The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network slicing to enable resource sharing among multiple tenants-network operators and/or services-is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the ‘share-constrained proportional allocation’ mechanism, to realize network slicing. This mechanism enables tenants to reap the performance benefits of...
Mobile traffic data collected by network operators is a rich source of information about human habits, and its analysis provides insights relevant to many fields, including urbanism, transportation, sociology and networking. In this paper, we present an original approach to infer both spatial and temporal structures hidden in the mobile demand, via a first-time tailoring of Exploratory Factor Analysis...
In this research, we conduct a comprehensive measurement study on the predictability of human mobility with respect to demographic differences. We leverage an extensive WLAN dataset collected on a large university campus. Specifically, our dataset includes over 41 million WLAN entries gathered from over 5,000 students (with demographic information) during a four-month period in 2015. We observed surprising...
Recent studies have suggested that the stability of peer-to-peer networks may rely on persistent peers, who dwell on the network after they obtain the entire file. In the absence of such peers, one piece becomes extremely rare in the network, which leads to instability. Technological developments, however, are poised to reduce the incidence of persistent peers, giving rise to a need for a protocol...
In today's always-connected world, we receive a large number of notifications on our mobile devices. These notifications cause interruptions, stress, and even impact users' lifestyle. To understand how users respond to notifications, we develop an application that monitors various features (e.g., importance) of the notifications, users' actions, and the level of users' engagement with the notifications...
We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the absence of the more precise GPS information. We focus on the “leisure time” behavior,...
Understanding the mobile user flow flux patterns is important for numerous applications relevant to crowd movement, from information sharing, networking, to security and public health. Particularly in instances of smart buildings and hospitals, among others, the flow between indoor locations, and mobility modeling within buildings is of a prime significance. Much of the mobility modeling studies have...
In delay tolerant mobile sensor networks, the application may sometimes require informing all the sensor nodes in the network about the presence of a message while delivering it to a specific destination node. But, due to constraints on buffer space, it is not efficient to keep these message copies in the buffer of all nodes. In this paper, we propose a probabilistic approach for information dissemination...
Challenged Networks (CNs) are characterized by frequent varying network conditions and intermittent connectivity. In general, CNs emerge in different scenarios including the disaster and emergency situations when the traditional cellular infrastructure is dysfunctional or unavailable as well as in the undeserved areas such as rural and developing regions. This paper aims to evaluate the performance...
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of...
Increasingly, trust has played a crucial role in the security of an IoT system from its inception to the end of its lifecycle. A device has to earn some level of trust even before it is authenticated for admission to the system. Furthermore, once the device is admitted to the system, it may behave maliciously over time; hence its behavior must be evaluated constantly in the form of trust to ensure...
In opportunistic mobile networks (OppNets), nodes should be in listening state to discover the neighbors for opportunistic message forwarding. While in OppNets, contacts between nodes are sparse, most of nodes' energy is consumed in idle listening state, which highlights the need for energy saving in contact probing. Duty cycle operation can be applied to address this problem. However, it may cause...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
In response to the mobile data tsunami, the research community has studied WiFi offloading based efforts to provide an immediate solution to mitigate the load on both the cellular space and mobile core network. However, this has caused mobile network operators (MNO) to lose control and visibility on the user data since the traffic is usually directed towards the Internet bypassing the operator's core...
Network virtualization and SDN-based routing allow carriers to flexibly configure their networks in response to demand and unexpected network disruptions. However, cellular networks, by nature, pose some unique challenges because of user mobility and control/data plane partitioning, which calls for new architectures and provisioning paradigms. In this paper, we address the latter part by devising...
HTTP adaptive streaming (HAS) is the dominating type of video traffic in fixed and mobile networks. Although more and more mobile users stream videos over their cellular data connections, buffering is still a common problem due to fluctuating radio signal strength. We will demonstrate a new generation of context-aware HAS algorithms, which adapt video bit-rate based on location and radio information...
In mobile networks, users may lose coverage when entering a building due to the high signal attenuation at windows and walls. Under such conditions, services with minimum bit-rate requirements, such as video streaming, often show poor Quality-of-Experience (QoE). We will approach this problem in two steps. First, we present a Bayesian detector that combines measurements from two Smartphone sensors...
The vehicle-to-vehicle (V2V) data transmissions in Vehicular Ad-hoc Networks (VANETs) have been applied in many areas including the Internet of Vehicles, mobile data offloading, and mobile crowdsensing. The V2V-based data delivery that is opposite to the direction of a vehicle is called a backward delivery against the traffic flow, and it is blocked by an existing problem: a traffic hole. Under the...
In this paper, we study the energy-efficient resource allocation in software-defined mobile networks with mobile edge computing and caching. With the introduction of caching and computing functions in mobile networks, content sources need to be selected according to the distribution of contents in caches, the capability of computational resources and the status of networks. Moreover, the network needs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.