The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IEEE 802.16 standard is currently one of the most interesting broadband wireless access. One key issue of mesh networks is the MAC (medium access control) layer. In this paper we analyze the coordinated distributed scheduling scheme (CDS) of the standard IEEE 802.16. Since some fundamental parameters in this scheme has been left un-standardized, we focus on the dynamic setting of these parameters...
Motivated by the success of the Picture in Picture feature of the traditional TV, several commercial Peer-to-Peer MultiMedia Streaming (P2PMMS) applications now support the multi-view feature, with which a user can simultaneously watch multiple channels on its screen. This paper considers the peer selection problem in multi-view P2PMMS. This problem has been well studied in the traditional single-view...
In this paper, we propose a distributed algorithm to elect the top K leaders among the nodes in a wireless ad hoc network. Leader election is a fundamental distributed coordination problem arising from many applications, e.g. token regeneration, directory service. However, there is no deterministic algorithm proposed for electing k leaders. In our algorithm, election is based on the weight values...
Many next-generation Internet architectures propose advanced packet processing functions in the data path of the network. Such "services" are typically performed on some nodes along the path of a packet. We present a novel decentralized algorithm that can determine an allocation of services to network nodes. The algorithm can obtain globally optimal solutions for a single service and approximate...
In this paper, we propose a method for desirably redistributing a wireless sensor network's energy consumption from its sensor nodes (which may have scarce energy resources obtained through energy harvesting, for example) to its central node (which often has an abundant energy resource, such as the mains). At the cost of increasing the central node's decoding complexity, our method facilitates (1)...
In order to provide more comprehensive services, a concept of integrated heterogeneous wireless and mobile network (IHWMN) is introduced by combing different types of wireless and mobile networks (WMNs). However, it imposes great challenges such as resource management schemes to support multiple traffic in IHWMNs. In this paper, we propose two resource management schemes for IHWMNs. The first scheme...
We present a mathematical framework for the performance evaluation of proactive and reactive routing protocols operating in mobile ad hoc networks (MANETs). The model captures the functionality of the routing protocols together with the characterization of the performance of the medium access control protocol (MAC). It reveals the interplay between the protocol functionality and network parameters,...
Energy efficiency is a central challenge in battery- operated sensor networks. Current energy-efficient mechanisms employ either duty cycling, which reduces idle listening but does not eliminate it, or low power wake-up radio, which adds complexity and cost to the sensor platform. In this paper, we propose a novel mechanism called RFIDImpulse that uses RFID technology as an out-of-band wake-up channel...
The existing vehicular sensors of taxi companies in most of cities can be used for traffic monitoring, however sensors are always set with a long sampling interval because of communication cost saving and network congestion avoidance. In this paper, we focus on the traffic data processing in vehicular sensor networks providing sparse and incomplete information. A performance evaluation study has been...
In the current Internet architecture, functions such as addressing, routing, and forwarding are entangled. Among other consequences, this makes it difficult to modify one without affecting the others, and obscures the role of policy at various places in the architecture. This paper considers a network layer designed as a set of separable component mechanisms that work together to provide a best-effort...
The recursive network architecture (RNA) explores the relationship of layering to protocol and network architecture. RNA examines the implications of using a single, tunable protocol, called a metaprotocol, for different layers of the protocol stack, reusing basic protocol operations across different protocol layers to avoid reimplementation. Its primary goal is to encourage cleaner cross-layer interaction,...
As the Internet steadily increases in importance, it is still based on a quite fragile routing design. From network operators perspective it is therefore crucial to detect end-to- end path performance due to routing outages early to either mitigate them directly or contact other entities to mitigate them. In this work we demonstrate the feasibility of a real-time tool for detecting degraded forwarding...
Internet protocol television (IPTV), one of the most emerging services, offers multimedia streaming services with security, reliability, and relevant quality of service (QoS)/quality of experience (QoE). It provides added values to all the involving players including customers and also brings technical and business challenges to those players. For IPTV services, we expect to adopt the next generation...
Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause serious damage to the overall trust evaluation system. This paper presents and analyzes a trust model robust to slander attacks in ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors...
The aim of this paper is to present a generic cognitive framework for autonomous decision making with regard to multiple, possibly conflicting, operational objectives in the face of a time-varying environment. The framework is based on the definition of two scales introducing order relationships between the configurations that help the reasoning and learning processes. The resulting cognitive engine...
Cognitive radio is an enabling technology for opportunistic spectrum access. Spectrum sensing is a key feature of a cognitive radio whereby a secondary user can identify and utilize the spectrum that remains unused by the licensed (primary) users. Among the recently proposed algorithms the covariance-based method of [1] is a constant false alarm rate (CFAR) detector with a fairly low computational...
We investigate the use of multi-user detection to improve performance in MIMO interference networks. Unfortunately, while multi-user detection often allows higher data rates, it greatly complicates the problem: in addition to choosing a transmit covariance for each transmitter, we must decide which signals each receiver will detect and which data rates make such detection feasible. We discuss methods...
In mobile ad hoc networks, solving the standard problems encountered in fixed networks can be challenging because of the unpredictable motion of mobile nodes. Due to the lack of a fixed infrastructure to serve as the backbone of the network, it is difficult to manage nodes' locations and ensure stable node performance. In this paper, we introduce an extension of an algorithm, multi-path intelligent...
Location fingerprinting techniques generally make use of existing wireless network infrastructure. Consequently, the positions of the access points (APs), which constitute an integral part of a location system, will invariably be dictated by the network administrator's convenience regarding data communication. But the localization accuracy of fingerprint-based solutions is largely dependent on the...
Maintaining synchronization of clocks between wireless systems is a well known problem of which significant research has been performed. This has lead to a variety of methods introduced to maintain clock synchronization. Typically, works are heavy weight in that they require constant communication between systems in order to maintain clock synchronization on the order of microseconds. Unfortunately,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.