Community wireless mesh networks are decentralized and cooperative structures with participation rules that define their freedom, openness and neutrality. The operation of these networks requires routing algorithms that may impose additional unnecessary technical restrictions in the determination of routes that can restrict the freedom of community users. The authors propose
...
In the last decade, the field of microprocessor architecture has seen the rise of multicore processors, which consist of the interconnection of a set of independent processing units or cores in the same chip. As the number of cores per multiprocessor increases, the bandwidth and energy requirements for their interconnection
...
Data Warehouse (DW) design is based on a set of requirements expressed as Service Level Agreements (SLAs) and Business Level Objects (BLOs). Populating a DW system from a set of information sources is realized with Extract-Transform-Load (ETL) processes based on SLAs and BLOs. The entire task is complex, time consuming,
...
An energy harvesting transmitter operating in a point-to-point link through a discrete time fading channel is considered in this paper. Assuming non-causal knowledge of the harvested energy and channel state, the resource allocation that maximizes the mutual information is investigated by considering both the radiated power and the circuitry power
...
Current trends in microprocessor architecture design are leading towards a dramatic increase of core-level parallelization, wherein a given number of independent processors or cores are interconnected. Since the main bottleneck is foreseen to migrate from computation to communication, efficient and scalable means of inter-core communication are crucial for guaranteeing steady
...
A wide variety of privacy metrics have been proposed in the literature to evaluate the level of protection offered by privacy enhancing-technologies. Most of these metrics are specific to concrete systems and adversarial models, and are difficult to generalize or translate to other contexts. Furthermore, a better understanding of the
...
Effective interference management is a technical challenge of utmost importance for emerging OFDMA-based technologies such as Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX). Static Intercell Interference Coordination techniques including Soft Frequency Reuse (SFR) have enjoyed acceptance among mobile operators as a solution to deal with this
...
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been pro-posed, but it was not known what access structures admit such
...
Energy has been the primary reason for shifting from traditional single-core processors to current multicore processors. Such multicore designs require an interconnection network to communicate cores among themselves and with memory. As the number of cores per chip increases, the energy consumption of these Network-on-Chip (NoC) has become comparable to
...
Nanotechnology has allowed building nanomachines capable of performing simple tasks, such as sensing, data storage or actuation. Nanonetworks, networks of nanomachines, will allow cooperation and information sharing among them, thereby greatly expanding the applications of nanotechnology in the biomedical, environmental and industrial fields. One of the most promising paradigms to
...