The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile crowd sensing has found a variety of applications (e.g., spectrum sensing, environmental monitoring) by leveraging the "wisdom" of a potentially large crowd of mobile users. An important metric of a crowd sensing task is data accuracy, which relies on the qualities of the participating users' data (e.g., users' received SNRs for measuring a transmitter's transmit signal strength)...
In spite of the pronounced benefit brought by crowdsensing, a user would not participate in sensing without adequate incentive, indicating that effective incentive design plays a critical role in making crowdsensing a reality. In this work, we examine the impact of two conflicting factors on incentives for users' participation: 1) the concern about privacy leakage and 2) the (positive) network effect...
The rapidly growing popularity of online social services has greatly spurred mobile users' online social interactions, which in turn has boosted their demand for data usage. However, wireless service providers' revenue growth is constrained by the capacity of the physical network infrastructure, and is further challenged by the price competition among different wireless providers. To fully understand...
With increasing popularity of location-based services (LBSs), there have been growing concerns for location privacy. To protect location privacy in a LBS, mobile users in physical proximity can work in concert to collectively change their pseudonyms, in order to hide spatial-temporal correlation in their location traces. In this study, we leverage the social tie structure among mobile users to motivate...
Crowdsensing has been widely recognized as a promising paradigm for numerous applications in mobile networks. To realize the full benefit of crowdsensing, one fundamental challenge is to incentivize users to participate. In this paper, we leverage social trust assisted reciprocity (STAR), a synergistic marriage of social trust and reciprocity, to develop an incentive mechanism in order to stimulate...
In this paper, we study a privacy-preserving spectrum sharing system to protect secondary users' location privacy while enhancing spectrum access. The location privacy of secondary users can be compromised by an external adversary via the received signal strength (RSS)-based localization technique. To mitigate such privacy threat, we employ a random power perturbation approach that allows each secondary...
In this paper, we develop a social group utility maximization (SGUM) framework for cooperative networking that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing its individual utility or the overall network utility, each user aims to maximize its social group utility that hinges heavily on its social ties with other users. We show that...
We develop a social group utility maximization (SGUM) game framework that takes into account both social relationships and physical coupling among users in a mobile network. Under the SGUM framework, each user aims to maximize its social group utility, defined as the weighted sum of the individual utilities of the users that have social ties with it. One distinctive merit of the SGUM framework is...
The Global Artificial Fish Swarm Algorithm (GAFSA) is proposed to calibrate the three-axis magnetometer, taking account of both internal sensor errors and external magnetic field interferences in this paper. A series of simulations and field experiments have been done and the results demonstrate that GAFSA-based calibration method can significantly improve the measurement accuracy of three-axis magnetometer...
In this paper, we develop a social group utility maximization game model that takes into account both social relationships and physical coupling among users. Specifically, instead of maximizing one's individual utility, each user aims to maximize its social group utility that hinges heavily on its social ties with other users. A salient feature of this model is that it spans the continuum space between...
Radar sensors, which actively transmit radio waves and collect RF energy scattered by objects in the environment, offer a number of advantages over purely passive sensors. An important issue in radar is that the transmitted energy may be scattered by objects that are not of interest as well as objects of interest (e.g., targets). The detection performance of radar systems is affected by such clutter...
This paper studies deterministic sensor deployment to ensure barrier coverage in wireless sensor networks. Most of existing work focused on line-based deployment, ignoring a wide spectrum of potential curve-based solutions. We, for the first time, extensively study the sensor deployment under general settings. We first present a condition under which line-based deployment is suboptimal, pointing to...
We consider a bistatic radar network that consists of multiple separated radar transmitters (TXs) and receivers (RXs), aiming to detect a target on a set of points of interest (PoIs). In contrast to the disk-based sensing model in a traditional sensor network, the detection range of a bistatic radar depends on both locations of the TX and RX, and is characterized by the Cassini oval. First, we study...
We consider secure wireless communications between a source and a destination aided by a multi-antenna relay, in the presence of an eavesdropper. In particular, two cooperation schemes of the relay are explored: cooperative relaying (CR) and cooperative jamming (CJ). We first investigate the transmit weight optimization of CR and CJ, for both cases with and without the eavesdropper's channel state...
This paper considers distributed opportunistic scheduling (DOS) with cooperative relaying in wireless ad hoc networks, with a focus on characterizing the desired tradeoff between the probing cost for establishing cooperative relaying and the higher throughput via opportunistic cooperative networking. Specifically, distributed scheduling and probing for cooperative relaying is treated as an optimal...
GPS navigators track vehicle location in real-time. A related problem is tracking a vehicle's path after the travel. This often is a requirement for fleet management and also for ensuring correct payment of road user charges. Such path prediction uses data stored during the vehicle's travel. The problem then is to ensure storing minimum amount of data, while maximizing the path prediction accuracy:...
A problem of joint optimal bandwidth and power allocation in cognitive networks under fading channels is considered. It is assumed that multiple secondary users (SUs) share the spectrum of a primary user (PU) using frequency division multiple access. The bandwidth and power are allocated so as to maximize the sum ergodic capacity of all SUs under the total bandwidth constraint of the licensed spectrum...
Joint bandwidth and power allocation in wireless multi-user decode and forward relay networks is proposed in this paper for maximizing the number of admissible users. A suboptimal greedy search algorithm is developed to solve the admission control problem efficiently at low complexity. The condition under which the greedy search is optimal is found. The way we derive such optimality condition for...
The resource allocation problem in wireless multi-user decode-and-forward (DF) relay networks is considered. The conventional resource allocation schemes based on the equal distribution of bandwidth and/or power may not be efficient for the networks with constrained/limited power and bandwidth resources at both sources and relays. Therefore, joint bandwidth and power allocation schemes are proposed...
In cognitive radio networks, secondary users (SUs) opportunistically exploit the spectrum unutilized by primary users (PUs). In this paper, we study the secondary communication where secondary transmitters and receivers have different available spectrum. Considering the spectrum diversity and the space distance between different PUs, we introduce cognitive relay node into the secondary communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.