To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Consider a tandem queuing network with an infinite supply of jobs in front of the first station, infinite room for completed jobs after the last station, finite buffers between stations, and a number of flexible servers who are subject to failures. We study the dynamic assignment of servers to stations with the goal of maximizing the long-run average throughput. Our main conclusion is that the presence of server failures does not have a major impact on the optimal assignment of servers to stations for the systems we consider. More specifically, we show that when the servers are generalists, any nonidling policy is optimal, irrespective of the reliability of the servers. We also provide theoretical and numerical results for Markovian systems with two stations and two or three servers that suggest that the structure of the optimal server assignment policy does not depend on the reliability of the servers and that ignoring server failures when assigning servers to stations yields near-optimal throughput. Finally, we present numerical results that illustrate that simple server assignment heuristics designed for larger systems with reliable servers also yield good throughput performance in Markovian systems with three stations and three failure-prone servers.
This article investigates TP2 dependence of sample spacings. It is proved that TP2 (RR2) dependence between a general spacing and a nonadjacent order statistic might be characterized by the DLR (ILR) property of the parent distribution, and TP2 dependence between any pair of consecutive spacings might be characterized by the DLR aging property of the population. Furthermore, TP2 dependence between any two consecutive spacings in multiple outliers exponential models is also derived. In addition, some applications in reliability and business auction are presented as well.
We consider two multiclass discriminatory process sharing (DPS)-like time-shared M/G/1 queuing systems in which the weight assigned to a customer is a function of its class as well as (1) the attained service of the customer in the first system and (2) the residual processing time of the customer in the second system. We study the asymptotic slowdown, the ratio of expected sojourn time to the service requirement, of customers with very large service requirements. We also provide various results dealing with ordering of conditional mean sojourn times of any two given classes. We also show that the sojourn time of an arbitrary customer of a particular class in the standard DPS system (static weights) with heavy-tailed service requirements has a tail behavior similar to that of a customer from the same class that starts a busy period.
This paper describes a technique for assembling both data types and functions from isolated individual components. We also explore how the same technology can be used to combine free monads and, as a result, structure Haskell's monolithic IO monad.
Design by analogy is a powerful part of the design process across the wide variety of modalities used by designers such as linguistic descriptions, sketches, and diagrams. We need tools to support people's ability to find and use analogies. A deeper understanding of the cognitive mechanisms underlying design and analogy is a crucial step in developing these tools. This paper presents an experiment that explores the effects of representation within the modality of sketching, the effects of functional models, and the retrieval and use of analogies. We find that the level of abstraction for the representation of prior knowledge and the representation of a current design problem both affect people's ability to retrieve and use analogous solutions. A general semantic description in memory facilitates retrieval of that prior knowledge. The ability to find and use an analogy is also facilitated by having an appropriate functional model of the problem. These studies result in a number of important implications for the development of tools to support design by analogy. Foremost among these implications is the ability to provide multiple representations of design problems by which designers may reason across, where the verb construct in the English language is a preferred mode for these representations.
This paper deals with the system of agents treated as a concurrent modular system, which is able to support the designer in solving complex design tasks. The behavior of design agents is modeled by sets of grammar rules. Each agent manages a graph grammar and a database of facts concerning the subtask for which it is responsible. The course of designing is determined by the interaction between cooperating specialized agents. The design context is expressed by the environment in which agents act and predicates describing design criteria. The organization, design methodology, and a semantic model of a grammar-based multiagent design system are presented. The notions of a valid design solution and a design solution consistent with the design criteria are also introduced. The proposed approach is illustrated by the example of designing a house estate.
This work is aimed at establishing a common frame and understanding of function modeling (FM) for our ongoing research activities. A comparative review of the literature is performed to grasp the various FM approaches with their commonalities and differences. The relations of FM with the research fields of artificial intelligence, design theory, and maintenance are discussed. In this discussion the goals are to highlight the features of various classical approaches in relation to FM, to delineate what FM introduces to these fields, and to discuss the applicability of various FM approaches in these fields. Finally, the basic ideas underlying our projects are introduced with reference to the general framework of FM.
Creativity of designers can be enhanced by the application of appropriate triggers. The presence of triggers helps designers to search solution spaces. The searching of a solution space increases the possibility of finding creative solutions. Both representation and content of the triggers or stimulus to which the designers are exposed are believed to play a vital role in the representation and content of the outcome of the designers during problem solving. We studied the effect of representation of triggers on ideas generated by six design engineers while trying to solve a given problem. A variety of representations (video/animation and audio, text, explanation, and others) that are potentially useful to designers for five prespecified triggers were administered to each designer, who generated ideas in response to each trigger–representation combination individually. The effect of representations of these triggers on the content and representation of the solutions generated by the design engineers was studied. The results showed significant influence of the representation of the triggers on the representations, number, and quality of the resulting ideas that were generated.
We describe a method for constructing a structural model of an unlabeled target two-dimensional line drawing by analogy to a known source model of a drawing with similar structure. The source case is represented as a schema that contains its line drawing and its structural model represented at multiple levels of abstraction: the lines and intersections in the drawing, the shapes, the structural components, and connections of the device are depicted in the drawing. Given a target drawing and a relevant source case, our method of compositional analogy first constructs a representation of the lines and the intersections in the target drawing, then uses the mappings at the level of line intersections to transfer the shape representations from the source case to the target; next, it uses the mappings at the level of shapes to transfer the full structural model of the depicted system from the source to the target.
We show that any positive integer is the least period of a factor of the Thue-Morse word.We also characterize the set of least periods of factors of a Sturmian word. In particular,the corresponding set for the Fibonacci word is the set of Fibonacci numbers.As a by-product of our results, we give several new proofs and tighteningsof well-known properties of Sturmian words.
We study the palindromic complexity of infinite words uβ,the fixed points of the substitution over a binary alphabet,φ(0) = 0a1, φ(1) = 0b1, with a - 1 ≥ b ≥ 1,which are canonically associated with quadratic non-simple Parrynumbers β.
Wireless mobile ad hoc networks consist of mobile nodes interconnected by wireless multi-hop communication paths. Unlike conventional wireless networks, ad hoc networks have no fixed network infrastructure or administrative support. The topology of such networks changes dynamically as mobile nodes join or depart the network or radio links between nodes become unusable. In this chapter, I will introduce wireless ad hoc networks, and discuss their inherent vulnerable nature. Considering the inherent vulnerable nature of ad hoc networks, a set of security requirements is subsequently presented. The chapter also introduces the quality of service issues that are relevant for ad hoc networks.
Ad hoc networking
Conventional wireless networks require as prerequisites a fixed network infrastructure with centralized administration for their operation. In contrast, so-called (wireless) mobile ad hoc networks, consisting of a collection of wireless nodes, all of which may be mobile, dynamically create a wireless network amongst themselves without using any such infrastructure or administrative support [1, 2]. Ad hoc wireless networks are self-creating, self-organizing, and self-administering. They come into being solely by interactions among their constituent wireless mobile nodes, and it is only such interactions that are used to provide the necessary control and administration functions supporting such networks.
Mobile ad hoc networks offer unique benefits and versatility for certain environments and certain applications. Since no fixed infrastructure, including base stations, is prerequisite, they can be created and used “any time, anywhere.” Such networks could be intrinsically fault-resilient, for they do not operate under the limitations of a fixed topology.
In an ad hoc network, each node is expected to forward the packets of its immediate neighbor to a node closer to destination. Without cooperation of the nodes in the neighborhood, a packet cannot make its journey from a source to destination. If the neighboring nodes are selfish or compromised, then the correct forwarding of the packets through them may not be possible. Compromised nodes often subvert the underlying routing protocol in such a way that a packet gets forwarded to an arbitrary destination, where packets may be subjected to content modification, identity tampering, or simply dropped. This chapter examines the problem of securing the routing protocols of ad hoc networks.
Security aware routing
The desirable properties of a secure route, which are timeliness, ordering, authentication, authorization, data integrity, confidentiality, and non-repudiation are summarized in Table 7.1. The table also indicates the well known techniques that are often employed in practice in achieving these properties in a routing protocol. For example, time stamps are used to ensure timeliness and sequence numbers are used in packet headers to ensure ordering of the routing messages.
The route discovery process is an integral part of a routing protocol, which finds paths between a source–destination pair. When a route discovery process is initiated to find a path that satisfies certain specific criteria such as QoS constraints and if such a route is indeed found, then such a routing protocol is known as a QoS-aware routing protocol [1].
Security and quality of service in ad hoc wireless networks have recently become very important and actively researched topics because of a growing demand to support live streaming audio and video in civilian as well as military applications. While a couple of books have appeared recently that deal with ad hoc networks, a comprehensive book that deals with security and QoS has not yet appeared. I am confident that this book will fill that void.
The book grew out of a need to provide reading material in the form of book chapters to graduate students taking an advanced wireless networking course that I was teaching at the Virginia Polytechnic Institute and State University. Some of these book chapters then subsequently appeared as chapters in handbooks and survey papers in journals.
This book contains eight chapters in total, of which five chapters deal with various aspects of security for wireless networks. I have devoted only one chapter to the quality of service issue. Chapter 1 introduces basic concepts related to an ad hoc network, sets the scene for the entire book by discussing the vulnerabilities such networks face, and then produces a set of security requirements that these networks need to satisfy to live up to the challenges imposed by the vulnerabilities. Chapter 1 also introduces basic concepts regarding quality of service as it relates to ad hoc networks.
Ad hoc networks are vulnerable not only to attacks from outside but also from within. Moreover, these attacks can be active as well as passive. In this chapter, I will discuss the various possible attacks on wireless ad hoc networks; this will then facilitate the discussion about designing the security schemes for such attacks in subsequent chapters. The significance of the various security needs discussed in Chapter 1 now comes to the fore, since any attack essentially disrupts either the operational mechanisms, or the security mechanisms including the security apparatus.
Attack classification
Ad hoc networks are typically subjected to two different levels of attacks. In the first level of attack, the adversary focusses on disrupting the basic mechanisms of the ad hoc network, such as routing, which are essential for proper network operation, and in the second level of attacks, the adversary tries to damage the security mechanisms employed by the network, such as key management schemes or cryptographic algorithms in use. This can be one way of classifying attacks. Alternatively, attacks against ad hoc networks can be classified into two groups in a different way:
Passive attacks which involve only eavesdropping on the data that is being communicated in the network. Examples of passive attacks include covert channels, traffic analysis, sniffing to compromised keys, etc., and
Active attacks which involve specific actions performed by adversaries, for instance, the replication, modification, and deletion of exchanged data among the nodes.
Adversaries attempt to change the behavior of the operational mechanisms in active attacks while they are subtle in their activities in passive attacks.
Wireless networks are typically divided into three classes depending on their range of transmissions. We have personal area networks (PANS) that have a very low transmission range, of the order of several meters; Bluetooth happens to be the representative network or technology when wireless personal area networks are mentioned. On a slightly larger transmission scale, of the order of 100–200 meters, we have wireless local area networks (LANs), known as 802.11 or WiFi, which are very well deployed all over the world. The personal area and local area networks have been primarily designed for indoor applications. Networks that have transmission in the range of several kilometers are known as wireless wide area networks (WANs), and cellular networks of different vintages are prime examples of such networks. So any discussion of security in a wireless environment will not be complete unless the proposed security schemes for these three distinct networks are examined. In this chapter, I briefly go over the security schemes of wireless PAN, LAN, and WAN networks. For readers interested in knowing more about these topics, appropriate references are highlighted. I begin this chapter by discussing WiFi security, followed by cellular network security, and concluding with the security of personal area networks.
Wireless local area networks (IEEE 802.11) security
Introduction
A wireless local area network (WLAN) is a flexible data communication system implemented as an extension to, or as an alternative to, a wired LAN. Wireless local area networks transmit and receive data over the air via RF technology, minimizing the need for any wired connections, and in turn, combining data connectivity with user mobility.