The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the major challenges in a wireless sensor network (WSN) is to extend the network's lifetime by minimizing the energy consumption. One of the ways to do so is to reduce network congestion as it increases delays and introduces additional packet collisions- thus, adversely affecting network performance. In this paper, we analyze this issue in routing and take an evolutionary game theoretic approach...
Maximizing the lifetime is an important issue in the design of applications and protocols for wireless sensor networks (WSNs). Clustering sensor nodes is an effective topology control approach helping achieve this goal. In this paper, we present an energy efficiency protocol to prolong the network lifetime based on an improved particle swarm optimization (PSO) algorithm. The protocol takes both energy...
Cloudlet is a new paradigm in mobile cloud computing to provide resources to nearby mobile users via one-hop wireless connections. In this study, we leverage the social tie structure among mobile users to achieve mutual-beneficial computation offloading decision making and hence enhance the system-wide performance.Drawing on a social group utility maximization (SGUM) framework, we cast users' decision...
The growing density of cellular users is placing an unprecedented demand on radio spectrum. Cognitive cellular networks can alleviate spectrum demand through dynamic spectrum access. In order to be fully functional, cellular users not only need spectrum access but also require network access. However, a cellular carrier grants network access only to accredited users. In this paper, we focus on the...
In this paper, the design of a truthful mechanism for prioritized medical packet transmissions in e-health networks is studied. Unlike most of existing works, we focus on beyond wireless body area networks (beyond-WBANs), and consider the absolutely prioritized scheduling, i.e., emergent medical signals have to always be transmitted prior to normal ones. In our model, medical packets arrive randomly...
Software Defined Networking has been adopted to improve data center network efficiency. In SDN, the controllers are responsible for exchanging information with the switches to perform specific operations such as data forwarding. The transmission of control traffic usually uses networks different from data networks. However, building an additional wired network for the control traffic leads to high...
With the development of satellite communication technologies and user requirements for pervasive network access, there is a trend to integrate satellites into the terrestrial network infrastructure. Such kind of satellite-terrestrial network is often used for content delivery services as satellites are with wide-area coverage. In terrestrial networks such as Internet, in-network caching has been proved...
Achieving energy efficiency has recently become an essential aim of networking research due to the ever increasing power consumption and CO2 emissions generated by large data networks. For this problem, the emerging paradigm of Software-Defined Networks (SDN) can be seen as an attractive solution. In these networks an energy-aware routing model could be easily implemented leveraging the control and...
Random linear network coding (RLNC) has been shown to efficiently improve the network performance in terms of reducing transmission delays and increasing the throughput in broadcast and multicast communications. However, it can result in increased storage and computational complexity at the receivers end. In our previous work we considered the broadcast transmission of large file to N receivers. We...
In this paper, we study the optimal degrees of freedom (DoF) region for the two-pair MIMO two-way relay channel (TWRC) with asymmetric antenna setting, where two pairs of users exchange information with the help of a common relay. First, we derive an outer bound of the DoF region by using the cut-set theorem and the genie-message approach. Then, we propose a new transmission scheme to achieve the...
Protecting the location privacy is still one of the main challenges in Vehicular Ad-hoc Networks(VANETs). Although, standardization bodies such as IEEE and ETSI have adopted the pseudonymous scheme as a solution to this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose a complete and efficient pseudonym management and changing scheme based on...
The novel Fog-to-Cloud (F2C) computing paradigm has been recently proposed aiming at the enhanced integration of Fog Computing and Cloud Computing through the coordinated management of underlying resources, taking into account the peculiarities inherent to each computing model, and enabling the parallel and distributed execution of services into distinct fog/cloud resources. Nevertheless, studies...
Device-to-device (D2D) enabled cloud radio access networks (C-RANs) are potential solutions for further improving spectral efficiency (SE) and decreasing latency by allowing direct communication between two user equipments. Due to the acquirement of global channel state information (CSI) and the execution of centralized algorithms in the uplink D2D enabled C- RANs, heavy burdens are put on fronthaul...
To integrate Software Defined Networking (SDN) in the envisioned 5G system, a separation of the control and user data plane functions of the Evolved Packet Core (EPC) is required. This separation will impact mainly the functions available at the Serving GateWay (SGW) and Packet data GateWay (PGW) elements, and will result in two new entities; i.e. the S/PGW-C and S/PGW-U (PGW-C and PGW-U). The S/PGW-C...
Abstract-Public-cloud providers do not disclose quantitative information about the performance of their inter- datacenter networks in spite of their importance and of the growing interest they are attracting. In this paper we propose an analysis of the inter-datacenter network of the two leading providers-Amazon Web Services and Microsoft Azure- only leveraging active monitoring approaches and thus...
Packet classification is an indispensable yet challenging functionality of modern network devices. Despite more than fifteen years of research, algorithmic solutions still fall short of meeting the line-speed of high performance routers or switches. As a result, the industry is still relying on TCAMbased hardware solutions for parallel lookups. SAX-PAC, a recently proposed hybrid framework, uses a...
In the private information retrieval (PIR) problem a user wishes to retrieve, as efficiently as possible, one out of K messages from N non-communicating databases (each holds all K messages) while revealing nothing about the identity of the desired message index to any individual database. The information theoretic capacity of PIR is the maximum number of bits of desired information that can be privately...
In this work, we examine the secrecy capacity region of the block-fading broadcast channel with confidential messages (BCC) when the transmitter has limited knowledge of the channel. In particular, we consider a two-user communication system where the transmitter has one common message to be transmitted to both users and one confidential message intended to only one of them. The confidential message...
Device-to-device (D2D)-based social networking service (SNS) is an emerging information system that enables users with social ties to exchange multimedia contents through multihop short-range wireless links. In the D2D-based SNS, a random initial node failure may lead to a cascade of failures, which is a series of events in which users become isolated from others over subsequent time instances. Different...
The article considers the joint optimization of artificial noise (AN) and information signal precoders in a MIMO wiretap interference network where the transmission of each user may be overheard by several MIMO-capable eavesdroppers. We use the theory of non-cooperative games to propose a distributed framework to optimize the covariance matrices of the information signal and AN at each link. To tackle...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.