Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 24, Issue 2April 2016
Reflects downloads up to 03 Sep 2024Bibliometrics
research-article
Budget-feasible online incentive mechanisms for crowdsourcing tasks truthfully

Mobile crowd sensing (MCS) is a new paradigm that takes advantage of pervasive mobile devices to efficiently collect data, enabling numerous novel applications. To achieve good service quality for an MCS application, incentive mechanisms are necessary ...

research-article
Duplicate detectable opportunistic forwarding in duty-cycled wireless sensor networks

Opportunistic routing, offering relatively efficient and adaptive forwarding in low-duty-cycled sensor networks, generally allows multiple nodes to forward the same packet simultaneously, especially in networks with intensive traffic. Uncoordinated ...

research-article
Has time come to switch from duty-cycled mac protocols to wake-up radio for wireless sensor networks?

Duty-cycled Medium Access Control (MAC) protocols certainly improve the energy efficiency of wireless networks. However, most of these protocols still suffer from severe degrees of overhearing and idle listening. These two issues prevent optimum energy ...

research-article
Anonymity and fairness in packet scheduling: a quantitative tradeoff

Fairness among multiple users sharing a common resource is an important criterion in the design and evaluation of scheduling algorithms in networks. Anonymous networking, where sources of transmitted packets are undecipherable to an eavesdropper, ...

research-article
An efficient tag search protocol in large-scale RFID systems with noisy channel

Radio frequency identification (RFID) technology has many applications in inventory management, supply chain, product tracking, transportation, and logistics. One research issue of practical importance is to search for a particular group of tags in a ...

research-article
A framework for dynamic network architecture and topology optimization

A new paradigm in wireless network access is presented and analyzed. In this concept, certain classes of wireless terminals can be turned temporarily into an access point (AP) anytime while connected to the Internet. This creates a dynamic network ...

research-article
Internet with transient destination-controlled addressing

Today's Internet makes hosts and individual networks inherently insecure because permanent addresses turn destinations into permanent attack targets. This paper describes an Evasive Internet Protocol (EIP), a change to the data plane of the Internet ...

research-article
Energy-efficient ip core network configuration under general traffic demands

We consider the problem of minimizing the power consumption of IP core networks by means of power aware configuration of the Points of Presence (PoPs), given general traffic demands on the links. Although the problem is in general NP-complete, we give ...

research-article
Distributed stochastic optimization via correlated scheduling

This paper considers a problem where multiple devices make repeated decisions based on their own observed events. The events and decisions at each time-step determine the values of a utility function and a collection of penalty functions. The goal is to ...

research-article
Detecting malicious facebook applications

With 20 million installs a day [1], third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant,...

research-article
Analog network coding without restrictions on superimposed frames

The applicability of analog network coding (ANC) to a wireless network is constrained by several limitations: 1) some ANC schemes demand fine-grained frame-level synchronization, which cannot be practically achieved in a wireless network; 2) others ...

research-article
Code-based neighbor discovery protocols in mobile wireless networks

In mobile wireless networks, the emerging proximity-based applications have led to the need for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in the symmetric ...

research-article
Optimal rate allocation for video streaming in wireless networks with user dynamics
Pages 820–835

We consider the problem of optimal rate allocation and admission control for adaptive video streaming sessions in wireless networks with user dynamics. The central aim is to achieve an optimal tradeoff between several key objectives: maximizing the ...

research-article
Online coded caching
Pages 836–845

We consider a basic content distribution scenario consisting of a single origin server connected through a shared bottleneck link to a number of users each equipped with a cache of finite memory. The users issue a sequence of content requests from a set ...

research-article
Geneprint: generic and accurate physical-layer identification for UHF RFID tags

Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authenticity and security guarantee. Prior physical-layer identification techniques on radio frequency identification (RFID) tags require ...

research-article
Cooperative routing with relay assignment in multiradio multihop wireless networks

Cooperative communication (CC) for wireless networks has gained a lot of recent interests. It has been shown that CC has the potential to significantly increase the capacity of wireless networks, with its ability of mitigating fading by exploiting ...

research-article
Fair network bandwidth allocation in iaas datacenters via a cooperative game approach

With wide application of virtualization technology, tenants are able to access isolated cloud services by renting the shared resources in Infrastructure-as-a-Service (IaaS) datacenters. Unlike resources such as CPU and memory, datacenter network, which ...

research-article
Real-time verification of network properties using atomic predicates

Network management will benefit from automated tools based upon formal methods. Several such tools have been published in the literature. We present a new formal method for a new tool, Atomic Predicates (AP) Verifier, which is much more time and space ...

research-article
iBUS: an integrated beamformer and uplink scheduler for OFDMA small cells

Beamforming is a signal processing technique with numerous benefits in wireless communication. Unlike traditional omnidirectional communication, it focuses the energy of the transmitted and/or the received signal in a particular direction. Although ...

research-article
FluidNet: a flexible cloud-based radio access network for small cells
Pages 915–928

Cloud-based radio access networks (C-RAN) have been proposed as a cost-efficient way of deploying small cells. Unlike conventional RANs, a C-RAN decouples the baseband processing unit (BBU) from the remote radio head (RRH), allowing for centralized ...

research-article
Least cost influence maximization across multiple social networks

Recently, in online social networks (OSNs), the least cost influence (LCI) problem has become one of the central research topics. It aims at identifying a minimum number of seed users who can trigger a wide cascade of information propagation. Most of ...

research-article
Optimal power control in rayleigh-fading heterogeneous wireless networks

Heterogeneous wireless networks provide varying degrees of network coverage in a multi-tier configuration in which low-powered small cells are used to enhance performance. Due to the ad-hoc deployment of small cells, optimal resource allocation is ...

research-article
Enhancing the delay performance of dynamic backpressure algorithms

For general multi-hop queueing networks, delay optimal network control has unfortunately been an outstanding problem. The dynamic backpressure (BP) algorithm elegantly achieves throughput optimality, but does not yield good delay performance in general. ...

research-article
Finding nonequivalent classifiers in boolean space to reduce tcam usage

Packet classification is one of the major challenges today in designing high-speed routers and firewalls, as it involves sophisticated multi-dimensional searching. Ternary content addressable memory (TCAM) has been widely used to implement packet ...

research-article
When heavy-tailed and light-tailed flows compete: the response time tail under generalized max-weight scheduling

This paper focuses on the design and analysis of scheduling policies for multi-class queues, such as those found in wireless networks and high-speed switches. In this context, we study the response-time tail under generalized max-weight policies in ...

research-article
Enhancing mobile video capacity and quality using rate adaptation, ran caching and processing

Adaptive Bit Rate (ABR) streaming has become a popular video delivery technique, credited with improving Quality of Experience (QoE) of videos delivered on wireless networks. Recent independent research reveals video caching in the Radio Access Network (...

research-article
Private and verifiable interdomain routing decisions

Existing secure interdomain routing protocols can verify validity properties about individual routes, such as whether they correspond to a real network path. It is often useful to verify more complex properties relating to the route decision procedure --...

research-article
Exploiting double opportunities for latency-constrained content propagation in wireless networks
Pages 1025–1037

In this paper, we focus on a mobile wireless network comprising a powerful communication center and a multitude of mobile users. We investigate the propagation of latency-constrained content in the wireless network characterized by heterogeneous (time-...

research-article
A traffic load balancing framework for software-defined radio access networks powered by hybrid energy sources

Dramatic mobile data traffic growth has spurred a dense deployment of small cell base stations (SCBSs). Small cells enhance the spectrum efficiency and thus enlarge the capacity of mobile networks. Although SCBSs consume much less power than macro BSs (...

research-article
Fast and scalable counterfeits estimation for large-scale RFID systems

Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address scalability issue in batch authentications. Deterministic approaches verify tags one by one, ...

Subjects

Currently Not Available

Comments