Latest in cs.ni

total 12197took 0.14s
Towards a Public Key Management Framework for Virtual Assets and Virtual Asset Service ProvidersSep 18 2019The recent FATF Recommendations defines virtual assets and virtual assets service providers (VASP), and requires under the Travel Rule that originating VASPs obtain and hold required and accurate originator information and required beneficiary information ... More
A Survey of Rate-optimal Power Domain NOMA Schemes for Enabling Technologies of Future Wireless NetworksSep 17 2019Non-orthogonal multiple access (NOMA) schemes serve more than one user in the same resource block by multiplexing users in other domains than frequency and time. In this way, NOMA schemes offer several advantages over orthogonal multiple access (OMA) ... More
Walling up Backdoors in Intrusion Detection SystemsSep 17 2019Interest in poisoning attacks and backdoors recently resurfaced for Deep Learning (DL) applications. Several successful defense mechanisms have been recently proposed for Convolutional Neural Networks (CNNs), for example in the context of autonomous driving. ... More
Mitigating Network Noise on Dragonfly Networks through Application-Aware RoutingSep 17 2019System noise can negatively impact the performance of HPC systems, and the interconnection network is one of the main factors contributing to this problem. To mitigate this effect, adaptive routing sends packets on non-minimal paths if they are less congested. ... More
Autonomous Energy Management system achieving piezoelectric energy harvesting in Wireless SensorsSep 17 2019Wireless Sensor Networks (WSNs) are extensively used in monitoring applications such as humidity and temperature sensing in smart buildings, industrial automation, and predicting crop health. Sensor nodes are deployed in remote places to sense the data ... More
Network entity characterization and attack predictionSep 17 2019The devastating effects of cyber-attacks, highlight the need for novel attack detection and prevention techniques. Over the last years, considerable work has been done in the areas of attack detection as well as in collaborative defense. However, an analysis ... More
Mobile Internet Experience: Urban vs. Rural -- Saturation vs. Starving?Sep 17 2019Mobile Internet experience has been of increasing interest. Services accessed via smartphone applications shall provide satisfying Quality of Experience (QoE), irrespective of end user location, time of the day, and other circumstances. Unfortunately, ... More
Enhanced distributed data aggregation method in the internet of thingsSep 17 2019As a novel concept in technology and communication world, \emph{"Internet of Things (IoT)"} has been emerged. In such a modern technology, the capability to transmit data through data communication networks (such as Internet or Intranet) is provided for ... More
An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X)Sep 17 2019Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular ... More
A Joint Learning and Communications Framework for Federated Learning over Wireless NetworksSep 17 2019In this paper, the problem of training federated learning (FL) algorithms over a realistic wireless network is studied. In particular, in the considered model, wireless users execute an FL algorithm while training their local FL models using their own ... More
ShamFinder: An Automated Framework for Detecting IDN HomographsSep 17 2019The internationalized domain name (IDN) is a mechanism that enables us to use Unicode characters in domain names. The set of Unicode characters contains several pairs of characters that are visually identical with each other; e.g., the Latin character ... More
A First Measurement Study of Commercial mmWave 5G Performance on SmartphonesSep 17 2019We conduct to our knowledge a first measurement study of commercial mmWave 5G performance on smartphones by closely examining 5G networks in two U.S. cities. We conduct extensive field tests on 5G performance under diverse conditions including different ... More
DDoS Hide & Seek: On the Effectiveness of a Booter Services TakedownSep 16 2019Booter services continue to provide popular DDoS-as-a-service platforms and enable anyone irrespective of their technical ability, to execute DDoS attacks with devastating impact. Since booters are a serious threat to Internet operations and can cause ... More
Impact of Correlated Failures in 5G Dual Connectivity Architectures for URLLC ApplicationsSep 16 2019Achieving end-to-end ultra-reliability and resiliency in mission critical communications is a major challenge for future wireless networks. Dual connectivity has been proposed by 3GPP as one of the viable solutions to fulfill the reliability requirements. ... More
RVH: Range-Vector Hash for Fast Online Packet ClassificationSep 16 2019Packet classification according to multi-field ruleset is a key component for many network applications. Emerging software defined networking and cloud computing need to update the rulesets frequently for flexible policy configuration. Their success depends ... More
Hijacking Routes in Payment Channel Networks: A Predictability TradeoffSep 15 2019Off-chain transaction networks can mitigate the scalability issues of today's trustless electronic cash systems such as Bitcoin. However, these peer-to-peer networks also introduce a new attack surface which is not well-understood today. This paper identifies ... More
CogRF: A New Frontier for Machine Learning and Artificial Intelligence for 6G RF SystemsSep 15 2019The concept of CogRF, a novel tunable radio frequency (RF) frontend that uses artificial intelligence (AI) to meet mission requirements for beyond 5G and 6G systems, is introduced. CogRF utilizes AI as the core to control and operate RF system components ... More
Low-Latency Network-Adaptive Error Control for Interactive StreamingSep 15 2019We introduce a novel network-adaptive algorithm that is suitable for alleviating network packet losses for low-latency interactive communications between a source and a destination. Our network-adaptive algorithm estimates in real time the best parameters ... More
Reversible Models for Wireless Multi-Channel Multiple AccessSep 15 2019This paper presents a network layer model for a wireless multiple access system with both persistent and non-persistent users. There is a single access point with multiple identical channels. Each user who wants to send a file first scans a subset of ... More
Biometric Blockchain: A Secure Solution for Intelligent Vehicle Data SharingSep 14 2019The intelligent vehicle (IV) has become a promising technology that could revolutionize our life in smart cities sooner or later. However, it yet suffers from many security vulnerabilities. Traditional security methods are incapable to secure the IV data ... More
IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit ApproachSep 14 2019In TSCH, which is a MAC mechanism set of the IEEE 802.15.4e amendment, calculation, construction, and maintenance of the packet transmission schedules are not defined. Moreover, to ensure optimal throughput, most of the existing scheduling methods are ... More
Minimizing Age of Information in a Multihop Wireless NetworkSep 14 2019We consider the problem of minimizing age in a multihop wireless network. There are multiple source-destination pairs, transmitting data through multiple wireless channels, over multiple hops. We propose a network control policy which consists of a distributed ... More
Optimized Routing and Spectrum Assignment for Video Communication over an Elastic Optical NetworkSep 14 2019Elastic optical network (EON) efficiently utilize spectral resources for optical fiber communication by allocating the minimum necessary bandwidth to client demands. On the other hand, network traffic has been continuously increasing due to the wide penetration ... More
On Safeguarding Privacy and Security in the Framework of Federated LearningSep 14 2019Motivated by the advancing computational capacity of wireless end-user equipment (UE), as well as the increasing concerns about sharing private data, a new machine learning (ML) paradigm has emerged, namely federated learning (FL). Specifically, FL allows ... More
Optimal Routing for a Family of Scalable Interconnection NetworksSep 14 2019Scalability of interconnection networks for the supercomputers, particularly, for next-generation exascale systems with tens of millions of cores, is one of the essential features for enhancement of performance. One of the required properties of the scalable ... More
The Case for Writing Network Drivers in High-Level Programming LanguagesSep 13 2019Drivers are written in C or restricted subsets of C++ on all production-grade server, desktop, and mobile operating systems. They account for 66% of the code in Linux, but 39 out of 40 security bugs related to memory safety found in Linux in 2017 are ... More
An Empirical Study of the Cost of DNS-over-HTTPSSep 13 2019DNS is a vital component for almost every networked application. Originally it was designed as an unencrypted protocol, making user security a concern. DNS-over-HTTPS (DoH) is the latest proposal to make name resolution more secure. In this paper we study ... More
Traffic-aware Two-stage Queueing Communication Networks: Queue Analysis and Energy SavingSep 12 2019To boost energy saving for the general delay-tolerant IoT networks, a two-stage and single-relay queueing communication scheme is investigated. Concretely, a traffic-aware $N$-threshold and gated-service policy are applied at the relay. As two fundamental ... More
Long range battery-less PV-powered RFID tag sensorsSep 12 2019Communication range in passive Radio-Frequency Identification (RFID) front-end devices is a critical barrier in the real-world implementation of this low-cost technology. Purely passive RFID tags power up by harvesting the limited RF energy transmitted ... More
Challenges in the Decentralised Web: The Mastodon CaseSep 12 2019The Decentralised Web (DW) has recently seen a renewed momentum, with a number of DW platforms like Mastodon, Peer-Tube, and Hubzilla gaining increasing traction. These offer alternatives to traditional social networks like Twitter, YouTube, and Facebook, ... More
SQLR: Short Term Memory Q-Learning for Elastic ProvisioningSep 12 2019As more and more application providers transition to the cloud and deliver their services on a Software as a Service (SaaS) basis, cloud providers need to make their provisioning systems agile enough to deliver on Service Level Agreements. At the same ... More
Survey on Terahertz Nanocommunication and Networking: A Top-Down PerspectiveSep 12 2019Recent developments in nanotechnology herald nanometer-sized devices expected to bring light to a number of groundbreaking applications. Communication with and among nanodevices will be needed for unlocking the full potential of such applications. As ... More
Toward Proactive, Adaptive Defense: A Survey on Moving Target DefenseSep 12 2019Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of reactive security mechanisms has limitations because potential attackers ... More
pForest: In-Network Inference with Random ForestsSep 12 2019The concept of "self-driving networks" has recently emerged as a possible solution to manage the ever-growing complexity of modern network infrastructures. In a self-driving network, network devices adapt their decisions in real-time by observing network ... More
Reinforcing Edge Computing with Multipath TCP Enabled Mobile Device CloudsSep 12 2019In recent years, enormous growth has been witnessed in the computational and storage capabilities of mobile devices. However, much of this computational and storage capabilities are not always fully used. On the other hand, popularity of mobile edge computing ... More
Tiny Buffer TCP for Data Center NetworksSep 11 2019A low and stable buffer occupancy is critical to achieve high throughput, low packet drop rate, low latency, and low jitter for data center networks. It also allows switch chips to support higher port density, larger lookup tables, or richer functions. ... More
Should We Worry About Interference in Emerging Dense NGSO Satellite Constellations?Sep 11 2019Many satellite operators are planning to deploy NGSO systems for broadband communication services in the Ku-, Ka-, and V-band, where some of them have already launched. Consequently, new challenges are expected for inter-system satellite coexistence due ... More
Learning End-User Behavior for Optimized Bidding in HetNets: Impact on User/Network AssociationSep 11 2019We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user ... More
Packet Chasing: Spying on Network Packets over a Cache Side-ChannelSep 11 2019This paper presents Packet Chasing, an attack on the network that does not require access to the network, which works regardless of the privilege level of the process receiving the packets. A spy process can easily probe and discover the exact cache location ... More
A Study of Deep Learning for Network Traffic Data ForecastingSep 10 2019We present a study of deep learning applied to the domain of network traffic data forecasting. This is a very important ingredient for network traffic engineering, e.g., intelligent routing, which can optimize network performance, especially in large ... More
A Study of Deep Learning for Network Traffic Data ForecastingSep 10 2019Sep 12 2019We present a study of deep learning applied to the domain of network traffic data forecasting. This is a very important ingredient for network traffic engineering, e.g., intelligent routing, which can optimize network performance, especially in large ... More
The Evolution of Decentralized ICT NetworksSep 10 2019Traditional networking systems, especially the famous 3 tier topology design, focused more on centralizing the networking systems, and used redundancy as a protection mechanism against future failures of the system. However, in recent years, the evolution ... More
End-to-end Quantum Secured Inter-Domain 5G Service Orchestration Over Dynamically Switched Flex-Grid Optical Networks Enabled by a q-ROADMSep 10 2019Dynamic and flexible optical networking enabled by NFV and SDN are the key technology enablers for supporting the dynamicity and bandwidth requirements of emerging 5G network services. To achieve the objective of 5G, Network Services (NSes) must be often ... More
Extending the Service Composition Formalism with Relational ParametersSep 10 2019Web Service Composition deals with the (re)use of Web Services to provide complex functionality, inexistent in any single service. Over the state-of-the-art, we introduce a new type of modeling, based on ontologies and relations between objects, which ... More
Mobility can drastically improve the heavy traffic performance from 1/(1-rho) to -log(1-rho)Sep 10 2019We study a model of wireless networks where users move at speed s, which has the original feature of being defined through a fixed-point equation. Namely, we start from a two-class Processor-Sharing queue to model one representative cell of this network: ... More
VLC-Based Networking: Feasibility and ChallengesSep 10 2019Visible-light communication (VLC) has emerged as a prominent technology to address the radio spectrum shortage. It is characterized by the unlicensed and unexploited high bandwidth, and provides the system with cost-effective advantages because of the ... More
The New Purity and Capacity Models for the OAM-mmWave Communication Systems under Atmospheric TurbulenceSep 10 2019The orbital angular momentum (OAM) wireless communication technology is widely studied in recent literatures. But the atmospheric turbulence is rarely considered in analyzing the capacity of OAM-based millimeter wave (OAM-mmWave) communication systems. ... More
Taming the Tail of Maximal Information Age in Wireless Industrial NetworksSep 10 2019In wireless industrial networks, the information of time-sensitive control systems needs to be transmitted in an ultra-reliable and low-latency manner. This letter studies the resource allocation problem in finite blocklength transmission, in which the ... More
Resource allocation using SPA based on different cost functions in elastic optical networksSep 10 2019Routing, modulation and spectrum allocation in elastic optical networks is a problem aiming at increasing the capacity of the network. Many algorithms such as shortest path algorithm can be used as the routing section of this problem. The efficiency of ... More
FLAG: A Framework for FPGA-based LoAd Generation in Profinet CommunicationSep 09 2019Like other automated system technologies, PROFINET, a real-time Industrial Ethernet Standard has shown increasing level of integration into the present IT Infrastructure. Such vast use of PROFINET can expose the controllers and I/O devices to operate ... More
Adaptive Beamwidth Selection for Contention Based Access Periods in Millimeter Wave WLANsSep 09 201960GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). ... More
Collision Avoidance in V2X Communication NetworksSep 09 2019In this paper we investigate collision detection and avoidance in a vehicular network of full duplex (FD) operating nodes. Each vehicle in this network senses the energy level of the channel before and during its transmission. The measured energy is compared ... More
Performance Analysis of IEEE 802.11ad MAC ProtocolSep 09 2019IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed ... More
The Study of Dynamic Caching via State Transition Field -- the Case of Time-Varying PopularitySep 09 2019In the second part of this two-part paper, we extend the study of dynamic caching via state transition field (STF) to the case of time-varying content popularity. The objective of this part is to investigate the impact of time-varying content popularity ... More
Association, Blockage and Handoffs in IEEE 802.11ad based 60GHz Picocells- A Closer LookSep 09 2019The link misalignment and high susceptibility to blockages are the biggest hurdles in realizing 60GHz based wireless local area networks (WLANs). However, much of the previous studies investigating 60GHz alignment and blockage issues do not provide an ... More
Analyzing the Trade-offs in Using Millimeter Wave Directional Links for High Data Rate Tactile Internet ApplicationsSep 09 2019Ultra-low latency and high reliability communications are the two defining characteristics of Tactile Internet (TI). Nevertheless, some TI applications would also require high data-rate transfer of audio-visual information to complement the haptic data. ... More
Measurement, Characterization and Modeling of LoRa Technology in Multi-floor BuildingsSep 09 2019In recent years, we have witnessed the rapid development of LoRa technology, together with extensive studies trying to understand its performance in various application settings. In contrast to measurements performed in large outdoor areas, limited number ... More
The Study of Dynamic Caching via State Transition Field -- the Case of Time-Invariant PopularitySep 09 2019This two-part paper investigates cache replacement schemes with the objective of developing a general model to unify the analysis of various replacement schemes and illustrate their features. To achieve this goal, we study the dynamic process of caching ... More
Reliability and Error Burst Length Analysis of Wireless Multi-ConnectivitySep 09 2019Multi-connectivity offers diversity in terms of multiple interfaces through which the data can be sent, thereby improving simultaneously the overall reliability and latency. This makes interface diversity a natural candidate for supporting Ultra-Reliable ... More
An Evaluation of BBR and its variantsSep 09 2019The congestion control algorithm bring such importance that it avoids the network link into severe congestion and guarantees network normal operation. Since The loss based algorithms introduce high transmission delay, to design new algorithm simultaneously ... More
Zero-Calibration Device-free Localization for the IoT based on Participatory SensingSep 08 2019Device-free localization (DFL) is an emerging technology for estimating the position of a human or object that is not equipped with any electronic tag, nor participate actively in the localization process. Similar to device-based localization, the initial ... More
Destination-aware Adaptive Traffic Flow Rule Aggregation in Software-Defined NetworksSep 07 2019In this paper, we propose a destination-aware adaptive traffic flow rule aggregation (DATA) mechanism for facilitating traffic flow monitoring in SDN-based networks. This method adapts the number of flow table entries in SDN switches according to the ... More
OptSample: A Resilient Buffer Management Policy for Robotic Systems based on Optimal Message SamplingSep 07 2019Modern robotic systems have become an alternative to humans to perform risky or exhausting tasks. In such application scenarios, communications between robots and the control center have become one of the major problems. Buffering is a commonly used solution ... More
Multiservice-based Network Slicing Orchestration with Impatient TenantsSep 06 2019The combination of recent emerging technologies such as network function virtualization (NFV) and network programmability (SDN) gave birth to the novel Network Slicing paradigm. 5G networks consist of multi-tenant infrastructures capable of offering leased ... More
IoT Forensic -- A digital investigation framework for IoT systemsSep 06 2019Security issues, threats, and attacks in relation with the IoT have been identified as promising and challenging area of research. Eventually, the need for a forensics methodology for investigating IoT-related crime is therefore essential. However, the ... More
Prediction and Communication Co-design for Ultra-Reliable and Low-Latency CommunicationsSep 06 2019Ultra-reliable and low-latency communications (URLLC) are considered as one of three new application scenarios in the fifth generation cellular networks. In this work, we aim to reduce the user experienced delay through prediction and communication co-design, ... More
Is two greater than one?: Analyzing Multipath TCP over Dual-LTE in the WildSep 05 2019Multipath TCP (MPTCP) is a standardized TCP extension which allows end-hosts to simultaneously exploit all of their network interfaces. The recent proliferation of dual-SIM mobile phones makes multi-LTE MPTCP setup an attractive option. We perform extensive ... More
A Private and Unlinkable Message Exchange Using a Public bulletin board in Opportunistic NetworksSep 05 2019We plan to simulate a private and unlinkable exchange of messages by using a Public bulletin board and Mix networks in Opportunistic networks. This Opportunistic network uses a secure and privacy-friendly asynchronous unidirectional message transmission ... More
Random Linear Network Coding on Programmable SwitchesSep 05 2019By extending the traditional store-and-forward mechanism, network coding has the capability to improve a network's throughput, robustness, and security. Given the fundamentally different packet processing required by this new paradigm and the inflexibility ... More
A Transfer Learning Approach for Network Intrusion DetectionSep 05 2019Convolution Neural Network (ConvNet) offers a high potential to generalize input data. It has been widely used in many application areas, such as visual imagery, where comprehensive learning datasets are available and a ConvNet model can be well trained ... More
Elastic_HH: Tailored Elastic for Finding Heavy HittersSep 05 2019Finding heavy hitters has been of vital importance in network measurement. Among all the recent works in finding heavy hitters, the Elastic sketch achieves the highest accuracy and fastest speed. However, we find that there is still room for improvement ... More
Blockchain-Powered Software Defined Network-Enabled Networking Infrastructure for Cloud ManagementSep 04 2019Cloud architecture has become a valuable solution for different applications, such as big data analytics, due to its high-degree of availability, scalability and strategic value. However, there still remain challenges in managing cloud architecture, in ... More
Internet Appendix for "Sequential Bargaining Based Incentive Mechanism for Collaborative Internet Access"Sep 04 2019This document is an Internet Appendix of paper entitled "Sequential Bargaining Based Incentive Mechanism for Collaborative Internet Access". It includes information about LTE signal metrics, results of idle state experiments, and linear regression assumptions ... More
Galois Field Arithmetics for Linear Network Coding using AVX512 Instruction Set ExtensionsSep 04 2019Linear network coding requires arithmetic operations over Galois fields, more specifically over finite extension fields. While coding over GF(2) reduces to simple XOR operations, this field is less preferred for practical applications of random linear ... More
Interference mitigation techniques for a dense heterogeneous area network in machine-to-machine communicationsSep 04 2019With the advent of Machine-to-Machine (M2M) communications, various networking consumer industrial and autonomous systems exchange messages in the real world in order to achieve their objectives. Parts of these systems are comprised of short-range wireless ... More
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive ClassificationSep 04 2019Domain name system (DNS) is a crucial part of the Internet, yet has been widely exploited by cyber attackers. Apart from making static methods like blacklists or sinkholes infeasible, some weasel attackers can even bypass detection systems with machine ... More
Q-DATA: Enhanced Traffic Flow Monitoring in Software-Defined Networks applying Q-learningSep 04 2019Software-Defined Networking (SDN) introduces a centralized network control and management by separating the data plane from the control plane which facilitates traffic flow monitoring, security analysis and policy formulation. However, it is challenging ... More
Harmonizing 3GPP and NFV description models to provide customized RAN slices in 5G networksSep 03 2019The standardization of Radio Access Network (RAN) in mobile networks has traditionally been led by 3GPP. However, the emergence of RAN slicing has introduced new aspects that fall outside 3GPP scope. Among them, network virtualization enables the particularization ... More
Fog Computing Architectures: a Reference for PractitionersSep 03 2019Soon after realizing that Cloud Computing could indeed help several industries overcome classical product-centric approaches in favor of more affordable service-oriented business models, we are witnessing the rise of a new disruptive computing paradigm, ... More
Guardians of the Deep Fog: Failure-Resilient DNN Inference from Edge to CloudSep 03 2019Partitioning and distributing deep neural networks (DNNs) over physical nodes such as edge, fog, or cloud nodes, could enhance sensor fusion, and reduce bandwidth and inference latency. However, when a DNN is distributed over physical nodes, failure of ... More
Reliability and Local Delay in Wireless Networks: Does Bandwidth Partitioning Help?Sep 03 2019This paper studies the effect of bandwidth partitioning (BWP) on the reliability and delay performance in infrastructureless wireless networks. The reliability performance is characterized by the density of concurrent transmissions that satisfy a certain ... More
On Partial Coverage and Connectivity Relationship in Deterministic WSN TopologiesSep 02 2019The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for ... More
Experiences from Using Gamification and IoT-based Educational Tools in High Schools towards Energy SavingsSep 02 2019Raising awareness among young people, and especially students, on the relevance of behavior change for achieving energy savings is increasingly being considered as a key enabler towards long-term and cost-effective energy efficiency policies. However, ... More
Dead on Arrival: An Empirical Study of The Bluetooth 5.1 Positioning SystemSep 02 2019The recently released Bluetooth 5.1 specification introduces fine-grained positioning capabilities in this wireless technology, which is deemed essential to context-/location-based Internet of Things (IoT) applications. In this paper, we evaluate experimentally, ... More
IEEE 802.11ba -- Extremely Low Power Wi-Fi for Massive Internet of Things: Challenges, Open Issues, Performance EvaluationSep 02 2019Many recent activities of IEEE 802.11 Working group have been focused on improving power efficiency of Wi-Fi to make it favorable for massive Internet of Things scenarios, in which swarms of battery supplied sensors rarely communicate with remote servers. ... More
Edge Intelligence: the Confluence of Edge Computing and Artificial IntelligenceSep 02 2019Along with the deepening development in communication technologies and the surge of mobile devices, a brand-new computation paradigm, Edge Computing, is surging in popularity. Meanwhile, Artificial Intelligence (AI) applications are thriving with the ... More
Delay-Distance Correlation Study for IP GeolocationSep 01 2019Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to improve the performances of classical ... More
Big Data Analytics for Manufacturing Internet of Things: Opportunities, Challenges and Enabling TechnologiesSep 01 2019The recent advances in information and communication technology (ICT) have promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business ... More
SCALABLE INTERNETWORKING: Final Technical ReportAug 31 2019This document describes the work completed at the University of California, Santa Cruz under the project Scalable Internetworking sponsored by ARPA under Contract No. F19628-93-C-0175. This report covers work performed from 1 April 1993 to 31 December ... More
Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and ImplementationAug 31 2019There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could ... More
Two-layer Coded Channel Access with Collision Resolution: Design and AnalysisAug 30 2019We propose a two-layer coding architecture for communication of multiple users over a shared slotted medium enabling joint collision resolution and decoding. Each user first encodes its information bits with an outer code for reliability, and then transmits ... More
GADMM: Fast and Communication Efficient Framework for Distributed Machine LearningAug 30 2019When the data is distributed across multiple servers, efficient data exchange between the servers (or workers) for solving the distributed learning problem is an important problem and is the focus of this paper. We propose a fast, privacy-aware, and communication-efficient ... More
Internet-based Adaptive Distributed Simulation of Mobile Ad-hoc NetworksAug 30 2019In this paper we focus on Internet-based simulation, a form of distributed simulation in which a set of execution units that are physically located around the globe work together to run a simulation model. This setup is very challenging because of the ... More
IoT based Smart Access Controlled Secure Smart City Architecture Using BlockchainAug 30 2019Sep 09 2019Standard security protocols like SSL, TLS, IPSec etc. have high memory and processor consumption which makes all these security protocols unsuitable for resource constrained platforms such as Internet of Things (IoT). Blockchain (BC) finds its efficient ... More
IoT based Smart Access Controlled Secure Smart City Architecture Using BlockchainAug 30 2019Standard security protocols like SSL, TLS, IPSec etc. have high memory and processor consumption which makes all these security protocols unsuitable for resource constrained platforms such as Internet of Things (IoT). Blockchain (BC) finds its efficient ... More
Power and Beam Optimization for Uplink Millimeter-Wave Hotspot Communication SystemsAug 29 2019We propose an effective interference management and beamforming mechanism for uplink communication systems that yields fair allocation of rates. In particular, we consider a hotspot area of a millimeter-wave (mmWave) access network consisting of multiple ... More
Enabling Simulation-Based Optimization Through Machine Learning: A Case Study on Antenna DesignAug 29 2019Complex phenomena are generally modeled with sophisticated simulators that, depending on their accuracy, can be very demanding in terms of computational resources and simulation time. Their time-consuming nature, together with a typically vast parameter ... More
Generation of Cooperative Perception Messages for Connected and Automated VehiclesAug 29 2019Cooperative or collective perception (or sensing) enables connected and automated vehicles to exchange sensor information to improve their perception of the driving environment. Standards are currently being developed by ETSI to define collective perception ... More
On Efficient Data Transfers Across Geographically Dispersed DatacentersAug 29 2019As applications become more distributed to improve user experience and offer higher availability, businesses rely on geographically dispersed datacenters that host such applications more than ever. Dedicated inter-datacenter networks have been built that ... More
On the Ethereum Blockchain Structure: a Complex Networks Theory PerspectiveAug 29 2019In this paper, we analyze the Ethereum blockchain using the complex networks modeling framework. Accounts acting on the blockchain are represented as nodes, while the interactions among these accounts, recorded on the blockchain, are treated as links ... More