The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As systems continue to evolve they rely less on human decision-making and more on computational intelligence. This trend in conjunction to the available technologies for providing advanced sensing, measurement, process control, and communication leads us towards the new field of Cyber-Physical System (CPS). Although these systems exhibit remarkable characteristics, the increased complexity imposed...
As the complex electromagnetic environment becomes the main characteristic of modern war, military training under complicated electromagnetic environment is taken seriously and the complex electromagnetic environment has become one of research hot spots. On the degree of complex electromagnetic environment for scientific classification, correct measures, so as to form a complete set of reflect the...
Recent attempts have been done to measure similarity of process models based on graph matching. This problem is known to be difficult and its computational complexity is exponential. Thus, heuristics should be proposed to obtain approximations. Spectral graph matching methods, in particular eigen value-based projections, are know to be fast but they lost some quality in the obtained matchmaking. In...
The selection of resources, particularly VMs, in current public IaaS clouds is usually done in a blind fashion, as cloud users do not have much information about resource consumption by co-tenant third-party tasks. In particular, communication patterns can play a significant part in cloud application performance and responsiveness, specially in the case of novel latency-sensitive applications, increasingly...
This paper studies the resource allocation for multi-D2D (Device-to-Device) communications in heterogeneous networks with quality-of-service (QoS) guarantees for both cellular and D2D links. To improve the achievable rate of D2D communication and the spectrum utilization, one D2D pair is allowed to reuse multiple cellular spectrum resources. However, this scheme introduces more interference so that...
Energy saving is one of the most investigated problems in wireless networks. In this paper, we introduce two homology based algorithms: a simulated annealing one and a robust one. These algorithms optimize the energy consumption at network level while maintaining the maximal coverage. By using simplicial homology, the complex geometrical calculation of the coverage is reduced to simple matrix computation...
Crowd sensing is an effective zero-cost method to map physical spatial fields by exploiting sensors already embedded in smartphones. The potentially huge amount of generated data and random measurement positions represent serious challenges to be addressed. In this paper we propose a combined Gaussian process (GP)-State space method for crowd mapping whose complexity and memory requirements for field...
Inter-Cell Interference Coordination (ICIC) has been identified for LTE as the main instrument for interference control. With ICIC, quality requirements can be guaranteed while avoiding the complexity of coordinated baseband processing approaches. However, most ICIC schemes proposed so far rely on centralized multi-cell scheduling algorithms that involve very heavy signaling overhead and, as a result,...
With CPU clock speeds stagnating over the last few years, ongoing advances in computing power and capabilities are being supported through increasing multi- and many-core parallelism. The resulting cost of locally maintaining large-scale computing infrastructure, combined with the need to perform increasingly large simulations, is leading to the wider use of alternative models of accessing infrastructure,...
Code obfuscation techniques are widely used in industry to increase protection of source code and intellectual property. The idea is that even if attackers gain hold of source code, it will be hard for them to understand what it does and how. Thus obfuscation techniques are specifically targeted at human comprehension of code. We suggest that the ideas and experience embedded in obfuscations can be...
Byte caching (also known as redundancy elimination) is a commonly used technique in practice to compress data streams in data networks. The congestion of a bottleneck link can be significantly reduced when byte caching is implemented in both ends of the link. We propose four techniques to improve the original byte caching method. Two of these techniques offer better fingerprint sampling for caching...
Coded multicasting has been shown to be a promising approach to significantly improve the caching performance of content delivery networks with multiple caches downstream of a common multicast link. However, achievable schemes proposed to date have been shown to achieve the proved order-optimal performance only in the asymptotic regime in which the number of packets per requested item goes to infinity...
We propose Fides, a computation offloading mechanism for mobile devices based on trust between them. Fides provides functionalities to the application developers in terms of (i) application splitting and (ii) metric proposal, according to which the offloading decisions will be made. A collective intelligence mechanism is learning the parameters of the ambient environment and selects the proper nearby...
In this paper, we propose a novel quantization parameter offset optimization scheme for screen content videos based on the high correlation among adjacent frames. Firstly, we define a measurement of inter-frame correlation for successive frames. Then, according to the defined correlation measurement, quantization parameter offset for different frames is appropriately adjusted. Experimental results...
The consensus problem is an important topic in modern networked systems. The goal of the consensus protocol is to make each non-faulty processor agree on a common value without influence from faulty processors. However, if the initialvalue proposed by the processor is shared by only a small number of other processors, this initial-value will not become the consensus value. In order to increase the...
Counting Bloom filters (CBF) and their variants are data structures that support membership or multiplicity queries with a low probabilistic error. Yet, they incur a significant memory space overhead when compared to lower bounds as well as to (plain) Bloom filters, which can only represent set membership without removals. This work presents TinyTable, an efficient hash table based construction that...
During the summer of 2013, a group of high school Juniors from Newburgh Free Academy joined the program NetSci High (2013–2014) and had the opportunity to spend ten days at Boston University to learn more about network science. While there, the students learned about what networks are, how they are used, and why they are important. Consequently, they planned to combine a shared interest of literature...
The measurement of the operators’ workload is an important aspect of usage-oriented design of professional systems. In domains such as avionics, air traffic management or mission systems, being able to quantify the operators’ workload under stress, and in potentially demanding physical and mental conditions, is mandatory to anticipate overload and prevent human errors. Current approaches to workload...
Advanced learning technologies integrate questions as a very relevant function in building e-Testing systems and especially in intelligent tutoring systems. Therefore, a huge challenge is the generation of a necessary and relevant assessment content. The existing efforts to realize open source learning materials and establishment of massive open online courses introduce another challenge for realization...
This paper studies the problem of joint allocation of transmission power and bandwidth in cooperative networks. The goal is to minimize transmission energy consumption in a network with M coordinated transmission points (CTPs) under respective data rate constraints of N mobile terminals (MTs). We propose a joint power and bandwidth allocation scheme for downlink data transmission based on mathematical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.