Latest in cs.ni

total 7250took 0.23s
Lower Bounds for the Fair Resource Allocation ProblemFeb 08 2018The $\alpha$-fair resource allocation problem has received remarkable attention and has been studied in numerous application fields. Several algorithms have been proposed in the context of $\alpha$-fair resource sharing to distributively compute its value. ... More
PTP: Path-specified Transport Protocol for Concurrent Multipath Transmission in Named Data NetworksFeb 08 2018Named Data Networking (NDN) is a promising Future Internet architecture to support content distribution. Its inherent addressless routing paradigm brings valuable characteristics to improve the transmission robustness and efficiency, e.g. users are enabled ... More
Structure and Stability of Internet Top ListsFeb 07 2018Active Internet measurement studies rely on a list of targets to be scanned. While probing the entire IPv4 address space is feasible for scans of limited complexity, more complex scans do not scale to measuring the full Internet. Thus, a sample of the ... More
Click Spam Prevention Model for On-Line AdvertisementFeb 07 2018This paper shows a vulnerability of the pay-per-click accounting of Google Ads and proposes a statistical tradeoff-based approach to manage this vulnerability. The result of this paper is a model to calculate the overhead cost per click necessary to protect ... More
Adaptive Coded Caching for Fair Delivery over Fading ChannelsFeb 07 2018The performance of existing \emph{coded caching} schemes is sensitive to the worst channel quality, a problem which is exacerbated when communicating over fading channels. In this paper, we address this limitation in the following manner: \emph{in short-term}, ... More
Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery RechargesFeb 06 2018A sensor node that is sending measurement updates regarding some physical phenomenon to a destination is considered. The sensor relies on energy harvested from nature to transmit its updates, and is equipped with a finite $B$-sized battery to save its ... More
Path Selection and Rate Allocation in Self-Backhauled mmWave NetworksFeb 06 2018We investigate the problem of multi-hop scheduling in self-backhauled millimeter wave (mmWave) networks. Owing to the high path loss and blockage of mmWave links, multi-hop paths between the macro base station and the intended users via full-duplex small ... More
RDMAvisor: Toward Deploying Scalable and Simple RDMA as a Service in DatacentersFeb 06 2018RDMA is increasingly adopted by cloud computing platforms to provide low CPU overhead, low latency, high throughput network services. On the other hand, however, it is still challenging for developers to realize fast deployment of RDMA-aware applications ... More
Realizing Uncertainty-Aware Timing Stack in Embedded Operating SystemFeb 03 2018Time awareness is critical to a broad range of emerging applications -- in Cyber-Physical Systems and Internet of Things -- running on commodity platforms and operating systems. Traditionally, time is synchronized across devices through a best-effort ... More
D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large Scale Mobile NetworksFeb 03 2018Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications ... More
QoS-aware Dynamic Fog Service ProvisioningFeb 02 2018Recent advances in the areas of Internet of Things (IoT), cloud computing and big data have attributed to the rise of growing number of complex and useful applications. As IoT becomes more prevalent in our daily life, more data-intensive, delay-sensitive, ... More
Multipath Communication with Finite Sliding Window Network Coding for Ultra-Reliability and Low LatencyFeb 02 2018We use random linear network coding (RLNC) based scheme for multipath communication in the presence of lossy links with different delay characteristics to obtain ultra-reliability and low latency. A sliding window version of RLNC is proposed where the ... More
Mobility-aware, adaptive algorithms for wireless power transfer in ad hoc networksFeb 01 2018In this work, we investigate the interesting impact of mobility on the problem of efficient wireless power transfer in ad hoc networks. We consider a set of mobile agents (consuming energy to perform certain sensing and communication tasks), and a single ... More
Percolation for D2D Networks on Street SystemsJan 31 2018We study fundamental characteristics for the connectivity of multi-hop D2D networks. Devices are randomly distributed on street systems and are able to communicate with each other whenever their separation is smaller than some connectivity threshold. ... More
Mobile Networks Connected Drones: Field Trials, Simulations, and Design InsightsJan 31 2018Drones are becoming increasingly used in a wide variety of industries and services and are delivering profound socioeconomic benefits. Technology needs to be in place to ensure safe operation and management of the growing fleet of drones. Mobile networks ... More
Analysis of Coded Selective-Repeat ARQ via Matrix Signal-Flow GraphsJan 31 2018We propose two schemes for selective-repeat ARQ protocols over packet erasure channels with unreliable feedback: (i) a hybrid ARQ protocol with soft combining at the receiver, and (ii) a coded ARQ protocol, by building on the uncoded baseline scheme for ... More
Design and Analysis of 5G Scenarios with 'simmer': An R Package for Fast DES PrototypingJan 29 2018Simulation frameworks are important tools for the analysis and design of communication networks and protocols, but they can result extremely costly and/or complex (for the case of very specialized tools), or too naive and lacking proper features and support ... More
Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path SchemeJan 17 2018Packet routing in nanonetworks requires novel approaches, which can cope with the extreme limitations posed by the nano-scale. Highly lossy wireless channels, extremely limited hardware capabilities and non-unique node identifiers are among the restrictions. ... More
A Multi-Agent Neural Network for Dynamic Frequency Reuse in LTE NetworksJan 16 2018Fractional Frequency Reuse techniques can be employed to address interference in mobile networks, improving throughput for edge users. There is a tradeoff between the coverage and overall throughput achievable, as interference avoidance techniques lead ... More
On Partly Overloaded Spreading Sequences with Variable Spreading FactorJan 12 2018Future wireless communications systems are expected to support multi-service operation, i.e. especially multi-rate as well as multi-level quality of service (QoS) requirements. This evolution is mainly driven by the success of the Internet of Things (IoT) ... More
ONETS: Online Network Slice Broker From Theory to PracticeJan 10 2018Network slicing allows mobile network operators to open their physical network infrastructure platform to the concurrent deployment of multiple logical self-contained networks, i.e., network slices. In this paper we propose and analyze ONETS: an Online ... More
Disseminacao de mensagens DTN com base em grupos de interessesJan 10 2018Recent works explore social characteristics of nodes to improve message delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning techniques to create node groups organized by common interests. Messages are sent to target groups, ... More
Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an ApplicationJan 09 2018The Transmission Control Protocol (TCP) utilizes congestion avoidance and control mechanisms as a preventive measure against congestive collapse and as an adaptive measure in the presence of changing network conditions. The set of available congestion ... More
Publish-Subscribe Framework for Event Management in IoT-based ApplicationsJan 07 2018The incredible growth of sensors and microcontroller units makes the task of real-time event monitoring in the Internet of Things (IoT) based applications easier and more practical. In order to effectively support the event management in IoT-based applications, ... More
Optimizing the Number of Fog Nodes for Cloud-Fog-Thing NetworksJan 02 2018Going from theory to practice in fog networking raises the question of the optimum number of fog nodes that will be upgraded from the existing nodes. This paper finds the optimum number of fog nodes for a given total number of ordinary nodes residing ... More
Simulating Opportunistic Networks: Survey and Future DirectionsDec 05 2017Jan 09 2018Simulation is one of the most powerful tools we have for evaluating the performance of Opportunistic Networks. In this survey, we focus on available tools and models, compare their performance and precision and experimentally show the scalability of different ... More
A Reliability Study of Parallelized VNF ChainingNov 20 2017In this paper, we study end-to-end service reliability in Data Center Networks (DCN) with flow and Service Function Chains (SFCs) parallelism. In our approach, we consider large flows to i) be split into multiple parallel smaller sub-flows; ii) SFC along ... More
A Design-Time/Run-Time Application Mapping Methodology for Predictable Execution Time in MPSoCsNov 16 2017Executing multiple applications on a single MPSoC brings the major challenge of satisfying multiple quality requirements regarding real-time, energy, etc. Hybrid application mapping denotes the combination of design-time analysis with run-time application ... More
Statistical Approaches for Initial Access in mmWave 5G SystemsNov 15 2017mmWave communication systems overcome high attenuation by using multiple antennas at both the transmitter and the receiver to perform beamforming. Upon entrance of a user equipment (UE) into a cell a scanning procedure must be performed by the base station ... More
SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown StatisticsOct 16 2017In cognitive radio networks (CRNs), dynamic spectrum access has been proposed to improve the spectrum utilization, but it also generates spectrum misuse problems. One common solution to these problems is to deploy monitors to detect misbehaviors on certain ... More
Five-Nines Reliable Downward Routing in RPLOct 06 2017After a decade of research in low-power data collection, reaching arbitrary nodes has received comparatively little attention. The leading protocol for low-power IPv6 routing, RPL, is no exception, as it is often studied in multipoint-to-point scenarios. ... More
Angriffserkennung für industrielle Netzwerke innerhalb des Projektes IUNOSep 27 2017Nov 21 2017The increasing interconnectivity of industrial networks is one of the central current hot topics. It is adressed by research institutes, as well as industry. In order to perform the fourth industrial revolution, a full connectivity between production ... More
Re-designing Dynamic Content Delivery in the Light of a Virtualized InfrastructureSep 13 2017We explore the opportunities and design options enabled by novel SDN and NFV technologies, by re-designing a dynamic Content Delivery Network (CDN) service. Our system, named MOSTO, provides performance levels comparable to that of a regular CDN, but ... More
Proceedings of the 4th OMNeT++ Community Summit, University of Bremen - Germany, September 7-8, 2017Sep 12 2017These are the Proceedings of the 4th OMNeT++ Community Summit, which was held at the University of Bremen - Germany - on September 7-8, 2017.
Reactive User Behavior and Mobility ModelsSep 07 2017In this paper, we present a set of simulation models to more realistically mimic the behaviour of users reading messages. We propose a User Behaviour Model, where a simulated user reacts to a message by a flexible set of possible reactions (e.g. ignore, ... More
Opportunistic Networking Protocol Simulator for OMNeT++Sep 07 2017The number of computing devices of the Internet of Things (IoT) is expected to grow by billions. New networking architectures are being considered to handle communications in the IoT. One of these architectures is Opportunistic Networking (OppNets). To ... More
Radio Irregularity Model in OMNeT++Sep 07 2017Radio irregularity is a non-negligible phenomenon that has an impact on protocol performances. For instance, irregularity in radio range leads to asymmetric links that cause the loss of packets in different directions. In order to investigate its effect, ... More
Will SDN be part of 5G?Aug 16 2017Feb 07 2018For many, this is no longer a valid question and the case is considered settled with SDN/NFV (Software Defined Networking/Network Function Virtualization) providing the inevitable innovation enablers solving many outstanding management issues regarding ... More
Millimeter Wave Channel Measurements in a Railway DepotAug 16 2017Millimeter wave (mmWave) communication is a key enabling technology with the potential to deliver high capacity, high peak data rate communications for future railway services. Knowledge of the radio characteristics is of paramount importance for the ... More
Towards a Concurrent and Distributed Route Selection for Payment Channel NetworksAug 08 2017Payment channel networks use off-chain transactions to provide virtually arbitrary transaction rates. In this paper, we provide a new perspective on payment channels and consider them as a flow network. We propose an extended push-relabel algorithm to ... More
Delay Properties of Energy Efficient Ethernet NetworksJul 10 2017Networking operational costs and environmental concerns have lately driven the quest for energy efficient equipment. In wired networks, energy efficient Ethernet (EEE) interfaces can greatly reduce power demands when compared to regular Ethernet interfaces. ... More
Selfish Network Creation with Non-Uniform Edge CostJun 30 2017Network creation games investigate complex networks from a game-theoretic point of view. Based on the original model by Fabrikant et al. [PODC'03] many variants have been introduced. However, almost all versions have the drawback that edges are treated ... More
Convergence Results on Pulse Coupled Oscillator Protocols in Locally Connected NetworksMay 16 2017This work provides new insights on the convergence of a locally connected network of pulse coupled oscillator (PCOs) (i.e., a bio-inspired model for communication networks) to synchronous and desynchronous states, and their implication in terms of the ... More
Evaluating XMPP Communication in IEC 61499-based Distributed Energy ApplicationsMay 15 2017The IEC 61499 reference model provides an international standard developed specifically for supporting the creation of distributed event-based automation systems. Functionality is abstracted into function blocks which can be coded graphically as well ... More
When the Hammer Meets the Nail: Multi-Server PIR for Database-Driven CRN with Location Privacy AssuranceMay 02 2017We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing ... More
Tracking the Big NAT across Europe and the U.SApr 05 2017Carrier Grade NAT (CGN) mechanisms enable ISPs to share a single IPv4 address across multiple customers, thus offering an immediate solution to the IPv4 address scarcity problem. In this paper, we perform a large scale active measurement campaign to detect ... More
All-Path Routing Protocols: Analysis of Scalability and Load Balancing Capabilities for Ethernet NetworksMar 25 2017This paper presents a scalability and load balancing study of the All-Path protocols, a family of distributed switching protocols based on path exploration. ARP-Path is the main protocol and it explores every possible path reaching from source to destination ... More
Understand Your Chains: Towards Performance Profile-based Network Service ManagementMar 23 2017Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, ... More
Radial and circular synchronization clusters in extended starlike network of van der Pol oscillatorsMar 06 2017We consider extended starlike networks where the hub node is coupled with several chains of nodes representing star rays. Assuming that nodes of the network are occupied by nonidentical self-oscillators we study various forms of their cluster synchronization. ... More
Ending the Anomaly: Achieving Low Latency and Airtime Fairness in WiFiFeb 28 2017Mar 06 2017With more devices connected, delays and jitter at the WiFi hop become more prevalent, and correct functioning during network congestion becomes more important. However, two important performance issues prevent modern WiFi from reaching its potential: ... More
Cheating-Resilient Incentive Scheme for Mobile Crowdsensing SystemsJan 08 2017Mobile Crowdsensing is a promising paradigm for ubiquitous sensing, which explores the tremendous data collected by mobile smart devices with prominent spatial-temporal coverage. As a fundamental property of Mobile Crowdsensing Systems, temporally recruited ... More
TCP-aware Cross Layer Scheduling with Adaptive Modulation in IEEE 802.16 (WiMAX) NetworksDec 08 2016In this paper, we propose Transmission Control Protocol (TCP)-aware cross layer scheduling algorithms in a multipoint-to-point network such as the uplink of an IEEE 802.16 (WiMAX) network. Inadequate bandwidth allocation to a TCP flow may lead to timeout ... More
Efficient Distinct Heavy Hitters for DNS DDoS Attack DetectionDec 08 2016Motivated by a recent new type of randomized Distributed Denial of Service (DDoS) attacks on the Domain Name Service (DNS), we develop novel and efficient distinct heavy hitters algorithms and build an attack identification system that uses our algorithms. ... More
Compact CAR: Low-Overhead Cache Replacement Policy for an ICN RouterDec 08 2016Information-centric networking (ICN) has gained attention from network research communities due to its capability of efficient content dissemination. In-network caching function in ICN plays an important role to achieve the design motivation. However, ... More
Monitorability Bounds via Expander, Sparsifier and Random Walks. The Interplay Between On-Demand Monitoring and AnonymityDec 08 2016The network virtualization allows new on-demand management capabilities, in this work we demonstrate such a service, namely, on-demand efficient monitoring or anonymity. The proposed service is based on network virtualization of expanders or sparsifiers ... More
Distribution of Cell Size in Bounded Voronoi Tesselations with Application to Secure Local ConnectivityDec 07 2016In this letter, we consider the Voronoi tesselation induced by a homogeneous and stationary Poisson point process of unit density in a square. We show that the mean cell size is less than unity when the seed is located exactly at the boundary, and it ... More
Over-the-air Function Computation in Sensor NetworksDec 07 2016Many sensor applications are interested in computing a function over measurements (e.g., sum, average, max) as opposed to collecting all sensor data. Today, such data aggregation is done in a cluster-head. Sensor nodes transmit their values sequentially ... More
Consistency in the face of change: an adaptive approach to physical layer cooperationDec 06 2016Most existing works on physical-layer (PHY) cooperation (beyond routing) focus on how to best use a given, static relay network--while wireless networks are anything but static. In this paper, we pose a different set of questions: given that we have multiple ... More
Analysis and Evaluation of Real-time and Safety Characteristics of IEEE 802.11p protocol in VANETDec 06 2016The need for safety in transportation systems has increased the popularity and applicability of Vehicular Ad-Hoc Networks (VANETs) in recent years. On-time reception and processing of alarms caused by possible accidents as well as the preventive actions ... More
Broadcast Strategies and Performance Evaluation of IEEE 802.15.4 in Wireless Body Area Networks WBANDec 06 2016The rapid advances in sensors and ultra-low power wireless communication has enabled a new generation of wireless sensor networks: Wireless Body Area Networks (WBAN). To the best of our knowledge the current paper is the first to address broadcast in ... More
Throughput-Optimal Load Balancing for Intra Datacenter NetworksDec 06 2016Traffic load-balancing in datacenters alleviates hot spots and improves network utilization. In this paper, a stable in-network load-balancing algorithm is developed in the setting of software-defined networking. A control plane configures a data plane ... More
Competitive Caching of Contents in 5G Edge Cloud NetworksDec 05 2016The surge of mobile data traffic forces network operators to cope with capacity shortage. The deployment of small cells in 5G networks is meant to reduce latency, backhaul traffic and increase radio access capacity. In this context, mobile edge computing ... More
Capacity of Cooperative Vehicular Networks with Infrastructure Support: Multi-user CaseDec 05 2016Capacity of vehicular networks with infrastructure support is both an interesting and challenging problem as the capacity is determined by the inter-play of multiple factors including vehicle-to-infrastructure (V2I) communications, vehicle-to-vehicle ... More
StreamNF: Performance and Correctness for Stateful Chained NFsDec 05 2016Network functions virtualization (NFV) -- deploying network functions in software on commodity machines -- allows operators to employ rich chains of NFs to realize custom performance, security, and compliance policies, and ensure high performance by dynamically ... More
Collaborative Multi-bitrate Video Caching and Processing in Mobile-Edge Computing NetworksDec 05 2016Recently, Mobile-Edge Computing (MEC) has arisen as an emerging paradigm that extends cloud-computing capabilities to the edge of the Radio Access Network (RAN) by deploying MEC servers right at the Base Stations (BSs). In this paper, we envision a collaborative ... More
Green Networking in Cellular HetNets: A Unified Radio Resource Management Framework with Base Station ON/OFF SwitchingDec 05 2016In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption ... More
Modeling Structure and Resilience of the Dark NetworkDec 05 2016While the statistical and resilience properties of the Internet are no more changing significantly across time, the Darknet, a network devoted to keep anonymous its traffic, still experiences rapid changes to improve the security of its users. Here, we ... More
Towards a Tractable Delay Analysis in Large Wireless NetworksDec 05 2016Meeting the diverse delay requirements of next-generation wireless communication networks is one of the most critical goals of wireless system design. Though the delay of point-to-point communications has been well investigated using classical queueing ... More
New Generation Value Networks for Content DeliveryDec 05 2016In this paper we paint a broad picture of the Internet content delivery market, by taking into consideration both economical and technical challenges that might drive the interactions among the stakeholders in the future. We focus on a few disrupting ... More
Throughput of Infrastructure-based Cooperative Vehicular NetworksDec 05 2016In this paper, we provide detailed analysis of the achievable throughput of infrastructure-based vehicular network with a finite traffic density under a cooperative communication strategy, which explores combined use of vehicle-to-infrastructure (V2I) ... More
Improving congestion control for Concurrent Multipath Transfer through bandwidth estimation based resource poolingDec 03 2016Stream Control Transmission Protocol (SCTP) was introduced in 2001 as a multipath variant to traditional transport protocols, i.e. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Concurrent Multipath Transfer (CMT) has been proposed ... More
On The Fundamental Energy Tradeoffs of Geographical Load BalancingDec 02 2016Geographical load balancing can optimize the utilization of green energy and the cost of electricity by taking the advantages of green and price diversities at geographical dispersed data centers. However, higher green energy utilization or lower electricity ... More
Maximal Sections of Sheaves of Data over an Abstract Simplicial ComplexDec 01 2016We employ techniques from topological data analysis to model sensor networks. Our approach to sensor integration uses the topological method of sheaves over cell complexes. The internal consistency of data from individual sensors is determined by a set ... More
Performance Evaluation of Caching Policies in NDN - an ICN ArchitectureDec 01 2016Information Centric Networking (ICN) advocates the philosophy of accessing the content independent of its location. Owing to this location independence in ICN, the routers en-route can be enabled to cache the content to serve the future requests for the ... More
Comparison Between IPv4 to IPv6 Transition TechniquesDec 01 2016The IPv4 addresses exhaustion demands a protocol transition from IPv4 to IPv6. The original transition technique, the dual stack, is not widely deployed yet and it demanded the creation of new transition techniques to extend the transition period. This ... More
Towards Hierarchical Mobile Edge Computing: An Auction-Based Profit Maximization ApproachDec 01 2016The multi-tiered concept of Internet of Things (IoT) devices, cloudlets and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage and communications ... More
Learning Radio Resource Management in 5G Networks: Framework, Opportunities and ChallengesNov 30 2016The fifth generation (5G) of mobile broadband shall be a far more complex system compared to earlier generations due to advancements in radio and network technology, increased densification and heterogeneity of network and user equipment, larger number ... More
Anticipating Moves to Prevent Botnet Generated DDoS Flooding AttacksNov 30 2016Volumetric Distributed Denial of Service (DDoS) attacks have been a recurrent issue on the Internet. These attacks generate a flooding of fake network traffic to interfere with targeted servers or network links. Despite many efforts to detect and mitigate ... More
Stub Wireless Multi-hop Networks using Self-configurable Wi-Fi Basic Service Set CascadingNov 29 2016The increasing trend in wireless Internet access has been boosted by IEEE 802.11. However, the application scenarios are still limited by its short radio range. Stub Wireless Multi-hop Networks (WMNs) are a robust, flexible, and cost-effective solution ... More
Software-Defined Silicon Photonics based Metro Node for Flexible Superchannel SwitchingNov 29 2016Due to the growing popularity of optical superchannels and software defined networking, reconfigurable optical add-drop multiplexer (ROADM) architectures for superchannel switching have recently attracted significant attention. ROADMs based on micro electro-mechanical ... More
Mitigation of relative intensity noise of Quantum Dash mode-locked lasers for PAM4 based optical interconnects using encoding techniquesNov 29 2016Quantum Dash (Q-Dash) Passively Mode-Locked Lasers (PMLLs) exhibit significant low frequency Relative Intensity Noise (RIN), due to the high Mode Partition Noise (MPN), which prevents the implementation of multilevel amplitude modulation formats such ... More
A Fair Relay Selection Scheme for a DF Cooperative Network With Spatially Random RelaysNov 29 2016A new, fair relay selection scheme is proposed for a dual-hop decode-and-forward network with randomly-distributed relays. Most of the reported works in the literature achieve fairness at the expense of degrading the outage probability performance. In ... More
Congestion-Free Rerouting of Flows on DAGsNov 28 2016We initiate the theoretical study of a fundamental practical problem: how to schedule the congestion-free rerouting of $k$ flows? The input to our problem are $k$ path pairs: for each of the $k$ unsplittable flows (of a certain demand), there is an old ... More
Optimal Resource Allocation for Mobile Edge Computing-Based Augmented Reality ApplicationsNov 28 2016Mobile edge computing enables the provision of computationally demanding Augmented Reality (AR) applications on mobile devices. AR mobile applications have inherent collaborative properties in terms of data collection in the uplink, computing at the edge, ... More
What is a Fog Node A Tutorial on Current Concepts towards a Common DefinitionNov 28 2016Fog computing has emerged as a promising technology that can bring the cloud applications closer to the physical IoT devices at the network edge. While it is widely known what cloud computing is, and how data centers can build the cloud infrastructure ... More
Scalable Fine-grained Path Control in Software Defined NetworksNov 28 2016The OpenFlow-based SDN is widely studied to better network performance through planning fine-grained paths. However, being designed to configure path hop-by-hop, it faces the scalability issue that both the flow table overhead and path setup delay are ... More
Security Management Model in Cloud Computing EnvironmentNov 27 2016In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper ... More
Green Wireless Sensor Networks with Wireless Power TransferNov 26 2016An energy cooperation policy for energy harvesting wireless sensor networks (WSNs) with wireless power transfer is proposed in this paper to balance the energy at each sensor node and increase the total energy utilization ratio of the whole WSNs. Considering ... More
Machine-to-Machine (M2M) Communications in Software-defined and Virtualized Cellular NetworksNov 26 2016Machine-to-machine (M2M) communications have attracted great attention from both academia and industry. In this paper, with recent advances in wireless network virtualization and software-defined networking (SDN), we propose a novel framework for M2M ... More
Multi-hop Communication in the Uplink for LPWANsNov 26 2016Low-Power Wide Area Networks (LPWANs) have arisen as a promising communication technology for supporting Internet of Things (IoT) services due to their low power operation, wide coverage range, low cost and scalability. However, most LPWAN solutions like ... More
Truthful Spectrum Auction for Efficient Anti-Jamming in Cognitive Radio NetworksNov 26 2016One significant challenge in cognitive radio networks is to design a framework in which the selfish secondary users are obliged to interact with each other truthfully. Moreover, due to the vulnerability of these networks against jamming attacks, designing ... More
Dual MCDRR Scheduler for Hybrid TDM/WDM Optical NetworksNov 26 2016In this paper we propose and investigate the performance of a dual multi-channel deficit round-robin (D-MCDRR) scheduler based on the existing single MCDRR scheduler. The existing scheduler is used for multiple channels with tunable transmitters and fixed ... More
Optimal Control for Generalized Network-Flow ProblemsNov 26 2016We consider the problem of throughput-optimal packet dissemination, in the presence of an arbitrary mix of unicast, broadcast, multicast and anycast traffic, in a general wireless network. We propose an online dynamic policy, called Universal Max-Weight ... More
User Point Processes in Cellular NetworksNov 25 2016The point process of concurrent users is critical for the analysis of cellular networks, in particular for the uplink and for full-duplex communication. We analyze the properties of two popular models. For the first one, we provide an accurate characterization ... More
Joint Throughput Maximization and Power Control in Poisson CoopMAC NetworksNov 25 2016A cooperative medium access control (CoopMAC) network with randomly distributed helpers is considered. We introduce a new helper selection scheme which maximizes the average throughput while maintaining a low power consumption profile in the network. ... More
How Close to the Edge? Delay/utilization tradeoffs in MECNov 25 2016Virtually all of the rapidly increasing data traffic consumed by mobile users requires some kind of processing, normally performed at cloud servers. A recent thrust, {\em mobile edge computing}, moves such processing to servers {\em within} the cellular ... More
Global optimization framework for real-time route guidance via variable message signNov 25 2016Variable message sign (VMS) is an effective traffic management tool for congestion mitigation. The VMS is primarily used as a means of providing factual travel information or genuine route guidance to travelers. However, this may be rendered sub-optimal ... More
The Impact of Vehicular Traffic Demand on 5G Caching Architectures: a Data-Driven StudyNov 24 2016The emergence of in-vehicle entertainment systems and self-driving vehicles, and the latter's need for high-resolution, up-to-date maps, will bring a further increase in the amount of data vehicles consume. Considering how difficult WiFi offloading in ... More
Compressive Data Aggregation on Mobile Wireless Sensor Networks for Sensing in Bike RacesNov 24 2016-This paper presents an efficient approach to data collection in mobile wireless sensor networks, with the specific application of sensing in bike races. Recent sensor technology permits to track GPS position of each bike. Because of the inherent correlation ... More
Interference alignment for downlink cellular networks: Joint scheduling and precodingNov 24 2016Interference Alignment (IA) is technique that, in a large sense, makes use of the increasing signal dimensions available in the system through MIMO and OFDM technologies in order to globally reduce the interference suffered by users in a network. In this ... More