The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile social networks have gained tremendous popularity among hundreds of millions of Internet users due to their fast information spreading and strong inter-person influence. However, the high complexity of social interactions and the intrinsic dynamics of mobile social networks make it challenging to model the spreading mechanism delicately and enable precise prediction of information diffusion...
Time-variations in wireless channels affect opportunistic selection in a multi-node wireless system in two ways. First, the selected node can become sub-optimal by the time data transmission commences. Second, the channel changes during data transmission. We develop a comprehensive and tractable analytical framework that accurately accounts for both these effects. It differs from the extensive existing...
Database-aided user association, where users are associated with data base stations (BSs) based on a database which stores their geographical location with signal-to-noise-ratio tagging, will play a vital role in the futuristic cellular architecture with separated control and data planes. However, such approach can lead to inaccurate user-data BS association, as a result of the inaccuracies in the...
Big data has been emerging as a new approach in utilizing large datasets to optimize complex system operations. Big data is fueled with Internet-of-Things (IoT) services that generate immense sensory data from numerous sensors and devices. While most current research focus of big data is on machine learning and resource management design, the economic modeling and analysis have been largely overlooked...
Location fingerprinting (LF) is an attractive localization technique which relies on existing infrastructures. The major drawback of LF is the requirement of having an updated fingerprint database. Gaussian Process (GP) is a non-parametric modeling technique which can be used to model the received signal strength indicator (RSSI) and create the fingerprint database based on few training data. In this...
Data Pendulum [1] designates the packet backlog switch from one side of a bottleneck link to the other in presence of two antiparallel TCP connections. This paper completes the explanation of the Data Pendulum dynamics by elucidating on which side the backlog grows, while identifying the relevant parameters in the process. We also explain why and when the data backlog may switch sides without any...
Machine-to-machine (M2M) communication's severe power limitations challenge the interconnectivity, access management, and reliable communication of data. In densely deployed M2M networks, coordinating and aggregating the generated data is critical. We propose an energy efficient data aggregation scheme for a hierarchical M2M network with truncated power control. We optimize the number of hierarchical...
The path loss model describing the power-law dependency on distance plus a log-normally distributed shadowing attenuation, is a staple of link budgets and system simulations. Determination of the parameters of this model is usually done from measurements and ray tracing. We show that the typical least-square fitting to those data points is inherently biased to give the best fitting to the link distances...
We have developed reduced reference parametric models for estimating perceived quality in audiovisual multimedia services. We have created 144 unique configurations for audiovisual content including various application and network parameters such as bitrates and distortions in terms of bandwidth, packet loss rate and jitter. To generate the data needed for model training and validation we have tasked...
Many popular e-commerce applications run on geo-distributed data centers requiring high availability. Fault-tolerant distributed data centers are designed by provisioning spare compute capacity to support the load of failed data center, apart from ensuring data durability. The main challenge during the planning phase is how to provision spare capacity such that the total cost of ownership (TCO) is...
Internet traffic destined to routable yet unallocated IP addresses is commonly referred to as telescope or darknet data. Such unsolicited traffic is frequently, abundantly and effectively exploited to generate various cyber threat intelligence related, but not limited to, scanning activities, distributed denial of service attacks and malware identification. However, such data typically contains a...
In cognitive radio networks, delay requirements for secondary users are not homogeneous. In this paper the secondary user traffic is classified into M prioritized classes based on delay requirements in order to support the delay-sensitive secondary user applications. Moreover, after each interruption from the primary user the priority of the secondary user increases within the same class in order...
In social networks, most information is stored, displayed and propagated in the form of text which is characterized by latent topics. With the discovery of latent topics, we can make more accurate prediction, inference and therefore, better applications, in social networks. Considering the dynamics and noise in social networks, we analyze data evolution from different perspectives including both common...
Wireless communication devices have spread widely in our society. However, they usually depend heavily on communication infrastructure, leaving them vulnerable to disasters or congestion of base stations. In these situations, a method to send out data without the support of infrastructure is required. Data transmission by D2D communication is a reliable method that does not rely on infrastructure...
Using stochastic geometry, downlink (DL) coverage probability in slot-based two-tier heterogeneous cellular networks (HCNs) is studied. Two traffic patterns namely slotted-asynchronous and exponential-interarrival are introduced to capture user activity, and the DL coverage probability based on max-SINR association is derived. In contrast to many works, the transmission slots of base stations (BS)...
The popularity of online social networks (OSNs) has resulted in them being targeted with Sybil attacks, where an adversary forges many fake identities (called Sybils) to disrupt or control the normal functioning of the system. Several schemes have been proposed to defend against Sybil attacks. Most of these schemes work by computing the landing probability or statistical distribution of visiting frequency...
Incorporating energy efficiency into the design of modern communication systems has become an important area of research. However, while most of the proposed solutions are devoted to making network hardware energy efficient, very few works focus on energy efficiency as a fundamental design parameter of network protocols. This paper proposes an analytical model for energy consumption of TCP which relates...
The advances of network technology and mobile communication technology are making eHealth possible. In eHealth systems, physiological data and relevant context-aware data are acquired continuously and in real time. At the same time, such large-scale data results in huge challenges in the aspect of real-time big data processing since eHealth data appears in the form of data stream. Therefore, we propose...
The popular uprisings in a number of countries in the Middle East and North Africa in the Spring of 2011 were broadcasted live and enabled by local populations' access to social networking services such as Twitter and Facebook. The goal of this paper is to study the flow characteristics of the information flow of these broadcasts on Twitter. We have used language independent features of Twitter traffic...
The Internet of Things (IoT) architecture is expected to evolve into a horizontal model containing various open systems, integrated environments, and platforms. However, not much research effort has been devoted to developing architectures for horizontal IoT solutions so far. This paper presents an IoT architecture based on Software-Defined Networking (SDN). In this architecture, devices, gateways,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.