The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several technical challenges should be taken into consideration when setting up hands-on laboratories, workshops and projects while the educational service providers need powerful, effective, stable and easy-to-use systems. In order to meet those requirements, such systems are designed and deployed as affordable services that request stability, reliability, availability, autonomy and resilience. This...
In this paper, we present hierarchical relationbased latent Dirichlet allocation (hrLDA), a data-driven hierarchical topic model for extracting terminological ontologies from a large number of heterogeneous documents. In contrast to traditional topic models, hrLDA relies on noun phrases instead of unigrams, considers syntax and document structures, and enriches topic hierarchies with topic relations...
The growing gap between processor and memory speeds results in complex memory hierarchies as processors evolve to mitigate such differences by taking advantage of locality of reference. In this direction, the BSC performance analysis tools have been recently extended to provide insight relative the application memory accesses depicting their temporal and spatial characteristics, correlating with the...
This paper explores the potential of utilizing approximate system load information to enhance work stealing for dynamic load balancing in hierarchical multicore systems. Maintaining information about the load of a system has not been extensively researched since it is assumed to introduce performance overheads. We propose SWAS, a lightweight approximate scheme for retrieving and using such information,...
To satisfy diverse use cases and business models in fifth generation (5G) wireless communication, network slicing in fog radio access networks (F-RANs) is proposed, which provides a cost efficient networking in a convenient way. However, the resource management for network slices is challenging, especially when the edge caching is utilized to alleviate the fronthaul burden and reduce the delay. In...
Exploiting full-duplex (FD) technology on base stations (BSs) is a promising solution to enhancing the system performance. Motivated by this, we revisit a full-duplex base station (FD-BS) aided OFDMA system, which consists of one BS, several uplink/downlink users and multiple subcarriers. A joint 3-dimensional (3D) mapping scheme among subcarriers, down-link users (DUEs), uplink users (UUEs) is considered...
Terahertz (THz) band communication has abundant spectral resources to accommodate multiple broadband carriers. However, the strong path loss attenuation and the limited transmission power affect the maximum number of carriers that can be activated. A simple way to address this limitation consists in transmitting the same message from multiple transmission points, using Joint-Transmission (JT) Coordinated...
A social health care system, and palliative care in particular, can be viewed as a social network of interacting patients and care providers. Each patient in the network has a set of capabilities to perform his or her intended daily tasks. However, some patients may not have the required capabilities to carry out their desired tasks. Consequently, different groups of care providers offer the patients...
Well-structured collaborative learning groups scripted based on Collaborative Learning Flow Patterns (CLFPs) often result in successful collaborative learning outcomes. Formulation of such learner groups based on instructor defined criteria promises potentially effective performance of participating students. However, forming student groups manually based on multiple criteria often fails due to its...
Recognizing the central role of Lagrange multipliers in network resource allocation, a novel learn-and-adapt stochastic dual gradient (LA-SDG) method is developed in this paper to learn the empirical optimal Lagrange multiplier from historical data, and adapt to the upcoming resource allocation strategy. Remarkably, it only requires one more sample (gradient) evaluation than the celebrated stochastic...
Coded caching has gained a lot of interest recently. It jointly optimizes placement and delivery phases to create network-coded multicast opportunities to attain performance that surpasses conventional uncoded caching schemes. To the best of our knowledge, all coded caching systems studied in the literature are based on content popularity distributions as seen from the server's point of view. In this...
Most of the current research work on web service selection has only considered the selection problem from the perspective of one party – service users. The selection model usually tries to find services which can optimize the user requirements. However, a service marketplace serves multiple parties, including both service users and providers. Thus, it is important to consider multiple parties when...
We formulate a mathematical programming problem for allocating capital budget between the organizational and physical capitals of the firm and solve it to obtain an analytically tractable and easy to implement decision rule for the optimal allocation of the capital budget. The model we develop depicts interconnections of these capitals and their constituent variables in the context of the firm's valuation...
This paper studies how the efficiency of an online platform is impacted by the degree to which access of platform participants is open or controlled. The study is motivated by an emerging trend within platforms to impose increasingly finegrained control over the options available to platform participants. While early online platforms allowed open access, e.g., Ebay allows any seller to interact with...
As Internet applications have become more diverse in recent years, users having heavy demand for online video services are more willing to pay higher prices for better services than light users that mainly use e-mails and instant messages. This encourages the Internet Service Providers (ISPs) to explore service differentiations so as to optimize their profits and allocation of network resources. Much...
This paper proposes an algorithm for optimal decentralized traffic engineering in communication networks. We aim at distributing the traffic among the available routes such that the network utility is maximized. In some practical applications, modeling network utility using non-concave functions is of particular interest, e.g., video streaming. Therefore, we tackle the problem of optimizing a generalized...
Crowdsourcing applications are vulnerable to malicious behaviors, posing serious threats to their adoption and large deployment. Based on the notion that the requestor (i.e., the crowdsourcer) can block malicious behaviors via leveraging the market power through task allocation and pricing, we propose two novel frameworks based on the mechanism design game theory (i.e., the reverse game theory). To...
Network slicing to enable resource sharing among multiple tenants-network operators and/or services-is considered a key functionality for next generation mobile networks. This paper provides an analysis of a well-known model for resource sharing, the ‘share-constrained proportional allocation’ mechanism, to realize network slicing. This mechanism enables tenants to reap the performance benefits of...
Network Function Virtualization (NFV) has the potential to significantly reduce the capital and operating expenses, shorten product release cycle, and improve service agility. In this paper, we focus on minimizing the total number of Virtual Network Function (VNF) instances to provide a specific service (possibly at different locations) to all the flows in a network. Certain network security and analytics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.