The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Caching decisions by default seek to maximize some notion of social welfare: the content to be cached is determined so that the maximum possible aggregate demand over all users served by the cache is satisfied. Recommendation systems, on the contrary, are oriented towards user individual preferences: the recommended content should be most appealing to the user so as to elicit further content consumption...
In recent years, as higher performance terminal equipments are spread, the amount of mobile data traffic is growing rapidly by using popularization of streaming services in wireless networks. To overcome this situation, it is considered that Access Points (APs) are deployed densely for capacity improvement. In such an environment, virtualization is a possible technique to use multiple APs efficiently...
In this paper, we address the problem of power consumption minimization in Heterogeneous networks (HetNets) of China Mobile by implementing dynamic base stations (BSs) switching operation. Particularly, considering the minimal rate requirements of users as well as the realistic power consumption model of BSs, we formulate the problem as an integer linear programming which is NP-complete. Then, to...
WLAN has been considered as a compliment technology for cellular network in the heterogeneous wireless network. Thus, seamless connection between these technologies play important role as the performance indicator. In this paper, we consider the user's velocity and channel holding time to predict the user's dwelling time in the WLAN area to assist in the initial network selection. If the expected...
In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric duty cycles can still be improved. In this work, we investigate asynchronous neighbor discovery through a code-based...
In this paper, we consider a nano-biosensor network composed of nano-to-micro scale biological machines distributed over a two-dimensional bounded area. The goal of the nano-biosensor network is to detect a target signal that propagates via Brownian motion in the monitoring area. Three simple nanomachine placement strategies are investigated: random, proportional, and regular placement. In the random...
This paper analyses two techniques that mitigate the routing misbehavior in wireless ad hoc network, watchdog & pathrater. By reconstructing the watchdog, we eliminate the collision problem which tends to be the weakness of this mechanism and make this algorithm have an better performance in mitigating routing misbehavior in wireless ad hoc network.
In some networks, a mobile node must be located securely as well as accurately. One way to locate is for base stations to use time-difference-of-arrival multilateration. An attacker that can transmit at different times in different directions may falsify its position with respect to known base stations. Previous work proposed hiding the base stations, following a model of "security through obscurity...
Mobile users want to be connected to a network at any time for mobile computing applications, such as thin-client communications and network games, even while they are moving toward their destinations. They could take an alternate route (called a “longcut” route) if the route is geographically longer than a shortcut route to their destinations but gives more wireless network resources, such as bandwidth...
Provisioning continuous services while moving through heterogeneous wireless networks is a main issue in the fourth generation wireless Networks. An efficient vertical handover decision making algorithm that takes into account services' requirements, considers users' preferences and guaranties seamless handover over heterogeneous technologies is required. In this paper, we propose an intelligent context-aware...
Because of the virtue mobility, flexibility, and convenience, more and more wireless network are used in our everyday life. During the move between two scales of different AP (Access Point), the quality of the services heavily depends on the seamless handoff scheme which provide less packet lost. There are many people propose lots of strategies to reduce packet lost and do many contribution to it...
Most traditional MAC protocols proposed for wireless networks assume static Network Units (shorted as NUs), which usually lead to performance degradation in mobile scenarios. In this paper, a novel hybrid MAC protocol, called MA-MAC, was presented for multi-hop mobile Tactical Data Link networks based upon the mobile characteristics of NUs. The basic point of MA-MAC is that the transmit mode of each...
This paper presents a blueprint for proactive context-aware mobility support architecture for heterogeneous access networks called PRONET. In particular, we leverage upon the principles of cognitive networking to support proactive context-awareness for user-centric application adaptation via quality-of-experience (QoE) provisioning. Our proposed architecture is built upon port-based multi-homed mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.