The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Consider the opportunistic network application scenario in which mobile node users socialize with nearby users of common interest, but there exists no pre-established session by which users register or de-register their presence. As nodes are dynamically joining and leaving the network, how a node discovers any newly joined nodes or knows when to release conversations from nodes who have left the...
In cooperative spectrum sensing, clustering of the sensor nodes is vastly employed in order to reduce overall energy expenditure due to reporting while preserving high detection performance. Cluster formation is especially difficult for mobile networks since the clusters immediately become invalid. In the mobile scenario, the cluster forming algorithm should take into account the total energy expenditure,...
In this paper, we propose an efficient dynamic spectrum access protocol for secondary users (SU) communication over an agile single primary user (PU) channel. The proposed access scheme is optimized with respect to different SU back-off times and SU packet length. Via Markov chain models and numerical analysis, we derive the optimal SU packet length for optimal SU performance at a given PU traffic...
Social wireless and mobile networks have received more attentions over the recent years. Previously, we proposed the Social Relation Opportunistic Routing (SROR) algorithm for mobile social networks, and introduced the social relations and profiles among nodes as the key metrics to compute the optimal forwarding node in routing such that the packet delivery probability is maximized. In this paper,...
Functional verification being the paramount in the design cycle of hardware IP; ample time and cost are spent for verifying the functional correctness of each and every hardware IP. The modern verification methodologies emphasize the concept of reusability to reduce the verification turn around time. The reusability aspect of each verification IP depends vastly on its implementation strategies &...
Context In cloud computing, there is a multitude of definitions and metrics for scalability, elasticity, and efficiency. However, stakeholders have little guidance for choosing fitting definitions and metrics for these quality properties, thus leading to potential misunderstandings. For example, cloud consumers and providers cannot negotiate reliable and quantitative service level objectives directly...
Adopting public cloud services implies a loose of control in the management process of the outsourced infrastructure. This raises legal and trust concerns among executives and decision factors regarding confidentiality of data being moved in cloud. We propose a protocol based on a secret sharing scheme in which data is split in optimal chunks, each chunk carrying a minimum informational content relative...
As a promising direction of future Internet, Content-Centric Network (CCN) has attracted world-wide attention. In-network caching is an important feature of CCN network, which has significant impacts on the performance of content transmission. Existing researches on in-network caching either have no regard for the collaboration or need giant additional overhead for global optimization. This paper...
Residential wireless networks have grown rapidly in the past decade. Meanwhile, dense deployments and autonomous managements of home Access Points (APs) greatly increase channel congestion levels and degrade the user experience. To address such problems, this paper proposes an architecture in residential environments called Wi-Fi Union (WU), where home APs can voluntarily join WU and become "member...
Wireless content distribution is an important application of Peer-to-peer (P2P) techniques. With powerful tools like network coding on hand, it is possible to improve the performance of such content distributions. In this paper, we have proposed a cross-layer solution that seamlessly fuses routing information and P2P strategies. Basing peer-selection algorithms on a routing metric, we can select the...
In the aftermath of major disasters such as earth-quakes, locating individuals is crucial for passing on vitalinformation, for example warnings and safety announcements. However, large scale disasters cause extensive damage to thenetwork infrastructures and a generalized loss of communicationsin the chaos that ensues. This position paper presents a prelim-inary study for a geolocation service that...
Wireless Radiation Sensor Networks (WRSNs) are promising for military and security applications as they can provide remote detection of sources of radiation with simple, robust radiation detection technologies. This paper shows the results of a combined simulation of wireless networking, and radiation detection with directional gamma-ray detectors. The specific WRSN scenario under study involves a...
The report presents a definition of weighted clustering problem and gives analysis of several protocols that solve this problem using different approaches.
We consider the communication cost of computing functions when inputs are distributed among the vertices of an undirected graph. The communication is assumed to be point-to-point: a processor sends messages only to its neighbors. The processors in the graph act according to a pre-determined protocol, which can be randomized and may err with some small probability. The communication cost of the protocol...
The paper discusses the deployment of wireless sensor networks for intra-car monitoring and control in various automotive application scenarios. Major challenges consist of enabling robust radio communication protocols for challenging environments like the car body and offering high confidence guarantees on timely data collection and quality. Simulation results are introduced and discussed for radio...
This paper addresses the problem of detection of “Slow” Denial of Service attacks. The problem is particularly challenging in virtue of the reduced amount of bandwidth generated by the attacks. A novel detection method is presented, which analyzes specific spectral features of traffic over small time horizons. No packet inspection is required. Extrapolated data refer to real traffic traces, elaborated...
Cellular providers are rapidly deploying multiple technologies like cell biasing, carrier aggregation, co-ordinated interference control/scheduling to improve capacity and coverage. In this paper, we explore a complementary transport layer approach based on multipath TCP that can concurrently use multiple interfaces to boost throughput of users with poor coverage and improve fairness. Multipath TCP...
The emerging Network Function Virtualization paradigm (NFV) is a disruptive change that creates new business opportunities for vendors and carriers. By exploiting virtualization technologies, it allows the dynamic creation of logically isolated infrastructures over abstracted physical networks. To be able to offer Virtualized Services efficiently, service providers need a new class of Management systems...
Parkinson's disease (PD) is the second most common neurodegenerative disorder. The debilitating nature of this medical condition can negatively impact use of the upper limb for tasks such as handwriting, which affects daily lives of many PD patients. A two-week self-administrated handwriting therapeutic exercise protocol, Amplified Air Writing (AAW), has been conducted by six PD subjects who have...
Over the last years websites have evolved rapidly incorporating new content types and becoming more and more dynamic. Users today are able to access a wide variety of content and services through their web browsers. As a consequence, web traffic has become increasingly complex and, from a network perspective it can be difficult to ascertain which websites are being visited by a user, let alone which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.