The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work the allocation of Roadside Units (RSUs) in a V2I network is modeled as a Maximum Coverage Problem. The main objective is to maximize the number of distinct vehicles contacting the infrastructure. Two different approaches are presented to solve the problem. The first one is an ILP model that can found optimal solutions or give sharp upper and lower bounds for the problem. The second one...
In this work we propose Delta-r, a new greedy heuristic for solving the allocation of roadside units in order to meet a Δρ1ρ2-Deployment. The Δρ1ρ2-Deployment is a metric for specifying minimal levels of performance from the infrastructure supporting vehicular networks. As far as we are concerned, this is the first QoS-bounded deployment strategy considering both the contact probability, and the contact...
Despite the technological advances of IT Clouds, few efforts have been dedicated to assist the cloud application and services developers during the creation process, that goes from the development to the execution phase with the adaptation of the behavior and the optimized allocation of system resources. The CloudWave EU project, has the objective of contributing to these underdeveloped concepts by...
In this paper, a novel spectrum allocation approach for cognitive radio networks (CRNs) is proposed. Based on a measure of inference performance as well as on a measure of quality-of-service, the association between secondary users (SUs) in the network and frequency bands licensed to primary users (PUs) is investigated. The problem is formulated as a matching game between SUs and PUs. In this game,...
We obtain the minimum bandwidth required to meet an outage constraint in a multi-tier heterogeneous network assuming “maximum (biased) average received signal power” as the tier association metric. To do so, we model user and access point (AP) locations as Poisson point processes, and obtain the moment generating function (MGF) of the required spectrum; this analysis, in turn, is based on the cumulative...
Migration can contribute to efficient resource management in cloud computing environment. Migration is used in many areas such as power reduction, load balancing, and fault tolerance in Cloud Dater Centers (CDCs). However most of the previous works concentrated on the implementation of migration technology itself. Thus, it need to consider metrics which may impact the migration performance and energy...
Cloud computing is the hottest buzzword today having enormous benefits, but there remains a number of critical problems (Security, Privacy, Interoperability, Costing, etc.) preventing their wider adoption. For each job/application, Cloud resource provisioning is a cumbersome task as a number of objectives needs to be satisfied with certain constraints. This work proposes security prioritized resource...
This paper summarizes new theoretical results on the asymptotic sampling rates of expected improvement (EI) methods in fully sequential ranking and selection (R&S). These methods have been widely observed to perform well in practice, and often have asymptotic consistency properties, but rate results are generally difficult to obtain when observations are subject to stochastic noise. We find that,...
We present a new analysis of multi-hop network security in the form of a zero-sum game played between an attacker who tries to disrupt a network by disabling one or more nodes, and the nodes of the network who must allocate limited resources in defense of the network. The payoffs in the zero-sum game can be one of several performance metrics that correspond to node centrality measures. In the case...
Heterogeneous multicore platforms have become an attractive choice to deploy mixed criticality systems demanding diverse computational requirements. One of the major challenges is to efficiently harness the computational power of these multicore platforms while deploying mixed criticality applications. The problem is acerbated with an additional demand of energy efficiency. It is particularly relevant...
Here in this paper we devised a novel meticulous progression based GA technique for QoS adequacy latitude aware routing in Cognitive Wireless Mesh Networks. The past decade research towards spectrum sensing strategies for Cognitive Wireless Mesh Networks is continuing with magnitude speed. However, the majority of the routing solutions devised in past are dealing only with the optimality of the data...
In cloud system, the completion time of the slowest processing task is a significant metric when process the data-intensive application by the Map Reduce/Hadoop architectures. Thus an important problem that virtual machine placement for data node problem (VMPDN) is raised. In this paper, considering the successful application of ACO on combinatorial optimization problems, we firstly adopt Max-Min...
Due to their lower complexity that make them affordable for practical applications, suboptimal MIMO-OFDMA downlink resource allocation (RA) algorithms have attracted significant attention. In this paper, a novel suboptimal RA algorithm is introduced and shown to achieve higher efficiency performance in comparison with other existing techniques. RA algorithms that are robust against CSIT imperfections,...
The randomness of random number generators (RNGs) significantly influences the security of cryptographic systems. Although RNGs are allowed to adopt in practical systems only after strict analysis and security evaluation, the randomness of generated sequences may degrade due to aging effects of electronic devices, change of temperature and humidity, or even malicious attacks. Therefore, before the...
One of the few convergent themes during the first two United Nations Meeting of Experts on autonomous weapons systems (AWS) was the requirement that there be meaningful human control (MHC) of AWS. What exactly constitutes MHC, however, is still ill-defined. While multiple sets of definitions and analyses have been published and discussed, this work seeks to address two key issues with the current...
Performance Measurement Systems (PMS) have long captured the attention of organizational behavior and information systems (IS) research. The PMS in the study was implemented by public police forces, using advanced Business Intelligence (BI) technologies. The study examines the impact of enhancing that PMS, through analysis of the metric results over an 8-year time period that covered a transition...
User satisfaction is a critical design metric of wireless communications systems and networks. In this paper, we consider user satisfaction of wireless communications networks from a human psychological point of view through the prospect theory. Due to the asymmetrical s-shaped value function and the dependence of reference point described by the prospect theory, user satisfaction is degraded significantly...
In this paper, we propose a novel user clustering algorithm for non-orthogonal multiple access (NOMA) considering the channel correlation between users and the channel gain. We also adopt sum-rate maximization approach to find an optimal precoding matrix in the multi-user multiple-input-multiple-output (MU-MIMO) setup after the user clustering. Grouping two users in a single beam to serve users in...
In modern manufacturing systems, the key performance indicators (KPIs) are defined as a set of metrics to reflect operation performance. The KPIs are not independent and may have intrinsic mutual relationships. In this paper, by categorizing such data into basic and comprehensive KPIs and supporting metrics, we introduce a hierarchical structure for identification and analysis of KPIs in manufacturing...
Bandwidth allocation in spectrum-congested wire- less content delivery networks should be performed based on the user's Quality of Experience (QoE). The relationship between QoE and network QoS is context- and user-dependent. We show that modeling the user's QoE introduces additional complexity to the bandwidth allocation problem. While recent research has proposed various ways in which complexity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.