Indian Institute of Science

Displaying 1-40 of 109 results

  • White Papers // Jan 2014

    Prediction of Queue Waiting Times for Metascheduling on Parallel Batch Systems

    Prediction of queue waiting times of jobs submitted to production parallel batch systems is important to provide overall estimates to users and can also help meta-schedulers make scheduling decisions. In this paper, the authors have developed a framework for predicting ranges of queue waiting times for jobs by employing multi-class...

    Provided By Indian Institute of Science

  • White Papers // Dec 2013

    An Improved Outer Bound on the Storage-Repair-Bandwidth Tradeoff of Exact-Repair Regenerating Codes

    In this paper, the authors establish an improved outer bound on the storage-repair-bandwidth tradeoff of regenerating codes under exact repair. The result shows that in particular, it is not possible to construct exact-repair regenerating codes that asymptotically achieve the tradeoff that holds for functional repair. While this had been shown...

    Provided By Indian Institute of Science

  • White Papers // Oct 2013

    A Closer Look at Multiple-Forking: Leveraging (In)dependence for a Tighter Bound

    The machinery of oracle replay attack of Pointcheval and Stern [PS00] plays a pivotal role in the security argument of a large class of signature schemes [ElG85, Sch91, Oka93]. In the basic version of replay attack, one runs the adversary twice on related inputs in order to solve the underlying...

    Provided By Indian Institute of Science

  • White Papers // Jul 2013

    A Markov Decision Theoretic Approach to Pilot Allocation and Receive Antenna Selection

    In this paper, the authors considers Antenna Selection (AS) at a receiver equipped with multiple antenna elements but only a single radio frequency chain for packet reception. As information about the channel state is acquired using training symbols (pilots), the receiver makes its AS decisions based on noisy channel estimates....

    Provided By Indian Institute of Science

  • White Papers // Apr 2013

    Capacity Bounds for the Gaussian X Channel

    The authors consider bounds for the capacity region of the Gaussian X Channel (XC), a system consisting of two transmit-receive pairs, where each transmitter communicates with both the receivers. They first classify the XC into two classes, the strong XC and the mixed XC. In the strong XC, either the...

    Provided By Indian Institute of Science

  • White Papers // Mar 2013

    Perormance Analysis of a Node Monitoring Protocol in Ubiquitous Networks

    The proliferation of the ubiquitous applications in different sphere of life like ubiquitous health monitoring system, and ubiquitous learning system demands the network monitoring, to check whether the nodes are getting the promised resources and inputs. Dynamicity and heterogeneity of the ubiquitous network adds challenges to the monitoring of a...

    Provided By Indian Institute of Science

  • White Papers // Mar 2013

    Measurement Based Impromptu Deployment of a Multi-Hop Wireless Relay Network

    The authors study the problem of optimal sequential ("As-you-go") deployment of wireless relay nodes, as a person walks along a line of random length (with a known distribution). The objective is to create an impromptu multi-hop wireless network for connecting a packet source to be placed at the end of...

    Provided By Indian Institute of Science

  • White Papers // Mar 2013

    Wireless Network-Coded Multi-Way Relaying Using Latin Hyper-Cubes

    The two-stage protocol for physical layer network coding for the two-way relay channel first introduced in 2006, exploits the multiple access interference occurring at the relay so that the communication between the end nodes can be done using a two stage protocol. The paper deals with the information theoretic studies...

    Provided By Indian Institute of Science

  • White Papers // Mar 2013

    Improved IDS Using Layered CRFS With Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour

    With the ever increasing number and diverse type of attacks, including new and previously unseen attacks, the effectiveness of an intrusion detection system is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more...

    Provided By Indian Institute of Science

  • White Papers // Feb 2013

    SC-FDMA for Multiuser Communication on the Downlink

    Single-Carrier Frequency Division Multiple Access (SC-FDMA) has become a popular alternative to Orthogonal Frequency Division Multiple Access (OFDMA) in multiuser communication on the uplink. This is mainly due to the low Peak-to-Average Power Ratio (PAPR) of SC-FDMA compared to that of OFDMA. Long-Term Evolution (LTE) uses SC-FDMA on the uplink...

    Provided By Indian Institute of Science

  • White Papers // Jan 2013

    Language Based Security for Smartphones

    Install time permission model used in android, may provide users a control over their privacy and security and may reduce the impact of bugs and vulnerabilities in applications; however such a model becomes ineffective if users are uninformed about the behavior of these applications and their potential harms once an...

    Provided By Indian Institute of Science

  • White Papers // Jan 2013

    A Combinatorial Family of Near Regular LDPC Codes

    An elementary combinatorial Tanner graph construction for a family of near-regular Low Density Parity Check (LDPC) codes achieving high girth is presented. These codes are near regular in the sense that the degree of a left/right vertex is allowed to differ by at most one from the average. The construction...

    Provided By Indian Institute of Science

  • White Papers // Dec 2012

    Distributed Co-Phasing for Binary Consensus in Wireless Sensor Networks

    The authors address the problem of binary consensus over noisy, fading channels. They propose a new transmission model using Distributed Co-phasing that ensures the system to reach accurate consensus quite efficiently. They propose a simple linear update rule at nodes based on LMMSE and see that its performance is close...

    Provided By Indian Institute of Science

  • White Papers // Dec 2012

    Adaptive Scheduling in Real-Time Systems Through Period Adjustment

    Real-time system technology traditionally developed for safety critical systems, has now been extended to support multimedia systems and virtual reality. A large number of real-time application, related to multimedia and adaptive control system, require more flexibility than classical real-time theory usually permits. This paper proposes an efficient adaptive scheduling framework...

    Provided By Indian Institute of Science

  • White Papers // Dec 2012

    Information Capacity of an Energy Harvesting Sensor Node

    Energy harvesting sensor nodes are gaining popularity due to their ability to improve the network life time and are becoming a preferred choice supporting "Green Communication". In this paper, the authors focus on communicating reliably over an AWGN channel using such an energy harvesting sensor node. An important part of...

    Provided By Indian Institute of Science

  • White Papers // Dec 2012

    Throughput Analysis of Primary and Secondary Networks in a Shared IEEE 802.11 System

    In this paper, the authors analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, they consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the...

    Provided By Indian Institute of Science

  • White Papers // Nov 2012

    Resource Usage Monitoring in Clouds

    Monitoring of infrastructural resources in clouds plays a crucial role in providing application guarantees like performance, availability, and security. Monitoring is crucial from two perspectives - the cloud-user and the service provider. The cloud user's interest is in doing an analysis to arrive at appropriate Service-Level Agreement (SLA) demands and...

    Provided By Indian Institute of Science

  • White Papers // Oct 2012

    IceCube: Efficient Targeted Mining in Data Cubes

    In this paper, the authors address the problem of Targeted Association Rule Mining (TARM) over complex multi-dimensional market-basket data cubes. Their goal here is to extend traditional association rule mining to capture targeted rules that apply to specific customer segments. Thus, the minimum support for rules in a particular segment...

    Provided By Indian Institute of Science

  • White Papers // Sep 2012

    Modelling and Analysis of New Coolstreaming for P2P IPTV

    Peer to peer networks are being used extensively nowadays for file sharing, video on demand and live streaming. For IPTV, delay deadlines are more stringent compared to file sharing. Cool-streaming was the first P2P IPTV system. In this paper, the authors model New Cool-streaming (newer version of Cool-streaming) via a...

    Provided By Indian Institute of Science

  • White Papers // Sep 2012

    Bounds on the Sum-Rate Capacity of the Gaussian MIMO X Channel

    The authors consider the MIMO X Channel (XC), a system consisting of two transmit-receive pairs, where each transmitter communicates with both the receivers. Both the transmitters and receivers are equipped with multiple antennas. First, they derive an upper bound on the sum-rate capacity of the MIMO XC under individual power...

    Provided By Indian Institute of Science

  • White Papers // Aug 2012

    Decode-and-Forward Relay Beamforming for Secrecy With Imperfect CSI and Multiple Eavesdroppers

    Wireless transmissions, by their very nature, are vulnerable to eavesdropping. There has been considerable interest in the use of physical layer mechanisms to provide secure communications, whereby the eavesdropper gets no information while the intended receiver gets the information reliably. Wyner's work on secrecy capacity of discrete memoryless wiretap channels...

    Provided By Indian Institute of Science

  • White Papers // Jul 2012

    Factor Graph Based Joint Detection/Decoding for LDPC Coded Large-MIMO Systems

    In this paper, the authors employ message passing algorithms over graphical models to jointly detect and decode symbols transmitted over large Multiple-Input Multiple-Output (MIMO) channels with Low Density Parity Check (LDPC) coded bits. They adopt a factor graph based technique to integrate the detection and decoding operations. A Gaussian approximation...

    Provided By Indian Institute of Science

  • White Papers // Jul 2012

    Frequency Domain Turbo Equalization for MIMO-CPSC Systems With Large Delay Spreads

    In this paper, the authors consider low-complexity turbo equalization for Multiple-Input Multiple-Output (MIMO) Cyclic Prefixed Single Carrier (CPSC) systems in MIMO Inter-Symbol Interference (ISI) channels characterized by large delay spreads. A low-complexity graph based equalization is carried out in the frequency domain. Because of the reduction in correlation among the...

    Provided By Indian Institute of Science

  • White Papers // Jun 2012

    Secure Compute-and-Forward in a Bidirectional Relay

    Bidirectional relaying, where a relay helps two user nodes to exchange messages has been an active area of recent research. In the compute-and-forward strategy for bidirectional relaying, the relay computes a function of the two messages using the naturally-occurring sum of symbols simultaneously transmitted by user nodes in a Gaussian...

    Provided By Indian Institute of Science

  • White Papers // Jun 2012

    Analyzing Plan Diagrams of XQuery Optimizers

    The automated optimization of declarative user queries is a classical hallmark of database technology. XML, with its support for deep data hierarchies and powerful query operators, including regular expressions and sibling axes, renders the query optimization challenge significantly more complex. In this paper, the authors analyze the behavior of industrial-strength...

    Provided By Indian Institute of Science

  • White Papers // May 2012

    Diversity-Rate Trade-Off for Fading Channels With Power Control

    The authors consider a complex, additive, white Gaussian noise channel with flat fading. They study its diversity order vs transmission rate for some known power allocation schemes. The capacity region is divided into three regions. For one power allocation scheme, the diversity order is exponential throughout the capacity region. For...

    Provided By Indian Institute of Science

  • White Papers // May 2012

    LoadIQ: Learning to Identify Workload Phases From a Live Storage Trace

    Storage infrastructure in large-scale cloud data center environments must support applications with diverse, time-varying data access patterns while observing the quality of service. Deeper storage hierarchies induced by solid state and rotating media are enabling new storage management tradeoffs that do not apply uniformly to all application phases at all...

    Provided By Indian Institute of Science

  • White Papers // Apr 2012

    A Novel MCMC Algorithm for Near-Optimal Detection in Large-Scale Uplink Mulituser MIMO Systems

    In this paper, the authors propose a low-complexity algorithm based on Markov Chain Monte Carlo (MCMC) technique for signal detection on the uplink in large scale multiuser Multiple Input Multiple Output (MIMO) systems with tens to hundreds of antennas at the Base Station (BS) and similar number of uplink users....

    Provided By Indian Institute of Science

  • White Papers // Apr 2012

    Capacity of a Gaussian MAC with Energy Harvesting Transmit Nodes

    The authors consider a Gaussian Multiple Access Channel (GMAC) where the users are sensor nodes powered by energy harvesters. The energy harvesters may have finite or infinite buffer to store the harvested energy. First, they find the capacity region of a GMAC powered by transmit nodes with an infinite energy...

    Provided By Indian Institute of Science

  • White Papers // Apr 2012

    Relay Selection With Channel Probing for Geographical Forwarding in WSNs

    In a large Wireless Sensor Network (WSN) with sleep-wake cycling nodes, the authors are interested in the local decision problem faced by a node that has "Custody" of a packet and has to choose one among a set of next-hop relay nodes. Each of the relays is associated with a...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Wireless Network-Coded Three-Way Relaying Using Latin Cubes

    The design of modulation schemes for the physical layer network-coded three-way wireless relaying scenario is considered. The protocol employs two phases: Multiple Access (MA) phase and BroadCast (BC) phase with each phase utilizing one channel use. For the two-way relaying scenario, it was observed by Koike-Akino et al., that adaptively...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Performance Analysis of Adaptive Physical Layer Network Coding for Wireless Two-Way Relaying

    The analysis of modulation schemes for the physical layer network-coded two way relaying scenario is presented which employs two phases: Multiple access (MA) phase and BroadCast (BC) phase. It was shown by Koike-Akino et. al. that adaptively changing the network coding map used at the relay according to the channel...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    On Secrecy Above Secrecy Capacity

    Information theoretic security is being widely studied in recent times. It provides fundamental limits of secret communication. Unlike in cryptography, the information theoretic techniques are not based on complexity of computational hardness of certain problems. Information theoretic security can also be used in a system in addition to cryptographic techniques...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Performance Analysis of Deterministic Key Allocation Schemes for Wireless Sensor Networks

    Because of the resource-constrained nature of Wireless Sensor Networks (WSNs), it is easier to use a security system based on symmetric key cryptography. However, the distribution and management of cryptographic keys pose challenges of their own. In this paper, the authors study some deterministic methods of distribution of keys to...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Wireless Network Coding for MIMO Two-Way Relaying Using Latin Rectangles

    The authors consider the two-way wireless relaying scenario shown with multiple antennas at the nodes, where data transfer takes place between the nodes A and B with the help of the relay R. It is assumed that all the three nodes operate in half-duplex mode, i.e., they cannot transmit and...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Cooperative Particle Swarm Optimization Based Receiver for Large-Dimension MIMO-ZPSC Systems

    In this paper, the authors propose a Cooperative Particle Swarm Optimization (CPSO) based channel estimation/equalization scheme for Multiple-Input Multiple-Output Zero-Padded Single-Carrier (MIMO-ZPSC) systems with large dimensions in frequency selective channels. They estimate the channel state information at the receiver in time domain using a PSO based algorithm during training phase....

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Optimal Node Selection Using Estimated Data Accuracy Model in Wireless Sensor Networks

    One of the major task of wireless sensor network is to sense accurate data from the physical environment. Hence in this paper, the authors develop an estimated data accuracy model for randomly deployed sensor nodes which can sense more accurate data from the physical environment. They compare their results with...

    Provided By Indian Institute of Science

  • White Papers // Jan 2012

    Performance Modeling and Architecture Exploration of Network Processors

    In this paper, the authors propose a Petri net model for a commercial network processor (Intel IXP architecture) which is a multithreaded multiprocessor architecture. They consider and model three different applications viz., IPv4 forwarding, network address translation, and IP security running on IXP 2400/2850. A salient feature of the Petri...

    Provided By Indian Institute of Science

  • White Papers // Jan 2012

    Wireless Network-Coded Accumulate-Compute and Forward Two-Way Relaying

    The design of modulation schemes for the physical layer network-coded two way wireless relaying scenario is considered. It was observed by Koike-Akino et al. for the two way relaying scenario, that adaptively changing the network coding map used at the relay according to the channel conditions greatly reduces the impact...

    Provided By Indian Institute of Science

  • White Papers // Jan 2012

    State Dependent Attempt Rate Modeling of Single Cell IEEE 802.11 WLANs With Homogeneous Nodes and Poisson Arrivals

    Analytical models of IEEE 802.11-based WLANs are invariably based on approximations, such as the well-known mean-field approximations proposed by Bianchi for saturated nodes. In this paper, the authors provide a new approach for modeling the situation when the nodes are not saturated. They study a State Dependent Attempt Rate (SDAR)...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    Performance Analysis of Wireless Ad-Hoc Networks

    With the growing importance of wireless ad hoc networks (particularly, in applications such as wireless local area networks, and ad hoc sensor networks) it is important to develop an understanding of their performance. Performance analysis of wireless ad hoc networks is a challenging task owing to the fact that such...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    Obstacle Constrained Total Area Coverage in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of a large number of tiny, low-powered devices, called sensors, which communicate with each other (possibly) in a multi-hop fashion. These sensors suffer from severe constraints, such as low reliability and limited battery power (or energy), processing power, storage memory, sensing range and communication...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    On Network-Error Correcting Convolutional Codes Under the BSC Edge Error Model

    The performance of CNECCs under the BSC edge error model has been analyzed using theoretical bounds and simulations. A sufficient upper bound on the edge cross-over probability pe has been obtained, so that if pe is below this bound, the complexity of analysis can be reduced greatly by considering only...

    Provided By Indian Institute of Science

  • White Papers // Nov 2010

    Distributed Construction of the Critical Geometric Graph in Dense Wireless Sensor Networks

    Wireless sensor networks are often modeled in terms of a dense deployment of smart sensor nodes in a two-dimensional region. Given a node deployment, the Critical Geometric Graph (CGG) over these locations (i.e., the connected Geometric Graph (GG) with the smallest radius) is a useful structure since it provides the...

    Provided By Indian Institute of Science

  • White Papers // Mar 2011

    A Transform Approach to Linear Network Coding for Acyclic Networks With Delay

    Network coding was introduced in as a means to improve the rate of transmission in networks. Linear network coding was introduced in and it was found to be sufficient to achieve the maxflow-mincut capacity in certain scenarios such as multicast. The existence problem of network coding for networks without delay...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Analytical Modeling of Saturation Throughput in Power Save Mode of an IEEE 802.11 Infrastructure WLAN

    The authors consider a single STAtion (STA) in the Power Save Mode (PSM) of an IEEE 802.11 infrastructure WLAN. This STA is assumed to be carrying uplink and downlink traffic via the Access Point (AP). The authors assume that the transmission queues of the AP and the STA are saturated,...

    Provided By Indian Institute of Science

  • White Papers // Oct 2010

    A Novel Algorithm for Cooperative Distributed Sequential Spectrum Sensing in Cognitive Radio

    Presently there is a scarcity of wireless spectrum worldwide due to an increase in wireless services. Cognitive Radios are proposed as a solution to this problem. They access the spectrum licensed to existing communication services (primary users) opportunistically and dynamically without causing much interference to the primary users. This is...

    Provided By Indian Institute of Science

  • White Papers // Oct 2010

    Secrecy Capacity of the Gaussian Wire-Tap Channel With Finite Complex Constellation Input

    The secrecy capacity of a discrete memoryless Gaussian Wire-Tap Channel when the input is from a finite complex constellation is studied. It is shown that the secrecy capacity curves of a finite constellation plotted against the SNR, for a fixed noise variance of the eavesdropper's channel has a global maximum...

    Provided By Indian Institute of Science

  • White Papers // Sep 2010

    Aggregate AP Throughputs for Long File Transfers in a WLAN Controlled by Inhomogeneous TCP Connections

    This paper is concerned with infrastructure mode WLANs that use the IEEE 802.11 DCF mechanism. The authors are interested in analytical models for evaluating the performance of TCP controlled simultaneous uploads and downloads where each connection has arbitrary TCP windows size. A detailed analysis of the aggregate throughput of TCP...

    Provided By Indian Institute of Science

  • White Papers // Sep 2010

    Delay Modelling for a Single-Hop Wireless Mesh Network Under Light Aggregate Traffic

    The IEEE 802.11 has become ubiquitous and gained widespread popularity as a protocol for wireless networks. As a result, various models have been proposed to analyze and model the parameters of interest. Since the seminal paper by Bianchi, throughput analysis of IEEE 802.11 DCF has come under much scrutiny. In...

    Provided By Indian Institute of Science

  • White Papers // Oct 2010

    State Dependent Attempt Rate Modeling of Single Cell IEEE 802.11 WLANs With Homogeneous Nodes and Poisson Packet Arrivals

    Analytical models for IEEE 802.11-based WLANs are invariably based on approximations, such as the well-known decoupling approximation proposed by Bianchi for modeling single cell WLANs consisting of saturated nodes. In this paper, the authors provide a new approach to model the situation when the nodes are not saturated. They study...

    Provided By Indian Institute of Science

  • White Papers // Dec 2009

    Tunable Locally-Optimal Geographical Forwarding in Wireless Sensor Networks With Sleep-Wake Cycling Nodes

    The authors consider a wireless sensor network whose main function is to detect certain infrequent alarm events, and to forward alarm packets to a base station, using geographical forwarding. The nodes know their locations, and they sleep-wake cycle, waking up periodically but not synchronously. In this situation, when a node...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    Reliable Multicast in Multi - Access Wireless LANs

    Multicast is an efficient paradigm for transmitting data from a sender to a group of receivers. This paper focus on multicast in single channel multi - access wireless Local Area Networks (LANs) comprising several small cells. In such a system, a receiver cannot correctly receive a packet if two or...

    Provided By Indian Institute of Science

  • White Papers // Mar 2011

    Transaction-Based QoS Management in a Hybrid Wireless Superstore Environment

    Hybrid wireless networks are extensively used in the superstores, marketplaces, malls, etc. and provide high QoS (Quality of Service) to the end-users has become a challenging task. In this paper, the authors propose a policy-based transaction-aware QoS management architecture in a hybrid wireless superstore environment. The proposed scheme operates at...

    Provided By Indian Institute of Science

  • White Papers // Sep 2009

    Prediction of Hard Drive Failures Via Rule Discovery From AutoSupport Data

    The ability to accurately predict an impending hard disk failure is important for reliable storage system design. The facility provided by most hard drive manufacturers, called S.M.A.R.T. (self-monitoring, analysis and reporting technology), has been shown by current research to have poor predictive value. The problem of finding alternatives to S.M.A.R.T....

    Provided By Indian Institute of Science

  • White Papers // May 2010

    Metadata Interoperability for Cataloguing of E-Journals : A Comparative Study of LIBSYS, MARC21, AND CONSER

    Here is a comparative study of LIBSYS, MARC21, and CONSER to present the concept of metadata interoperability for cataloguing of e-journals. Any digital library includes data and metadata that describe various aspects of the digital record. Digital record consists of links or relationships to other data or metadata, which can...

    Provided By Indian Institute of Science

  • White Papers // Dec 2012

    Distributed Co-Phasing for Binary Consensus in Wireless Sensor Networks

    The authors address the problem of binary consensus over noisy, fading channels. They propose a new transmission model using Distributed Co-phasing that ensures the system to reach accurate consensus quite efficiently. They propose a simple linear update rule at nodes based on LMMSE and see that its performance is close...

    Provided By Indian Institute of Science

  • White Papers // Jan 2011

    Energy Efficient Mobile Base Stations Placement Algorithms in Wireless Sensor Networks

    Increasing network lifetime is important in wireless sensor/ad-hoc networks. In this paper, the authors are concerned with algorithms to increase network lifetime and amount of data delivered during the lifetime by deploying multiple mobile base stations in the sensor network field. Specifically, they allow multiple mobile base stations to be...

    Provided By Indian Institute of Science

  • White Papers // Jun 2011

    Theory and Algorithms for Hop-Count-Based Localization With Random Geometric Graph Models of Dense Sensor Networks

    The authors consider a network in which several service providers offer wireless access to their respective subscribed customers through potentially multi-hop routes. If providers cooperate by jointly deploying and pooling their resources, such as spectrum and infrastructure (e.g., base stations), and agree to serve each others' customers, their aggregate payoffs,...

    Provided By Indian Institute of Science

  • White Papers // Jan 2011

    Delay Optimal Schedule for a 2-Hop Vehicular Relay Network

    The authors study a scheduling problem in a mobile network scenario where vehicles are used as relays. A fixed source node wants to transfer a file of a known size to a fixed destination node, located beyond its communication range. In the absence of any infrastructure connecting the two nodes,...

    Provided By Indian Institute of Science

  • White Papers // Jan 2011

    Analytical Model for an IEEE 802.11 WLAN Using DCF With Two Types of VoIP Calls

    The authors formulate an analytical model for capacity evaluation of an infrastructure IEEE 802.11 based network carrying full-duplex packet telephone calls when different types of codecs are used for voice calls. The analysis of the model utilizes the attempt rate results from a well known fixed-point based saturation analysis. The...

    Provided By Indian Institute of Science

  • White Papers // Aug 2011

    Data Accuracy Model for Distributed Clustering Algorithm Based on Spatial Data Correlation in Wireless Sensor Networks

    The main objective of this paper is to construct a distributed clustering algorithm based upon spatial data correlation among sensor nodes and perform data accuracy for each distributed cluster at their respective cluster head node. The authors investigate that due to deployment of high density of sensor nodes in the...

    Provided By Indian Institute of Science

  • White Papers // Jul 2011

    Co-Evolution of Content Popularity and Delivery in Mobile P2P Networks

    Mobile P2P technology provides a scalable approach to content delivery to a large number of users on their mobile devices. In this paper, the authors study the dissemination of a single content (e.g., an item of news, a song or a video clip) among a population of mobile nodes. Each...

    Provided By Indian Institute of Science

  • White Papers // Oct 2011

    Joint Routing, Scheduling and Power Control For Multihop Wireless Networks With Multiple Antennas

    The authors consider the problem of Joint Routing, Scheduling and Power-control (JRSP) problem for Multi-Hop Wireless Networks (MHWN) with multiple antennas. They extend the problem and a (sub-optimal) heuristic solution method for JRSP in MHWN with single antennas. They present an iterative scheme to calculate link capacities (achievable rates) in...

    Provided By Indian Institute of Science

  • White Papers // Sep 2011

    Automatic Distributed-Memory Parallelization and Code Generation Using the Polyhedral Framework

    Automatic parallelization is a hard problem. Even in domains where it has been successful, parallelization for distributed-memory parallel architectures is considered very complex, and addressing it can provide a big leap in programming such architectures productively. The authors present techniques for compilation of regular sequential programs for distributed-memory parallel architectures...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    Opportunistic Splitting for Scheduling Via Stochastic Approximation

    The authors consider the problem of scheduling a wireless channel among multiple users. A slot is given to a user with a highest metric (e.g., channel gain) in that slot. The scheduler may not know the channel states of all the users at the beginning of each slot. In this...

    Provided By Indian Institute of Science

  • White Papers // Dec 2009

    A Double U-Slot Patch Antenna With Dual Wideband Characteristics

    Microstrip patch antennas are strong candidates for use in many wireless communications applications. This paper proposes the use of a patch antenna with two U-shaped slots to achieve dual band operation. A thick substrate helps broaden the individual bandwidths. The antenna is designed based on extensive IE3D simulation studies. A...

    Provided By Indian Institute of Science

  • White Papers // Jan 2010

    Neighbor Oblivious Link Reversal Over Duty-Cycled WSNs

    The authors propose partial and full link reversal algorithms to bypass voids during geographic routing over duty-cycled wireless sensor networks. They propose a distributed approach that is oblivious to one-hop neighbor information. Upon termination of the algorithm, the resulting network is guaranteed to be destination-oriented. Further, to reduce the delays...

    Provided By Indian Institute of Science

  • White Papers // Mar 2012

    Cooperative Particle Swarm Optimization Based Receiver for Large-Dimension MIMO-ZPSC Systems

    In this paper, the authors propose a Cooperative Particle Swarm Optimization (CPSO) based channel estimation/equalization scheme for Multiple-Input Multiple-Output Zero-Padded Single-Carrier (MIMO-ZPSC) systems with large dimensions in frequency selective channels. They estimate the channel state information at the receiver in time domain using a PSO based algorithm during training phase....

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Dual Band (WLAN & WiMAX) Suppressed Harmonic Microstrip Filter With Perturbed Ground

    Design of a dual band pass filter employing microstrip line with defected ground is presented in this paper. A dual band filter at 2.45GHz and 3.5GHz (covering WLAN and WiMAX) with 6% bandwidth has been designed at each frequency. Apertures in ground plane were used to improve the stop band...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Performance Analysis of Data and Voice Connections in a Cognitive Radio Network

    The authors study the performance of cognitive (secondary) users in a cognitive radio network which uses a channel whenever the primary users are not using the channel. The usage of the channel by the primary users is modelled by an ON-OFF renewal process. The cognitive users may be transmitting data...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Bulk File Download Throughput in a Single Station WLAN With Nonzero Propagation Delay

    The authors analyze TCP-controlled bulk file transfers in a single station WLAN with nonzero propagation delay between the file server and the WLAN. Their approach is to model the flow of packets as a closed queueing network (BCMP network) with 3 service centres, one each for the Access Point and...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Frequency Detection From Multiplexed Compressed Sensing of Noisy Signals

    Signal acquisition under a compressed sensing scheme offers the possibility of acquisition and reconstruction of signals sparse on some basis incoherent with measurement kernel with sub-Nyquist number of measurements. In particular when the sole objective of the acquisition is the detection of the frequency of a signal rather than exact...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Cooperative Distributed Sequential Spectrum Sensing

    The authors consider cooperative spectrum sensing for cognitive radios. They develop an energy efficient detector with low detection delay using sequential hypothesis testing. Sequential Probability Ratio Test (SPRT) is used at both the local nodes and the fusion center. They also analyze the performance of this algorithm and compare with...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    A Vertical Handoff Decision Scheme for End-to-End QoS in Heterogeneous Networks: An Implementation on a Mobile IP Testbed

    A prominent function of a mobile host is seamless Vertical HandOff (VHO) that ensures application service continuity and quality. VHO decision algorithms that have been proposed in the paper consider parameters such as wireless channel quality (RSSI), cost, channel load, and available bandwidth. The mobile node runs the VHO algorithm...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Application Delay Modelling for Variable Length Packets in Single Cell IEEE 802.11 WLANs

    The IEEE 802.11 has become ubiquitous and gained widespread popularity as a protocol for wireless networks. As a result, various models have been proposed to analyze and model the parameters of interest. Since the seminal paper by Bianchi, throughput analysis of IEEE 802.11 DCF has come under much scrutiny. In...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Efficient Post-Processing Techniques for Speech Enhancement

    The authors address the problem of speech enhancement in real-world noisy scenarios. They propose to solve the problem in two stages, the first comprising a generalized spectral subtraction technique, followed by a sequence of perceptually-motivated post-processing algorithms. The role of the post-processing algorithms is to compensate for the effects of...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Generation of a Short-Duration Ultrawideband Chirped-Pulse Using CRLH Transmission Lines

    In this paper, the authors present the various design issues related to CRLH-Transmission lines for the generation of short duration Ultra-Wideband chirped-pulse. The major parameters of the CRLH Transmission lines affecting the BandWidth are discussed and methods to increase BandWidth are also suggested. Also presented is the role of components...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Electronically Tunable Zero Order Resonator Based On CRLH-TLs

    Composite Right/Left Handed (CRLH) Transmission Line (TL) based electronically tunable 1.5 cell Zero Order Resonator (ZOR) is demonstrated with microstrip technology by use of varactors. A novel mechanism for DC bias for the varactor is proposed. This is achieved by patterning the ground plane of microstrip thereby reducing the complexity...

    Provided By Indian Institute of Science

  • White Papers // Dec 2010

    Hand Pose Recognition Using Geometric Features

    In this paper, a novel approach for hand pose recognition by using key geometrical features of hand is proposed. A skeletal hand model is constructed to analyze the abduction and adduction movements of the fingers and these variations are modeled by multidimensional probabilistic distributions. For recognizing hand poses, proximity measures...

    Provided By Indian Institute of Science