EURECOM

Displaying 21 - 30 of 100 results

  • Power Monitor V2: Novel PowEr Saving Android Application

    White Papers // Apr 2013 // provided by EURECOM

    This paper presents a novel scheme to derive power saving profiles based on the usage patterns of the Android devices. The entire architecture is developed as an Android app "Power Monitor v2" and is deployed to the smart devices. A monitoring module of the app periodically collects several data from ...

    Download Now
  • Broadcasting User Content Over Novel Mobile Networks

    White Papers // Apr 2013 // provided by EURECOM

    In the "Youtube Era", mobile consumption of video, such as Video on Demand (VoD) and User Generated Content (UGC), has been steadily increasing. However, mobile networks are showing to be unprepared for such phenomenal traffic volume, whereas the devices' multiple interfaces are being exploited to address this problem. As such, ...

    Download Now
  • An Architecture to Aggregate Heterogeneous and Semantic Sensed Data

    White Papers // Mar 2013 // provided by EURECOM

    Sensor networks are used in a great deal of realms such as home monitoring, environmental monitoring (e.g., weather forecasting), health monitoring (e.g., pacemaker, brain waves), vehicular networks, etc. The authors are surrounding by sensor networks such as healthcare, home or environmental monitoring, weather forecasting, etc. All sensor-based applications proposed are ...

    Download Now
  • The DoF of Network MIMO With Backhaul Delays

    White Papers // Mar 2013 // provided by EURECOM

    The authors consider the problem of downlink precoding for Network (multi-cell) MIMO networks where Transmitters (TXs) are provided with imperfect Channel State Information (CSI). Specifically, each TX receives a delayed channel estimate with the delay being specific to each channel component. This model is particularly adapted to the scenarios where ...

    Download Now
  • A P2P Based Usage Control Enforcement Scheme Resilient to Re-injection Attacks

    White Papers // Mar 2013 // provided by EURECOM

    Existing privacy controls based on access control techniques do not prevent massive dissemination of private data by malevolent acquaintances of social network, unauthorized duplication of files or personal messages, or persistence of some files in third-party operated storage beyond their deletion by their owners. The authors suggest a usage control ...

    Download Now
  • On the Value of Spectrum Sharing Among Operators in Multicell Networks

    White Papers // Feb 2013 // provided by EURECOM

    This paper considers the benefits of allowing spectrum sharing among co-located wireless service providers operating in the same multi-cell network. Although spectrum sharing was shown to be valuable in some scenarios where the created interference can be eliminated, the benefits have not clearly shown for multi-cell networks with aggressive reuse. ...

    Download Now
  • Optimal Combining of Instantaneous and Statistical CSI in the SIMO Interference Channel

    White Papers // Feb 2013 // provided by EURECOM

    The uplink of the two-user multiple-antenna interference channel is considered and the optimal (in the ergodic rate sense) BeamForming (BF) problem is posed and solved. Specifically, a feedback scenario is studied whereby a Base Station (BS) is allowed to estimate the instantaneous channel vector information from the users it serves, ...

    Download Now
  • Decontaminating Pilots in Massive MIMO Systems

    White Papers // Feb 2013 // provided by EURECOM

    Pilot contamination is known to severely limit the performance of large-scale antenna ("Massive MIMO") systems due to degraded channel estimation. This paper proposes a twofold approach to this problem. First, the authors show analytically that pilot contamination can be made to vanish asymptotically in the number of antennas for a ...

    Download Now
  • T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags

    White Papers // Jan 2013 // provided by EURECOM

    One prominent application of RFID technology is the automation of safety inspections when transporting hazardous goods such as highly reactive chemicals in supply chains. Here, it is dangerous to place specific, reactive chemicals close to each other, because small leaks can already result in a threat to the life of ...

    Download Now
  • Secure Product Tracking in Supply Chain

    White Papers // Jan 2013 // provided by EURECOM

    In this paper, the authors propose a secure and efficient product tracking mechanism implemented using wireless sensor nodes. This mechanism aims at tracking goods, and actions performed by each actor of the supply chain, while preserving the actors' privacy. Their solution is based on generating identifiers of the actors and ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?