The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio is an optimistic technology to implement the concept of dynamic spectrum access and provide a flexible way to share the spectrum among the primary and secondary users. In this paper, a game theoretic-based model is presented using the concept of Nash Equilibrium for spectrum sharing. In this model, interference and number of radios on each link are considered as parameters for designing...
We consider virtual optical network (VON) mapping with the objective of minimizing total network link cost while guaranteeing VON availability, where VON availability is supported by providing shared backup path protection for selected VON links. We develop a matrix-based approach for calculating the availability of a VON mapping with shared backup path protection. In order to efficiently evaluate...
Twitter is attracting significant interests from the research community in the last few years. Sentiment analysis of tweets is among the hottest topics of research nowadays. State of the art approaches of sentiment analysis present many shortcomings when classifying tweets, in particular when the classification goes beyond the binary or ternary classification. Multi-class sentiment analysis has proven...
Download delay is a crucial performance metric in distributed storage systems as it greatly impacts user experience. Recently, plenty of research has pointed out that coding can reduce delay compared with replication. However, almost all previous studies only focus on the case in which all of the users require the same size of files and hence must download all files of a codeword and ignore the case...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
Locally repairable codes (LRC) for distributed storage allow two approaches to locally repair multiple failed nodes: 1) parallel approach, by which each newcomer access a set of live nodes $(r$ is the repair locality$)$ to download data and recover the lost packet; and 2) sequential approach, by which the newcomers are properly ordered and each newcomer access a set of other nodes, which can be...
In fat-tree data center networks, routing a packet from its source to destination includes two phases, upstream (i.e. from source to watershed switch) and downstream (i.e. from watershed switch to destination). The throughput/non-blocking performance of networks hinges much on the effects of two phases above. In this paper, we propose a new routing algorithm called Global Round Robin (GRR) for fat-tree...
Social networks such as Twitter and Facebook have become important sources for users to acquire information. In those social networks, users obtain information from the posts/reposts of their social connections. To acquire information efficiently, users are motivated to connect to users who offer attractive and timely information. In this paper, we study how to effectively optimize social connections...
We consider the problem of estimating the latency of a feasible but unused Autonomous System-level path on the Internet. This problem arises in evaluating the overhead incurred by censorship and surveillance circumvention schemes that alter the Internet routing infrastructure, and the cost of attacks against such schemes. Since these paths are not advertised by the current routing infrastructure,...
We study the impact of assortativity or network mixing on interdependent security. We employ a population game model to capture the interaction among many agents when agents are strategic and have various security measures they can choose to defend themselves. We model the interdependence in security among agents using a dependence network. The overall (local) network security seen by agents is measured...
Due to the scarcity of the licensed spectrum, Licensed-Assisted Access Long-Term Evolution (LAA- LTE) network can be deployed in unlicensed spectrum, which is currently occupied by different Wi-Fi systems. It is a very challenging problem to ensure fair coexistence between LAA-LTE and Wi-Fi networks, in terms of spectrum sharing and traffic management. To solve this problem, a Fair Downlink Traffic...
The backhaul network is a critical challenge towards the success of 5G and corresponding difficulties are many-fold, such as network coverage expansion, very high bandwidth, ultra- low latency and energy consumption, at a minimum cost. No single backhaul solution can address all these requirements but, on the other hand, not all of the backhaul links require the same set of stringent requirements...
With more and more trajectory traces available, conducting analysis and mining on those trajectories can obtain valuable information. Although the published traces are often made anonymous by substituting the true identities of mobile nodes with random identifiers, the privacy concern remains. In this paper, we propose a new de-anonymization attack based on the movement pattern of moving objects....
Identifying influential spreaders in online social networks (OSNs) has long been an important but difficult problem to be addressed. Distinguished from previous works that mainly focused on the stationary features of users' influence, we systematically study the variations of users' spreading capability given the fact that influential spreaders are more likely to be the targets of various cyber attacks...
This paper proposes a new model called \emph{spatial continuum asymmetric channels} to study the channel capacity region of asymmetric scenarios in which either one source transmits to a spatial density of receivers or a density of transmitters transmit to a unique receiver. This approach is built upon the classical broadcast channel (BC) and multiple access channel (MAC). For the sake of consistency,...
In this paper, we study the connectivity probability of linear multi-hop ad hoc networks operating in an interference-limited environment. The nodes in the network are assumed to form a Poisson point process (PPP), and they generate mutual interference during communications. A node communicates to other nodes in the network by using its intermediate neighbors as relays. The average node density plays...
In this paper, we consider a heterogeneous network in which a macro-cell tier is overlaid with a very dense tier of small cells. The macro-cell base station (BS) that applies a massive MIMO scheme not only serves the macro user equipment but also provides a wireless backhual for small-cell access points (APs). These APs serve their associated small-cell user equipment. A reverse time division duplex...
In this paper, a novel approach for providing incentives for caching in small cell networks (SCNs) is proposed based on the economics framework of contract theory. In this model, a mobile network operator (MNO) designs contracts that will be offered to a number of content providers (CPs) to motivate them to cache their content at the MNO's small base stations (SBSs). A practical model in which information...
Cloud storage is vulnerable to Advanced Persistent Threats (APTs), which are stealthy, continuous, well funded and targeted. In this paper, prospect theory is applied to study the interactions between a subjective cloud storage defender and a subjective APT attacker. Two subjective APT games are formulated, in which the defender chooses its interval to scan the storage device and the attacker decides...
In online social networks (OSNs), individual users have a strong desire to expand their social networks through OSN activities and try to maximize the benefits from the social relationships, called social capital. However, with a large-scale social network, their privacy rights have been significantly intruded by adversarial users that perform social attacks including false / illegal private information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.