Latest in

total 11450took 0.14s
Multi-hop Federated Private Data Augmentation with Sample CompressionJul 15 2019On-device machine learning (ML) has brought about the accessibility to a tremendous amount of data from the users while keeping their local data private instead of storing it in a central entity. However, for privacy guarantee, it is inevitable at each ... More
Towards QoS-Aware RecommendationsJul 15 2019This paper suggests the concept of QoS-aware recommendations for multimedia services/applications. We propose that recommendation systems (RSs) should take into account the expected QoS with which a content can be delivered to a user, to increase the ... More
Compound TCP with Random Early Detection (RED): stability, bifurcation and performance analysesJul 15 2019The problem of increased queueing delays in the Internet motivates the study of currently implemented transport protocols and active queue management (AQM) policies. We study Compound TCP (default protocol in Windows) with Random Early Detection (RED). ... More
Guaranteeing E2E QoS via Joint Radio and NFV Resource Allocation for 5G and BeyondJul 14 2019In this paper, we propose an end to end joint radio and virtual network function (VNF) resource allocation for next-generation networks providing different types of services with different requirements in term of latency and data rate. We consider both ... More
When Entanglement meets Classical Communications: Quantum Teleportation for the Quantum Internet (Invited Paper)Jul 14 2019Quantum Teleportation is the key communication functionality of the Quantum Internet, allowing the ``transmission'' of qubits without either the physical transfer of the particle storing the qubit or the violation of the quantum mechanical principles. ... More
Hybrid Offline-Online Design for UAV-Enabled Data Harvesting in Probabilistic LoS ChannelJul 14 2019This paper considers an unmanned aerial vehicle (UAV)-enabled wireless sensor network (WSN) in urban areas, where a UAV is deployed to collect data from distributed sensor nodes (SNs) within a given duration. To characterize the occasional building blockage ... More
A Real-Time mmWave Communication Testbed with Phase Noise CancellationJul 13 2019As the spectrum under 6 GHz is being depleted, pushing wireless communications onto millimeter wave (mmWave) frequencies is a trend that promises multi-Gbps data rate. mmWave is therefore considered as a key technology for 5G wireless systems and has ... More
Secrecy Analysis and Learning-based Optimization of Cooperative NOMA SWIPT SystemsJul 12 2019Non-orthogonal multiple access (NOMA) is considered to be one of the best candidates for future networks due to its ability to serve multiple users using the same resource block. Although early studies have focused on transmission reliability and energy ... More
The Gain of Energy Accumulation in Multi-hop Wireless Network BroadcastJul 11 2019Broadcast is a fundamental network operation, widely used in wireless networks to disseminate messages. The energy-efficiency of broadcast is important particularly when devices in the network are energy constrained. To improve the efficiency of broadcast, ... More
Coverage Probability Analysis Under Clustered Ambient Backscatter NodesJul 11 2019In this paper, we consider a new large-scale communication scheme where randomly distributed AmBC nodes are involved as secondary users to primary transmitter (PT) and primary receiver (PR) pairs. The secondary communication between a backscatter transmitter ... More
Timely Cloud Computing: Preemption and WaitingJul 11 2019The notion of timely status updating is investigated in the context of cloud computing. Measurements of a time-varying process of interest are acquired by a sensor node, and uploaded to a cloud server to undergo some required computations. These computations ... More
A Study of Network Congestion in Two Supercomputing High-Speed InterconnectsJul 11 2019Network congestion in high-speed interconnects is a major source of application run time performance variation. Recent years have witnessed a surge of interest from both academia and industry in the development of novel approaches for congestion control ... More
Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More
Information-Centric Grant-Free Access for IoT Fog Networks: Edge vs Cloud Detection and LearningJul 11 2019Jul 12 2019A multi-cell Fog-Radio Access Network (F-RAN) architecture is considered in which Internet of Things (IoT) devices periodically make noisy observations of a Quantity of Interest (QoI) and transmit using grant-free access in the uplink. The devices in ... More
REACT: REActive resilience for critical infrastructures using graph-Coloring TechniquesJul 11 2019Nowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact. In this paper we propose REACT, a distributed framework for reactive ... More
Block Prefix Mechanism for Flow Mobility in PMIPv6 Based NetworksJul 11 2019The next generation Internet is deemed to be heterogeneous in nature and mobile devices connected to the Internet are expected to be equipped with different wireless network interfaces. As seamless mobility is important in such networks, handover between ... More
AWG-based Nonblocking Shuffle-Exchange NetworksJul 10 2019Optical shuffle-exchange networks (SENs) have wide application in different kinds of interconnection networks. This paper proposes an approach to construct modular optical SENs, using a set of arrayed waveguide gratings (AWGs) and tunable wavelength converters ... More
Optimally Self-Healing IoT ChoreographiesJul 10 2019In the industrial Internet of Things domain, applications are moving from the Cloud into the edge, closer to the devices producing and consuming data. This means applications move from the scalable and homogeneous cloud environment into a constrained ... More
Increasing broadband reach withHybrid Access NetworksJul 10 2019End-users and governments force network operators to deploy faster Internet access services everywhere. Access technologies such as FTTx, VDSL2, DOCSIS3.0 can provide such services in cities. However, it is not cost-effective for network operators to ... More
A Framework for Multiaccess Support for Unreliable Internet Traffic using Multipath DCCPJul 10 2019Mobile nodes are typically equipped with multiple radios and can connect to multiple radio access networks (e.g. WiFi, LTE and 5G). Consequently, it is important to design mechanisms that efficiently manage multiple network interfaces for aggregating ... More
Speed Scaling with Tandem ServersJul 10 2019Speed scaling for a tandem server setting is considered, where there is a series of servers, and each job has to be processed by each of the servers in sequence. Servers have a variable speed, their power consumption being a convex increasing function ... More
New Competitiveness Bounds for the Shared Memory SwitchJul 09 2019We consider one of the simplest and best known buffer management architectures: the shared memory switch with multiple output queues and uniform packets. It was one of the first models studied by competitive analysis, with the Longest Queue Drop (LQD) ... More
On the 3-D Placement of Airborne Base Stations Using Tethered UAVsJul 09 2019One of the main challenges slowing the deployment of airborne base stations (BSs) using unmanned aerial vehicles (UAVs) is the limited on-board energy and flight time. One potential solution to such problem, is to provide the UAV with power supply through ... More
ICLab: A Global, Longitudinal Internet Censorship Measurement PlatformJul 09 2019Jul 10 2019Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth ... More
ICLab: A Global, Longitudinal Internet Censorship Measurement PlatformJul 09 2019Researchers have studied Internet censorship for nearly as long as attempts to censor contents have taken place. Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail for breadth ... More
Spatial Reuse in IEEE 802.11ax WLANsJul 09 2019Jul 10 2019Dealing with massively crowded scenarios is one of the most ambitious goals of next-generation wireless networks. With this goal in mind, the IEEE 802.11ax amendment includes, among other techniques, the Spatial Reuse (SR) operation. This operation encompasses ... More
Spatial Reuse in IEEE 802.11ax WLANsJul 09 2019Dealing with massively crowded scenarios is one of the most ambitious goals of next-generation wireless networks. With this goal in mind, the IEEE 802.11ax amendment includes, among other techniques, the Spatial Reuse (SR) operation. This operation encompasses ... More
calibDB: enabling web based computer vision through on-the-fly camera calibrationJul 09 2019For many computer vision applications, the availability of camera calibration data is crucial as overall quality heavily depends on it. While calibration data is available on some devices through Augmented Reality (AR) frameworks like ARCore and ARKit, ... More
Analysing Censorship Circumvention with VPNs via DNS Cache SnoopingJul 09 2019Anecdotal evidence suggests an increasing number of people are turning to VPN services for the properties of privacy, anonymity and free communication over the internet. Despite this, there is little research into what these services are actually being ... More
Control of Status Updates for Energy Harvesting Devices that Monitor Processes with AlarmsJul 08 2019In this work, we derive optimal transmission policies in an energy harvesting status update system. The system monitors a stochastic process which can be either in a normal or in an alarm state of operation. We capture the freshness of status updates ... More
Towards the Internet of Robotic Things: Analysis, Architecture, Components and ChallengesJul 08 2019Internet of Things (IoT) and robotics cannot be considered two separate domains these days. Internet of Robotics Things (IoRT) is a concept that has been recently introduced to describe the integration of robotics technologies in IoT scenarios. As a consequence, ... More
P4-IPsec: Implementation of IPsec Gateways in P4 with SDN Control for Host-to-Site ScenariosJul 08 2019In this paper we propose P4-IPsec which follows the software-defined networking (SDN) paradigm. It comprises a P4-based implementation of an IPsec gateway, a client agent, and a controller-based, IKE-less signalling between them. P4-IPsec features the ... More
xRAC: Execution and Access Control for Restricted Application Containers on Managed HostsJul 08 2019We propose xRAC to permit users to run special applications on managed hosts and to grant them access to protected network resources. We use restricted application containers (RACs) for that purpose. A RAC is a virtualization container with only a selected ... More
TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS BandJul 06 2019As part of its ongoing efforts to meet the increased spectrum demand, the Federal Communications Commission (FCC) has recently opened up 150 MHz in the 3.5 GHz band for shared wireless broadband use. Access and operations in this band, aka Citizens Broadband ... More
Node-Constrained Traffic Engineering: Theory and ApplicationsJul 06 2019Traffic engineering (TE) is a fundamental task in networking. Conventionally, traffic can take any path connecting the source and destination. Emerging technologies such as segment routing, however, use logical paths going through a predetermined set ... More
On the Importance of demand Consolidation in Mobility on DemandJul 05 2019Mobility on Demand (MoD) services, like Uber and Lyft, are revolutionizing the way people move in cities around the world and are often considered a convenient alternative to public transit, since they offer higher Quality of Service (QoS - less waiting ... More
Adaptive Predictive Power Management for Mobile LTE DevicesJul 05 2019Reducing the energy consumption of mobile phones is a crucial design goal for cellular modem solutions for LTE and 5G standards. In addition to improving the power efficiency of components through structural and technological advances, optimizing the ... More
Distributed User Clustering and Resource Allocation for Imperfect NOMA in Heterogeneous NetworksJul 05 2019In this paper, we propose a distributed cluster formation (CF) and resource allocation (RA) framework for non-ideal non-orthogonal multiple access (NOMA) schemes in heterogeneous networks. The imperfection of the underlying NOMA scheme is due to the receiver ... More
Networkmetrics unraveled: MBDA in ActionJul 05 2019We propose networkmetrics, a new data-driven approach for monitoring, troubleshooting and understanding communication networks using multivariate analysis. Networkmetric models are powerful machine-learning tools to interpret and interact with data collected ... More
Security modeling and efficient computation offloading for service workflow in mobile edge computingJul 04 2019It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm, edge computing (MEC) can provide abundant computing resources to execute all ... More
A Probabilistic Approach to Model SIC based RACH mechanism for Massive Machine Type Communications in Cellular NetworksJul 04 2019In a cellular Internet of Things, burst transmissions from millions of machine type communications (MTC) devices can result in channel congestion. The main bottleneck in such scenario is inefficient random access channel (RACH) mechanism that is used ... More
Semantic-Effectiveness Filtering and Control for Post-5G Wireless ConnectivityJul 04 2019The traditional role of a communication engineer is to address the technical problem of transporting bits reliably over a noisy channel. With the emergence of 5G, and the availability of a variety of competing and coexisting wireless systems, wireless ... More
Application of Flexible Numerology to Blockage Mitigation in 5G-mmWave NetworksJul 04 2019The 5G New Radio (NR) standard for wireless communications supports the millimetre-wave (mmWave) spectrum to yield unprecedented improvement of the access network capacity. However, intermittent blockages in the mmWave signal may degrade the system performance ... More
DeePCCI: Deep Learning-based Passive Congestion Control IdentificationJul 04 2019Transport protocols use congestion control to avoid overloading a network. Nowadays, different congestion control variants exist that influence performance. Studying their use is thus relevant, but it is hard to identify which variant is used. While passive ... More
Wireless Caching Helper System with Heterogeneous Traffic and Random AvailabilityJul 04 2019Multimedia content streaming from Internet-based sources emerges as one of the most high demanded services by wireless users. In order to alleviate excessive traffic due to multimedia content transmission, many architectures (e.g., small cells, femtocells, ... More
Automating the deployment of 5G Network Slices with ONAPJul 04 2019Open Network Automation Platform (ONAP) is a carrier grade platform for automatically deploying and managing Virtualized Network Functions. In this paper, we address the deployment of network slices in order to come up with a model that is compatible ... More
Wireless Network Slicing: Generalized Kelly Mechanism Based Resource AllocationJul 04 2019Wireless network slicing (i.e., network virtualization) is one of the potential technologies for addressing the issue of rapidly growing demand in mobile data services related to 5G cellular networks. It logically decouples the current cellular networks ... More
Wireless Network Slicing: Generalized Kelly Mechanism Based Resource AllocationJul 04 2019Jul 05 2019Wireless network slicing (i.e., network virtualization) is one of the potential technologies for addressing the issue of rapidly growing demand in mobile data services related to 5G cellular networks. It logically decouples the current cellular networks ... More
TinySDR: Low-Power SDR Platform for Over-the-Air Programmable IoT TestbedsJul 03 2019Wireless protocol design for IoT networks is an active area of research which has seen significant interest and developments in recent years. The research community is however handicapped by the lack of a flexible, easily deployable platform for prototyping ... More
Location Privacy in Cognitive Radios with Multi-Server Private Information RetrievalJul 03 2019Spectrum database-based cognitive radio networks (CRNs) have become the de facto approach for enabling unlicensed secondary users (SUs) to identify spectrum vacancies in channels owned by licensed primary users (PUs). Despite its merits, the use of spectrum ... More
Toward Real-Time Wireless Control of Mobile Platforms for Future Industrial SystemsJul 03 2019The use of mobile platforms (MPs) is particularly attractive for various industrial applications. This demonstration highlights the importance of remote control of MPs and shows its viability over a high-performance wireless solution designed for closed-loop ... More
Koalja: from Data Plumbing to Smart Workspaces in the Extended CloudJul 03 2019Koalja describes a generalized data wiring or `pipeline' platform, built on top of Kubernetes, for plugin user code. Koalja makes the Kubernetes underlay transparent to users (for a `serverless' experience), and offers a breadboarding experience for development ... More
Cognitive Information Measurements: A New PerspectiveJul 03 2019From a traditional point of view, the value of information does not change during transmission. The Shannon information theory considers information transmission as a statistical phenomenon for measuring the communication channel capacity. However, in ... More
Interference Avoidance Position Planning in Dual-hop and Multi-hop UAV Relay NetworksJul 02 2019Jul 10 2019We consider unmanned aerial vehicle (UAV)-assisted wireless communication employing UAVs as relay nodes to increase the throughput between a pair of transmitter and receiver. We focus on developing effective methods to position the UAV(s) in the sky in ... More
Interference Avoidance Position Planning in Dual-hop and Multi-hop UAV Relay NetworksJul 02 2019We consider unmanned aerial vehicle (UAV)-assisted wireless communication employing UAVs as relay nodes to increase the throughput between a pair of transmitter and receiver. We focus on developing effective methods to position the UAV(s) in the sky in ... More
Service-based Routing at the EdgeJul 02 2019Future scenarios, such as AR/VR, pose challenging latency and bandwidth requirements in 5G. This need is complemented by the adoption of cloud principles for providing services, particularly for virtualizing service components with which virtualized instances ... More
Accelerating QUIC's Connection Establishment on High-Latency Access NetworksJul 02 2019A significant amount of connection establishments on the web require a prior domain name resolution by the client. Especially on high-latency access networks, these DNS lookups cause a significant delay on the client's connection establishment with a ... More
Trading Off Computation with Transmission in Status Update SystemsJul 01 2019This paper is motivated by emerging edge computing applications in which generated data are pre-processed at the source and then transmitted to an edge server. In such a scenario, there is typically a tradeoff between the amount of pre-processing and ... More
Location Anomalies Detection for Connected and Autonomous VehiclesJul 01 2019Future Connected and Automated Vehicles (CAV), and more generally ITS, will form a highly interconnected system. Such a paradigm is referred to as the Internet of Vehicles (herein Internet of CAVs) and is a prerequisite to orchestrate traffic flows in ... More
Results and Tools for Evaluating the Effectiveness of Focusing Systems to Improve Accessibility in Wireless NetworksJul 01 2019The widespread use of wireless technologies leads to an ever-increasing number of users and permanently functioning devices. However, the growth of the number of wireless users in a limited space and a limited frequency range leads to an increase in their ... More
Online Primary Channel Selection for Dynamic Channel Bonding in High-Density WLANsJul 01 2019In order to dynamically adapt the transmission bandwidth in wireless local area networks (WLANs), dynamic channel bonding (DCB) was introduced in IEEE 802.11n. It has been extended since then, and it is expected to be a key element in IEEE 802.11ax and ... More
Joint User Mobility and Traffic Characterization in Temporary Crowded EventsJul 01 2019Jul 03 2019In TCEs (Temporary Crowded Events), for example, music festivals, users are faced with problems accessing the Internet. TCEs are limited time events with a high concentration of people moving within the event enclosure while accessing the Internet. Unlike ... More
Indoor positioning system using WLAN channel estimates as fingerprints for mobile devicesJun 30 2019With the growing integration of location based services (LBS) such as GPS in mobile devices, indoor position systems (IPS) have become an important role for research. There are several IPS methods such as AOA, TOA, TDOA, which use trilateration for indoor ... More
A Fast-rate WLAN Measurement Tool for Improved Miss-rate in Indoor NavigationJun 30 2019Recently, location-based services (LBS) have steered attention to indoor positioning systems (IPS). WLAN-based IPSs relying on received signal strength (RSS) measurements such as fingerprinting are gaining popularity due to proven high accuracy of their ... More
Resource Management and Admission Control for Tactile Internet in Next Generation of RANJun 30 2019In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) ... More
E2E Delay Guarantee for the Tactile Internet via joint NFV and Radio Resource AllocationJun 30 2019The Tactile Internet (TI) is one of the next generation wireless network services with end to end (E2E) delay as low as 1~ms. Since this ultra low E2E delay cannot be met in the current 4G network architecture, it is necessary to investigate this service ... More
Energy-efficient Wireless Analog Sensing for Persistent Underwater Environmental MonitoringJun 30 2019The design of sensors or "things" as part of the new Internet of Underwater Things (IoUTs) paradigm comes with multiple challenges including limited battery capacity, not polluting the water body, and the ability to track continuously phenomena with high ... More
Towards Wireless Health Monitoring via Analog Signal Compression based Biosensing PlatformJun 30 2019Wireless all-analog biosensor design for concurrent microfluidic and physiological signal monitoring is presented in this work. The key component is an all-analog circuit capable of compressing two analog sources into one analog signal by Analog Joint ... More
Analog Signal Compression and Multiplexing Techniques for Healthcare Internet of ThingsJun 30 2019Scalability is a major issue for Internet of Things (IoT) as the total amount of traffic data collected and/or the number of sensors deployed grow. In some IoT applications such as healthcare, power consumption is also a key design factor for the IoT ... More
Improved Circuit Design of Analog Joint Source Channel Coding for Low-power and Low-complexity Wireless SensorsJun 30 2019To enable low-power and low-complexity wireless monitoring, an improved circuit design of Analog Joint Source Channel Coding (AJSCC) is proposed for wireless sensor nodes. This innovative design is based on Analog Divider Blocks (ADB) with tunable spacing ... More
Open-MPI over MOSIX: paralleled computing in a clustered worldJun 29 2019Recent increased interest in Cloud computing emphasizes the need to find an adequate solution to the load-balancing problem in parallel computing -- efficiently running several jobs concurrently on a cluster of shared computers (nodes). One approach to ... More
The Engineering of Software-Defined Quantum Key Distribution NetworksJun 29 2019Quantum computers will change the cryptographic panorama. A technology once believed to lay far away into the future is increasingly closer to real world applications. Quantum computers will break the algorithms used in our public key infrastructure and ... More
Deep Reinforcement Learning for 5G Networks: Joint Beamforming, Power Control, and Interference CoordinationJun 29 2019The fifth generation of wireless communications (5G) promises massive increases in traffic volume and data rates, as well as improved reliability in voice calls. Jointly optimizing beamforming, power control, and interference coordination in a 5G wireless ... More
Millemeter-Wave Fixed Wireless Access Using IEEE 802.11ayJun 28 2019IEEE 802.11ay defines new PHY and MAC specifications that enable 100 Gbps communications in the 60 GHz millimeter-wave (mmWave) band. Among the various use cases supported by IEEE 802.11ay, fixed wireless access, a cost-efficient high-performance alternative ... More
A DTLS Abstraction Layer for the Recursive Networking Architecture in RIOTJun 28 2019On the Internet of Things (IoT), devices continuously communicate with each other, with a gateway, or other Internet nodes. Often devices are constrained and use insecure channels for their communication, which exposes them to a selection of attacks that ... More
Towards Large-Scale Autonomous Wireless Sensor NetworksJun 28 2019Wireless Sensor Networks (WSNs) have the goal of gathering data from the environment. The advent of the Internet of Things (IoT) drastically changed WSN's vision that, as never before, needs to expand and include hundreds or thousands of sensors. But ... More
Multivariate Big Data Analysis for Intrusion Detection: 5 steps from the haystack to the needleJun 27 2019The research literature on cybersecurity incident detection & response is very rich in automatic detection methodologies, in particular those based on the anomaly detection paradigm. However, very little attention has been devoted to the diagnosis ability ... More
TRIDENT: A load-balancing Clos-network Packet Switch with Queues between Input and Central Stages and In-Order ForwardingJun 27 2019We propose a three-stage load balancing packet switch and its configuration scheme. The input- and central-stage switches are bufferless crossbars, and the output-stage switches are buffered crossbars. We call this switch ThRee-stage Clos-network swItch ... More
Reconfiguration Algorithms for High Precision Communications in Time Sensitive Networks: Time-Aware Shaper Configuration with IEEE 802.1Qcc (Extended Version)Jun 27 2019As new networking paradigms emerge for different networking applications, e.g., cyber-physical systems, and different services are handled under a converged data link technology, e.g., Ethernet, certain applications with mission critical traffic cannot ... More
Capacity and Coverage Enhancement Using Long-Endurance Tethered Airborne Base StationsJun 27 2019Airborne base stations (carried by drones) have a great potential to enhance coverage and capacity of cellular networks. Multiple scenarios and use cases will highly benefit from such technology such as (i) offloading terrestrial base stations (BSs) in ... More
A Key 6G Challenge and Opportunity -- Connecting the Remaining 4 Billions: A Survey on Rural ConnectivityJun 27 2019Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that ... More
Security of 5G-Mobile Backhaul Networks: A SurveyJun 27 2019The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul ... More
An Algorithm for Transmitting VR Video Based on Adaptive ModulationJun 27 2019Virtual reality (VR) is making waves around the world recently. However, traditional video streaming is not suitable for VR video because of the huge size and view switch requirements of VR videos. Since the view of each user is limited, it is unnecessary ... More
Cross-layer Design for Mission-Critical IoT in Mobile Edge Computing SystemsJun 26 2019In this work, we propose a cross-layer framework for optimizing user association, packet offloading rates, and bandwidth allocation for Mission-Critical Internet-of-Things (MC-IoT) services with short packets in Mobile Edge Computing (MEC) systems, where ... More
Fixed Rate Statistical QoS Provisioning for Markovian Sources in Machine Type CommunicationJun 26 2019In this paper, we study the trade-off between reliability and latency in machine type communication (MTC), which consists of single transmitter and receiver in the presence of Rayleigh fading channel. We assume that the transmitter does not know the channel ... More
Network Slicing Management Technique for Local 5G Micro-Operator DeploymentsJun 26 2019Local 5G networks are expected to emerge to serve different vertical sectors specific requirements. These networks can be deployed by traditional mobile network operators (MNOs) or entrant local micro-operators. With a large number of verticals with different ... More
Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing IoT Federated Learning: A Secure, Decentralized and Privacy-preserving SystemJun 26 2019Internet-of-Things (IoT) companies strive to get feedback from users to improve their products and services. However, traditional surveys cannot reflect the actual conditions of customers' due to the limited questions. Besides, survey results are affected ... More
FatPaths: Routing in Supercomputers, Data Centers, and Clouds with Low-Diameter Networks when Shortest Paths Fall ShortJun 26 2019We introduce FatPaths: a simple, generic, and robust routing architecture for Ethernet stacks. FatPaths enables state-of-the-art low-diameter topologies such as Slim Fly to achieve unprecedented performance, targeting both HPC supercomputers as well as ... More
Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define RadioJun 26 2019The article presents a method of organizing men-in-the-middle attack and penetration test on Bluetooth Low Energy devices and ZigBee packets using software define radio with sniffing and spoofing packets, capture and analysis techniques on wireless waves ... More
Lawn: an Unbound Low Latency Timer Data Structure for Large Scale, High Throughput SystemsJun 26 2019As demand for Real-Time applications rises among the general public, the importance of enabling large-scale, unbound algorithms to solve conventional problems with low to no latency is critical for product viability. Timer algorithms are prevalent in ... More
A Framework for Qualitative Communications Using Big Packet ProtocolJun 25 2019In the current Internet architecture, a packet is a minimal or fundamental unit upon which different actions such as classification,forwarding, or discarding are performed by the network nodes.When faced with constrained or poor network conditions, a ... More
Differences in Online Course Usage and IP Geolocation Bias by Local Economic ProfileJun 25 2019Although Massive Online Open Courses (MOOCs) have the promise to make rigorous higher education accessible to everyone, prior research has shown that registrants tend to come from backgrounds of higher socioeconomic status. In this work, I study geographically ... More
Fast Data: Moving beyond from Big Data's map-reduceJun 25 2019Big Data may not be the solution many are looking for. The latest rise of Big Data methods and systems is partly due to the new abilities these techniques provide, partly to the simplicity of the software design and partly because the buzzword itself ... More
Hybrid Resource Scheduling for Aggregation in Massive Machine-type Communication NetworksJun 25 2019Data aggregation is a promising approach to enable massive machine-type communication (mMTC). Here, we first characterize the aggregation phase where a massive number of machine-type devices transmits to their respective aggregator. By using non-orthogonal ... More
Enabling security and High Energy Efficiency in the Internet of Things with Massive MIMO Hybrid PrecodingJun 25 2019Recently, the security of Internet of Things (IoT) has been an issue of great concern. Physical layer security methods can help IoT networks achieve information-theoretical secrecy. Nevertheless, utilizing physical security methods, such as artificial ... More
Geo-Based Scheduling for C-V2X NetworksJun 25 2019Cellular Vehicle-to-Everything (C-V2X) networks can operate without cellular infrastructure support. Vehicles can autonomously select their radio resources using the sensing-based Semi-Persistent Scheduling (SPS) algorithm specified by the Third Generation ... More
Hop-by-Hop Multipath Routing: Choosing the Right Nexthop SetJun 24 2019The Internet can be made more efficient and robust with hop-by-hop multipath routing: Each router on the path can split packets between multiple nexthops in order to 1) avoid failed links and 2) reduce traffic on congested links. Before deciding how to ... More
Reliable Slicing of 5G Transport Networks with Dedicated ProtectionJun 24 2019In 5G networks, slicing allows partitioning of network resources to meet stringent end-to-end service requirements across multiple network segments, from access to transport. These requirements are shaping technical evolution in each of these segments. ... More
In-Vehicle False Information Attack Detection and Mitigation Framework using Machine Learning and Software Defined NetworkingJun 24 2019A modern vehicle contains many electronic control units (ECUs), which communicate with each other through the Controller Area Network (CAN) bus to ensure vehicle safety and performance. Emerging Connected and Automated Vehicles (CAVs) will have more ECUs ... More
Internet of Autonomous Vehicles: Architecture, Features, and Socio-Technological ChallengesJun 24 2019Mobility is the backbone of urban life and a vital economic factor in the development of the world. Rapid urbanization and the growth of mega-cities is bringing dramatic changes in the capabilities of vehicles. Innovative solutions like autonomy, electrification, ... More