Search
Results
-
Development, Deployment, and Rating of Plug-Ins
(2006)TIK ReportIn this paper, we present a lightweight but powerful plug-in container which provides advanced features such as dynamic class loading, dependency, configuration, and security management. We highlight the deployment mechanism which allows to publish, install, and update plug-ins from arbitrary sources at runtime. Furthermore, we introduce the Trooth voting and trust system which is used to assess plug-ins but has been designed as a general ...Report -
-
Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks
(2004)Technical reportsWhen being deployed, ad-hoc and sensor networks are unstructured and lack an efficient and reliable communication scheme. Hence, the organization of a MAC layer is the primary goal during and immediately after the deployment of such networks. Computing a good initial clustering facilitates this task and is therefore a vital part of the initialization process. A clustering based on a maximal independent set provides several highly desirable ...Report -
On coverage in infrastructure networks
(2004)Technical reportFor mobile distributed tasks, the infrastructure is often formed by cellular networks. One of the major issues in such networks is interference. In this paper we tackle interference reduction by suitable assignment of transmission power levels to base stations. This task is formalized introducing the Minimum Membership Set Cover combinatorial optimization problem. On the one hand we prove that in polynomial time the optimal solution of ...Report -
Join and leave in peer-to-peer systems
(2003)Technical reportIn this paper we introduce the distributed approximative system information service (DASIS) as a useful means to collect approximate information about a peer-to-peer system. As an example application we show how this service can be employed for establishing an eective determinis- tic join algorithm. Through simulation we demonstrate that insertion of peers using the service results in a well- balanced system. Moreover, our join algorithm ...Report -
Join and leave in peer-to-peer systems
(2003)Technical reportIn this paper we introduce the steady state statistics service as a useful means to collect approximate statistical information about a peer-to-peer system. As an example application we show how this service can be employed for establishing an eective deterministic join algorithm. Through simulation we show that insertion of peers using the service results in a well-balanced system. Moreover, our join algorithm gracefully resolves load ...Report -
Inferring AS Relationships Beyond Counting Edges
(2004)D-INFK technical reportRouting in the Internet is strongly shaped by the business relationships between administrative domains (Autonomous Systems, AS). In this paper we propose new techniques to classify these relationships. Inspired by Lixin Gao’s seminal work on valley-free paths, we explore several ways to measure the importance of an AS which go beyond the original degree-ranking. In addition we study what information can be gathered by parsing the Routing ...Report -
How the Hidden-Terminal Problem Affects Clustering in Ad Hoc and Sensor Networks
(2004)Technical Report / ETH Zurich, Department of Computer ScienceReport -
Distributed combinatorial optimization
(2005)Technical Report / ETH Zurich, Department of Computer ScienceReport -
Asymptotically Optimal Geometric Mobile Ad-Hoc Routing
(2002)Technical Report / ETH Zurich, Department of Computer ScienceReport