The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Indoor localization is an important topic for context aware applications. In particular, many applications for wireless devices can benefit from knowing the location of a user. Despite the huge effort from the research community to solve the localization problem, there is no widely accepted solution for localization in an indoor environment. In this paper we focus on constrained devices and propose...
Nearly three-fourths of the world's mobile data traffic will be video in the next 5 years. Video is one of the most demanding services in terms of network efficiency, reliability, and quality. In this work, we present a comparative performance evaluation of three different video streaming protocols, namely MPEG-DASH, RTSP, and RTMP for both on-demand and live video streaming over 4G and Wi-Fi (under...
This paper considers the problem of distributed neighbor discovery in multi-channel wireless networks. We propose a protocol in which nodes randomly select a channel and decide whether to transmit or listen for neighbor discovery beacons. When nodes transmit, they use epidemic information dissemination to spread knowledge about all the nodes they have discovered so far. Theoretical guarantees on discovery...
Vehicular ad hoc networks (VANETs), often called Car2X communication systems, are about to enter the mass market in upcoming years. They are intended to increase traffic safety by enabling new safety critical driver assistance systems. This also means that strong security mechanisms are required to safeguard communication within VANETs. However, standardized security mechanisms lead to significant...
Vehicle-to-infrastructure (V2I) communication is important for the collection of probe vehicle data and traffic information. When using IEEE 802.11 as access technology (ITS-G5 or WAVE), the communication between moving vehicles and fixed infrastructure, such as roadside stations, is most efficient when the passing vehicle reaches a window of opportunity that is characterized by high frame success...
Current centralized cloud datacenters provide scalable computation- and storage resources in a virtualized infrastructure and employ a use-based "pay-as-you-go" model. But current mobile devices and their resource-hungry applications (e.g., Speech-or face recognition) demand for these resources on the spot, though a mobile device's intrinsic characteristic is its limited availability of...
Consumption of multimedia content is moving from a residential environment to mobile phones. Optimizing Quality of Experience -- smooth, quick, and high quality playback -- is more difficult in this setting, due to the highly dynamic nature of wireless links. A key requirement for achieving this goal is estimating the available bandwidth of mobile devices. Ideally, this should be done quickly and...
As mobile ad-hoc networks (MANETs) continue to receive an increasing attention in research due to its vast amount of applications, security is becoming one of the main research challenges. Most of the proposed research in MANET security focused on secure routing and key management. In this paper, we propose an access control mechanism with features that is inherited to produce a secure address auto-configuration...
Dense small cell (SC) deployments are expected to help handling the explosive growth of mobile data usage. However, the backhaul of these deployments will face several challenges where point-to-point (PTP) and point-to-multipoint (PMP) wireless technologies will be combined forming multipoint-to-multipoint (MP2MP) wireless mesh backhauls. In this context, routing and load balancing solutions will...
Two of the main issues in wireless industrial Internet of Things applications are interoperability and network lifetime. In this work we extend a semantic interoperability platform and introduce an application-layer sleepy nodes protocol that can leverage on information stored in semantic repositories. We propose an integration platform for managing the sleep states and an application layer protocol...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Many of the models used to analyze the performance of wireless networks assume stationary traffic behaviors where the average state-changing event times are constant. Various analysis of real traffic traces have shown that such behaviors in mobile wireless networks vary periodically during the day and night. Other systems also exhibit a similar behavior. A better analysis of the network's performance...
We describe a deterministic and a randomized distributed algorithm for computing a spanning tree over a wireless network whose weight approximates the weight of a Minimum Spanning Tree (MST). The network is composed of n static nodes embedded in a 2-dimensional Euclidean space which communicate according to the Signal-to-Interference- and-Noise Ratio (SINR) model. Under the assumption that each node...
LTE uses single carrier-frequency division multiple access (SC-FDMA) scheme for the uplink transmission which limits the flexibility of the allocation process as the sub carriers assigned to a single user have to be contiguous. We propose an LTE uplink interference-aware search-tree based scheduling scheme using the high interference indicator (HII) and the overload indicator (OI) messages that are...
A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selective with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.