The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present an efficient encryption system based on Compressive Sensing, without the additional computational cost of a separate encryption protocol, when applied to indoor location estimation problems. The breakthrough of the method is the use of the weakly encrypted measurement matrices which are generated when solving the optimization problem to localize the source. It must be noted...
With the explosive increase in Internet Contents, the Internet usage is shifting from host-to-host model to content dissemination model, e.g. video content accounts for the majority of Internet traffics. ISPs, content providers and other third parties have already deployed CDNs (content delivery networks) to improve user experience. However, as an ad-hoc solution to the content dissemination problem,...
The demand for mobile computing services has grown significantly and rapidly in the last few years. This has led to a serious challenge on the quality of experience for mobile users. The wireless network consists of consumer devices that communicate simultaneously on a shared and severely-limited spectrum. In 2010, the Federal Communication Commission (FCC) has unleashed 500MHz of newly available...
Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, it also brings more security and privacy concerns. In this paper, we discuss a specific type of Sybil attack in MSNs, which few researches has been focused on. We...
The paper investigates the balance between Quality of Service (QoS) and power consumption for a traffic queue. Automatic adaptation to the power of the packet processing engine is sought through a heuristics and an optimal control strategy. The study allows to track the behavior of the system over time, thus avoiding the optimization of the steady state behavior of the system, which is hardly applicable...
A robust transmit beamforming scheme is proposed for green cognitive radio networks in presence of incorrect steering vector estimations. The beamformer is designed using a stochastic optimization approach. The proposed beamforming scheme achieves three objectives: a) Probability for large-than-a-threshold for secondary user's received power in the steering direction is maximized; b) Probabilities...
Interference management is an important subject in Device to Device (D2D) communication when underlying a LTE-A cellular band. By default, in LTE-A there is negligible intra-cell interference due to the orthogonality of the subcarriers but this orthogonality will be lost when D2D communication takes place under cellular users (CU). Therefore, the purpose of this paper is to propose a novel scenario...
In this paper, we aim to reduce the power expenditure in the reverse link during low network load periods, by allocating extra resource blocks (RBs) to the mobile users. Thereby, the user's rate demands are split among its allocated RBs in order to transmit in each of them by using a low level modulation order. We model the bandwidth expansion (BE) process by a game theory framework derived from the...
In this paper, energy efficient power adaptation is considered in sensing-based spectrum sharing cognitive radio systems in which secondary users first perform channel sensing and then initiate data transmission with two power levels based on the sensing decisions (e.g., idle or busy). It is assumed that spectrum sensing is performed by the cognitive secondary users, albeit with possible errors. In...
Information centric networking (ICN) architectures represent a conceptual shift from naming end-hosts in the Internet to naming content directly, and require either significant changes to the existing IP infrastructure or replacing it entirely. We present iDNS (information-centric DNS), an evolutionary path towards deploying ICN at Internet scale based on modifications to the DNS that leave the current...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.