The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy-efficient design has emerged as a promising technique in heterogeneous networks. We study the energy efficiency problem of joint user association and power allocation in a two-tier heterogeneous network with small cells. The energy efficiency is maximized under certain prescribed quality-of-service requirement and maximum power limit constraint. The original optimization problem is a nonconvex...
In this paper, the security of multi-input single- output (MISO) amplify-and-forward relaying network with untrustworthy relay nodes is considered, where the untrustworthy nodes can help to forward the received signal and they may also try to decode such information, which can be regarded as potential eavesdroppers (Eves). To deal with such kind of smarter Eves, relay selection is adopted and both...
Cognitive radio emerges as a promising technology to improve the utilization of the allocated spectrum. In a cognitive radio network, secondary users (SUs) need to sense the spectrum to obtain currently available channels and have to vacate the occupied channels when primary users (PUs) return. In cognitive radio networks, establishing a link through a common available channel is defined as the rendezvous...
This paper studies how to determine an optimal order of recovering interdependent Cyber Physical Systems (CPS) after a large scale failure. In such a CPS, some failed devices must be repaired first before others can. In addition, such failed devices require a certain amount of repair resources and may take multiple stages to repair. We consider two scenarios: 1) reserved model where all the required...
In this work, we study data shaping codes for flash memory. We first review a recently proposed direct shaping code for SLC (one bit per cell) flash memory that reduces wear by minimizing the average fraction of programmed cells. Then we describe an adaptation of this algorithm that provides data shaping for MLC (two bits per cell) flash memory. It makes use of a page- dependent cost model and is...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
As an efficient way to collect sensing data, participatory sensing has been receiving more and more attentions and its applications cover various areas such as traffic control and management, environmental monitoring, etc. In a participatory sensing system, Service Provider (SP) works as the task promulgator, Smartphone User (SU) works as the task executor and the Platform handles the sensing task...
Sparse code multiple access (SCMA) has been presented as a promising solution for uplink transmission since it enables random access so that the pre-establishment of link can be omitted. However, this randomness could cause codebook collision when different users pick the same codebook. Though the message passing algorithm (MPA) is employed to decode nonorthogonal codewords to lower the complexity,...
A distributed consensus algorithm for estimating the degree distribution of a graph is proposed. The proposed algorithm is based on average consensus and in-network empirical mass function estimation. It is fully distributed in the sense that each node in the network only needs to know its own degree, and nodes do not need to be labeled. The algorithm works for any connected graph structure in the...
Minimizing the maximum sensor movement distance for achieving linear barrier coverage is a key issue for intrusion detection in the area of barrier coverage. Existing work in this area mostly assume that every working sensor needs to move onto the barrier line. Actually, sensors can still be helpful for covering the barrier when they move near enough to the line. In this paper, we study the case where...
Cloud storage is vulnerable to Advanced Persistent Threats (APTs), which are stealthy, continuous, well funded and targeted. In this paper, prospect theory is applied to study the interactions between a subjective cloud storage defender and a subjective APT attacker. Two subjective APT games are formulated, in which the defender chooses its interval to scan the storage device and the attacker decides...
It is of significant importance to provide incentives to smartphone users in mobile crowd sensing systems. And a number of auction-based incentive mechanisms have been proposed. However, an auction-based incentive mechanism may unexpectedly release the location privacy of smartphone users, which may seriously reduce users' willingness of participating in mobile crowd sensing. In an auction-based mechanism,...
Due to the emergence of mobile 3D and VR devices, multi-view 3D videos are expected to play increasingly important roles shortly. Compared with traditional single-view videos, it is envisaged that a multi-view 3D video requires a larger storage space. Nevertheless, efficient caching of multi-view 3D videos in a proxy has not been explored in the literature. In this paper, therefore, we first observe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.