Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Although the base station processing and the majority of the protocols of the wireless systems are standardized by 3GPP, the receiver architecture and implementation remain vendor-dependent. The receiver design should fulfill computational efficiency requirements, and be evaluated in practical simulators or emulators that are compliant with real-world wireless standards. In this paper, we provide...
The use of direct device-to-device (D2D) communications is expected to drastically increase the spatial frequency reuse significantly improving the capacity of forthcoming fifth generation (5G) cellular systems. The number of D2D pairs operating within the same channel that can be supported in a certain area of interest is limited by the interference imposed by them on each other. In an inherently...
In cellular networks, end-users receive wireless network services only by a base station (BS). Device-to-device (D2D) communication is a new paradigm in cellular network that enables end-users to communicate with each other in an ad hoc manner using single or multi-hops. The communication can be realized both with and without the support of the cellular network infrastructure. A major challenge associated...
Recently multi-agent patrolling became more and more crucial in security, monitoring, etc. applications. It can be used, for example, to monitor points of interest in space, such as measurement points or entrances to a guarded area. A good patrolling strategy would ensure frequent visits to all points of interest defined by a user. A variety of centralized and distributed approaches exist already...
Many online application services are now provided by cloud-deployed VM clusters. Although economical, VMs in the cloud are prone to interference due to contention for physical resources among colocated users. Worse, this interference is dynamic and unpredictable. Current provider-centric solutions are application-oblivious and are thus not always aware of the user's SLO requirements or application...
Caching at the edge is a promising technique to cope with the increasing data demand in wireless networks. This paper analyzes the performance of cellular networks consisting of a tier macro-cell wireless backhaul nodes overlaid with a tier of cache-aided small cells. We consider both static and dynamic association policies for content delivery to the user terminals and analyze their performance....
Modifying the logic at register transfer level can help to protect a circuit against counterfeiting or illegal copying. By adding extra gates, the outputs can be controllably corrupted. Then the circuit operates correctly only if the right value is applied to the extra gates. The main challenge is to select the best position for these gates, to alter the circuit's behaviour as much as possible. However,...
Machine-type communications (MTC), considered as one of potential technologies in 5G, has attracted more and more attention in recent years. Massive MTC connection density but with small data rate leads to preamble deficiency and network congestion in the network. In order to solve this problem, we jointly utilize the back off strategy and the hierarchical access control method. We formulate a Quality...
Energy efficiency (EE) is becoming one of the important criteria in wireless transmission design. This paper discusses the recently proposed energy-efficient transmit beamforming designs for multicell multiuser multiple-input single-output (MISO) systems, including maximizing overall network EE, sum weighted EE and fairness EE. Generally, the EE optimization problems are NP-hard nonconvex programs...
Anomalies of multitier services running in cloud platform can be caused by components of the same tenant or performance interference from other tenants. If the performance of a multitier service degrades, we need to find out the root causes precisely to recover the service as soon as possible. In this paper, we argue that cloud providers are in a better position than tenants to solve this problem,...
In a virtualized heterogeneous cluster, for a distributed parallel application which runs in multiple virtual machines (VMs) concurrently, there are a huge number of possible ways to place its VMs. This paper investigates a performance estimation technique for distributed parallel applications in virtualized heterogeneous clusters. We first analyze the effects of different VM configurations on the...
A relay-aided cooperative underlay cognitive radio system with an interference constraint at the primary receiver (PR) is considered. When the primary user (PU) is active, those secondary users (SUs) whose interference at the PR is above a threshold will amplify-and-forward PU's signal to enhance the PU’s performance, and those SUs below this threshold will proceed with their own transmission in an...
Scheduling is a decision-making process that deals with the assignment of resources to tasks over given periods, aiming to optimize one or more objectives. Responsible for efficient distribution of the CPU time among the processes, scheduler has become an essential part of computer systems. While applications run on neighboring cores of a many-core system, they compete with each other for the shared...
Replicating redundant requests has been shown to be an effective mechanism to defend application performance from high capacity variability — the common pitfall in the cloud. While the prior art centers on single-tier systems, it still remains an open question how to design replication strategies for distributed multi-tier systems, where interference from neighboring workloads is entangled with complex...
We study the optimum designs of a wireless ad hoc network that employs a random multiple access protocol and operates in an interference-limited environment. The nodes are assumed to form a homogeneous Poisson point process (PPP). With the random multiple access protocol, each node transmits with a certain probability, the value of which is critical to system performance. A higher transmission probability...
In this paper, we investigate the energy efficiency (EE) and spectral efficiency (SE) tradeoff in multi-cell heterogeneous networks (HetNets). Our objective is to maximize both EE and SE of the network while satisfying the rate requirement of users. We use multi-objective optimization techniques to define the objective function. We propose a three-stage algorithm in this paper. First, we select the...
Wireless sensor networks (WSNs) are dense networks affected by severe interference among many devices. They operate in the unlicensed 2.4 GHz band that is shared by different technologies, such as Bluetooth and WiFi, which add interference at higher transmission power. For this reason, interference is an important factor to avoid for reliable communications. Due to the unpredictable nature of the...
Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism in place to allocate connections to specific...
Superposed multicarrier transmission is a known method to improve frequency utilization efficiency when several wireless systems share the same spectrum. Obviously, an enhanced spectral efficiency comes at the expense of interference. To suppress the effect of interference, forward error correction (FEC) metric masking can be applied. In FEC, the corresponding log-likelihood (LLR) of the superposed...
This work investigates the problem of channel sensing order in distributed cognitive networks with multiuser, in which the set of active secondary users is randomly changing in each time slot. We model this problem into a non-cooperative game and define a generalized interference metric. The optimization objective is to minimize the generalized interference metric. To cope with this problem, we propose...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.