporal co-variation of network co-evolution via the cross-link structure of networks, for which we take advantage of the formalism of hypergraphs to map cross-link structures back to network nodes. We investigate two sets of temporal network data in detail. In a network of coupled nonlinear oscillators, hyperedges that consist of network edges with temporally co-varying weights uncover the driving co-evolution patterns of edge weight dynamics both within and between oscillator communities. In the human brain, networks that represent temporal changes in brain activity during learning exhibit early co-evolution that then settles down with practice. Subsequent decreases in hyperedge size are consistent with emergence of an autonomous subgraph whose dynamics no longer depends on other parts of the network. Our results on real and synthetic networks give a poignant demonstration of the ability of cross-link structure to uncover unexpected co-evolution attributes in both real and synthetic dynamical systems. This, in turn, illustrates the utility of analyzing cross-links for investigating the structure of temporal networks.

  7. Diagnosing Anomalous Network Performance with Confidence

    SciTech Connect (OSTI)

    Settlemyer, Bradley W [ORNL; Hodson, Stephen W [ORNL; Kuehn, Jeffery A [ORNL; Poole, Stephen W [ORNL

    2011-04-01T23:59:59.000Z

    Variability in network performance is a major obstacle in effectively analyzing the throughput of modern high performance computer systems. High performance interconnec- tion networks offer excellent best-case network latencies; how- ever, highly parallel applications running on parallel machines typically require consistently high levels of performance to adequately leverage the massive amounts of available computing power. Performance analysts have usually quantified network performance using traditional summary statistics that assume the observational data is sampled from a normal distribution. In our examinations of network performance, we have found this method of analysis often provides too little data to under- stand anomalous network performance. Our tool, Confidence, instead uses an empirically derived probability distribution to characterize network performance. In this paper we describe several instances where the Confidence toolkit allowed us to understand and diagnose network performance anomalies that we could not adequately explore with the simple summary statis- tics provided by traditional measurement tools. In particular, we examine a multi-modal performance scenario encountered with an Infiniband interconnection network and we explore the performance repeatability on the custom Cray SeaStar2 interconnection network after a set of software and driver updates.

  8. Social Network Analysis: A case study of the Islamist terrorist network

    SciTech Connect (OSTI)

    Medina, Richard M [ORNL

    2012-01-01T23:59:59.000Z

    Social Network Analysis is a compilation of methods used to identify and analyze patterns in social network systems. This article serves as a primer on foundational social network concepts and analyses and builds a case study on the global Islamist terrorist network to illustrate the use and usefulness of these methods. The Islamist terrorist network is a system composed of multiple terrorist organizations that are socially connected and work toward the same goals. This research utilizes traditional social network, as well as small-world, and scale-free analyses to characterize this system on individual, network and systemic levels. Leaders in the network are identified based on their positions in the social network and the network structure is categorized. Finally, two vital nodes in the network are removed and this version of the network is compared with the previous version to make implications of strengths, weaknesses and vulnerabilities. The Islamist terrorist network structure is found to be a resilient and efficient structure, even with important social nodes removed. Implications for counterterrorism are given from the results of each analysis.

  9. Active Networks as a tool to integrate DGActive Networks as a tool to integrate DG www.econ.no

    E-Print Network [OSTI]

    Page 1 Active Networks as a tool to integrate DGActive Networks as a tool to integrate DG www.econ.no Active networks as a tool toActive networks as a tool to integrate large amounts ofintegrate large GaardestrupGaardestrup, C.,, C., TechwiseTechwise #12;Page 2 Active Networks as a tool to integrate DGActive

  10. Ad-hoc wireless network coverage with networked robots that cannot localize

    E-Print Network [OSTI]

    Correll, Nikolaus

    We study a fully distributed, reactive algorithm for deployment and maintenance of a mobile communication backbone that provides an area around a network gateway with wireless network access for higher-level agents. Possible ...

  11. Network Growth and Consolidation: The Effects of Cohesion and Diversity on the Biotechnology Industry Network

    E-Print Network [OSTI]

    White, Douglas R.

    topologies ­ such as metabolic networks or the World Wide Web ­ in that they tend to be assortative (Newman Industry Network *** Includes Color Figures *** Word Count 7,087 inclusive Jason Owen-Smith Walter W

  12. Parents’ networks: Egocentric networks and unique and shared sources of social support

    E-Print Network [OSTI]

    Hall, Jeffrey A.

    2010-01-01T23:59:59.000Z

    Egocentric social network instruments typically require independently sampled respondents to identify up to five social network alters. When collecting egocentric data from dyads (e.g., mothers and fathers), shared and ...

  13. Challenges and Solutions for Location-based Routing in Wireless Sensor Networks with Complex Network Topology

    E-Print Network [OSTI]

    Won, Myounggyu

    2013-07-17T23:59:59.000Z

    Complex Network Topologies (CNTs)–network holes and cuts–often occur in practical WSN deployments. Many researchers have acknowledged that CNTs adversely affect the performance of location-based routing and proposed various CNT- aware location...

  14. Social Networks An Overview of Approaches to Visualize their Structure, Model their

    E-Print Network [OSTI]

    Nagurney, Anna

    Social Networks An Overview of Approaches to Visualize their Structure, Model their Emergence of a Social Network Representations of Social Networks Modeling the Emergence of Networks Flows on Networks of Relationships in Supply Chain and Financial Networks #12;Definition of Social Networks "A social network

  15. Exploiting energy-saving potential in heterogeneous networks Lefteris Mamatas* and Vassilis Tsaoussidis

    E-Print Network [OSTI]

    Tsaoussidis, Vassilis

    has been devoted to energy efficient design of the entire network protocol stack of wireless networks

  16. Nonconvex network optimization: Algorithms and software

    SciTech Connect (OSTI)

    Lamar, B.

    1994-12-31T23:59:59.000Z

    Although very efficient solution methods exist for linear and convex network optimization problems, minimum cost network flow problems with concave arc cost functions are challenging because the determination of the optimal solution requires, in the worst case, an evaluation of all the extreme points in the feasible region. Even more challenging, are network flow problems whose arc costs are neither concave nor convex as is the case for problems with price breaks or all-unit discounting. Yet, such situations arise frequently in many real-world problems. In this talk, solution methods for concave cost network flow problems will be reviewed and a computer software package will be presented. In addition, a method for converting networks with arbitrary arc costs into a pure concave cost network will be described.

  17. Hierarchical Network Structure Promotes Dynamical Robustness

    E-Print Network [OSTI]

    Cameron Smith; Raymond S. Puzio; Aviv Bergman

    2015-06-16T23:59:59.000Z

    The relationship between network topology and system dynamics has significant implications for unifying our understanding of the interplay among metabolic, gene-regulatory, and ecosystem network architecures. Here we analyze the stability and robustness of a large class of dynamics on such networks. We determine the probability distribution of robustness as a function of network topology and show that robustness is classified by the number of links between modules of the network. We also demonstrate that permutation of these modules is a fundamental symmetry of dynamical robustness. Analysis of these findings leads to the conclusion that the most robust systems have the most hierarchical structure. This relationship provides a means by which evolutionary selection for a purely dynamical phenomenon may shape network architectures across scales of the biological hierarchy.

  18. Mitigation of Malicious Attacks on Networks

    E-Print Network [OSTI]

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01T23:59:59.000Z

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  19. Zone routing in a torus network

    DOE Patents [OSTI]

    Chen, Dong; Heidelberger, Philip; Kumar, Sameer

    2013-01-29T23:59:59.000Z

    A system for routing data in a network comprising a network logic device at a sending node for determining a path between the sending node and a receiving node, wherein the network logic device sets one or more selection bits and one or more hint bits within the data packet, a control register for storing one or more masks, wherein the network logic device uses the one or more selection bits to select a mask from the control register and the network logic device applies the selected mask to the hint bits to restrict routing of the data packet to one or more routing directions for the data packet within the network and selects one of the restricted routing directions from the one or more routing directions and sends the data packet along a link in the selected routing direction toward the receiving node.

  20. Communication via entangled coherent quantum network

    E-Print Network [OSTI]

    A. El Allati; Y. Hassouni; N. Metwally

    2010-11-17T23:59:59.000Z

    A quantum network is constructed via maximum entangled coherent states. The possibility of using this network to achieve communication between multi-participants is investigated. We showed that the probability of teleported unknown state successfully, depends on the size the used network. As the numbers of participants increases, the successful probability does not depend on the intensity of the field. The problem of implementing quantum teleportation protocol via a noise quantum network is discussed. We show one can send information perfectly with small values of the field intensity and larger values of the noise strength. The successful probability of this suggested protocol increases abruptly for larger values of the noise strength and gradually for small values. We show that for small size of the used quantum network, the fidelity of the teleported state decreases smoothly, while it decreases abruptly for larger size of network.