Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

Displaying 1-17 of 17 results

  • White Papers // Nov 2010

    Robust Wireless Network Coding - An Overview

    Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswede et al. in 2000, NC has rapidly emerged as a major research area in information theory due to its wide applicability to communication...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas

    The concept of Cognitive Radio (CR) is meant to be utilised by both licensed and license-exempt users that coexist in a shared spectrum area whenever they need to avoid causing unaffordable interference to each other by following some rules. In fact, primary users should be protected by any license-exempt transmission....

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    CogProt: A Framework for Cognitive Configuration and Optimization of Communication Protocols

    Advancements in network technologies dramatically increased management complexity. Cognitive networking was introduced to deal with this problem, by providing algorithms for autonomous network management and protocol reconfiguration. In this paper, the authors propose a framework for cognitive configuration and optimization of communication protocols called CogProt. CogProt is a distributed framework...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    TCP-Aware Forward Error Correction for Wireless Networks

    This paper studies TCP performance improvement in wireless and heterogeneous networks using Forward Error Correction (FEC) technique driven by TCP semantics. In the proposed scheme, called TCP-aware FEC, the amount of redundancy added to a packet at the sender node corresponds to the level of error protection and is computed...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    Hidden Markov Models for Automated Protocol Learning

    Hidden Markov Models (HMMs) have applications in several areas of computer security. One drawback of HMMs is the selection of appropriate model parameters, which is often ad hoc or requires domain-specific knowledge. While algorithms exist to find local optima for some parameters, the number of states must always be specified...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Oct 2010

    Framework for IMS Service Scenario Implementation

    This paper presents an experimental framework for implementation of an IMS/NGN reference service scenario by means of open source software. Multiple service enablers are deployed to build this service scenario. Interoperability tests between the deployed IMS entities and user equipment are carried out, as well as performance measurements of signaling...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2010

    Deployment of a Wireless Ultrasonic Sensor Array for Psychological Monitoring

    The deployment of a wireless sensor network to monitor subjects' locations and relative distances during psychological experiments is discussed. As its primary function, an overhead array of ultrasound sensors automatically tracks a parent, child and stranger over a 4.45 m?4.23 m observation area. The array of ultrasonic-equipped motes can resolve...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Feb 2010

    Capacity of Two-Way Relay Channel

    This paper investigates the capacity of a wireless two-way relay channel in which two end nodes exchange information via a relay node. The capacity is defined in the information-theoretic sense as the maximum information exchange rate between the two end nodes. The authors give an upper bound of the capacity...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Jan 2010

    A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing

    Cloud Computing is emerging today as a commercial infrastructure that eliminates the need for maintaining expensive computing hardware. Through the use of virtualization, clouds promise to address with the same shared set of physical resources a large user base with different needs. Thus, clouds promise to be for scientists an...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Dec 2009

    A New Bio-Inspired Approach to the Traveling Salesman Problem

    The host-seeking behavior of mosquitoes is very interesting. In this paper, the authors propose a novel Mosquito Host-Seeking Algorithm (MHSA) as a new branch of biology-inspired algorithms for solving TSP problems. The MHSA is inspired by the host-seeking behavior of mosquitoes. They present the mathematical model, the algorithm, the motivation...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2009

    MeshMAC: Enabling Mesh Networking Over IEEE 802.15.4 Through Distributed Beacon Scheduling

    Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One of those open issues is how to build a synchronized multi-hop mesh network for power efficient, scalable, and robust networking. In fact, while the...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2009

    Credit-Token Based Inter-Cell Radio Resource Management: A Game Theoretic Approach

    In this paper, a radio resource sharing scheme for wireless cellular network is investigated to achieve efficiency and fairness among base stations. The authors propose a credit-token based spectrum sharing algorithm. Game theory is utilized to formulate and analyze the proposed spectrum sharing algorithm. They first discuss the simplest two-base-station...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Oct 2009

    Malicious or Selfish- Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN

    The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated into the analysis. In this paper, the authors study the problem of...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2009

    The Audacity of Fiber-Wireless (FiWi) Networks

    A plethora of enabling optical and wireless technologies have been emerging that can be used to build future-proof bimodal Fiber-Wireless (FiWi) broadband access networks. After over-viewing key enabling Radio-over-Fiber (RoF) and Radio-and-Fiber (R&F) technologies and briefly surveying the state of the art of FiWi networks, the authors introduce an Ethernet-based...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2009

    FIJI: Fighting Implicit Jamming in 802.11 WLANs

    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given Access Point (AP). In this paper, the authors first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Aug 2009

    Functional Model of Carbon Nanotube Programmable Resistors for Hybrid Nano/CMOS Circuit Design

    Hybrid nano (e.g. nanotube and nanowire)/CMOS circuits combine both the advantages of nano-devices and CMOS technologies; they have thus become the most promising candidates to relax the intrinsic drawbacks of CMOS circuits beyond Moore's law. A functional simulation model for an hybrid nano/CMOS design is presented in this paper. It...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Aug 2009

    Multicost Energy-Aware Broadcasting in Wireless Networks With Distributed Considerations

    In this paper, the authors propose an energy-aware broadcast algorithm for wireless networks. The algorithm is based on the multi-cost approach and selects the set of nodes that by transmitting implement broadcasting in an optimally energy-efficient way. The energy-related parameters taken into account are the node transmission power and the...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Jan 2010

    A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing

    Cloud Computing is emerging today as a commercial infrastructure that eliminates the need for maintaining expensive computing hardware. Through the use of virtualization, clouds promise to address with the same shared set of physical resources a large user base with different needs. Thus, clouds promise to be for scientists an...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2010

    Deployment of a Wireless Ultrasonic Sensor Array for Psychological Monitoring

    The deployment of a wireless sensor network to monitor subjects' locations and relative distances during psychological experiments is discussed. As its primary function, an overhead array of ultrasound sensors automatically tracks a parent, child and stranger over a 4.45 m?4.23 m observation area. The array of ultrasonic-equipped motes can resolve...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2009

    MeshMAC: Enabling Mesh Networking Over IEEE 802.15.4 Through Distributed Beacon Scheduling

    Although IEEE 802.15.4 is being considered as a promising standard for low-cost low-power Wireless Sensor Networks (WSNs), several issues in the specification are still open. One of those open issues is how to build a synchronized multi-hop mesh network for power efficient, scalable, and robust networking. In fact, while the...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Oct 2010

    Framework for IMS Service Scenario Implementation

    This paper presents an experimental framework for implementation of an IMS/NGN reference service scenario by means of open source software. Multiple service enablers are deployed to build this service scenario. Interoperability tests between the deployed IMS entities and user equipment are carried out, as well as performance measurements of signaling...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    Robust Wireless Network Coding - An Overview

    Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswede et al. in 2000, NC has rapidly emerged as a major research area in information theory due to its wide applicability to communication...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Aug 2009

    Multicost Energy-Aware Broadcasting in Wireless Networks With Distributed Considerations

    In this paper, the authors propose an energy-aware broadcast algorithm for wireless networks. The algorithm is based on the multi-cost approach and selects the set of nodes that by transmitting implement broadcasting in an optimally energy-efficient way. The energy-related parameters taken into account are the node transmission power and the...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2009

    FIJI: Fighting Implicit Jamming in 802.11 WLANs

    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given Access Point (AP). In this paper, the authors first identify a clever, low-power jamming attack that can take advantage of this behavioral trait: the placement of a low-power jammer in a way...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Feb 2010

    Capacity of Two-Way Relay Channel

    This paper investigates the capacity of a wireless two-way relay channel in which two end nodes exchange information via a relay node. The capacity is defined in the information-theoretic sense as the maximum information exchange rate between the two end nodes. The authors give an upper bound of the capacity...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    CogProt: A Framework for Cognitive Configuration and Optimization of Communication Protocols

    Advancements in network technologies dramatically increased management complexity. Cognitive networking was introduced to deal with this problem, by providing algorithms for autonomous network management and protocol reconfiguration. In this paper, the authors propose a framework for cognitive configuration and optimization of communication protocols called CogProt. CogProt is a distributed framework...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    TCP-Aware Forward Error Correction for Wireless Networks

    This paper studies TCP performance improvement in wireless and heterogeneous networks using Forward Error Correction (FEC) technique driven by TCP semantics. In the proposed scheme, called TCP-aware FEC, the amount of redundancy added to a packet at the sender node corresponds to the level of error protection and is computed...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    Hidden Markov Models for Automated Protocol Learning

    Hidden Markov Models (HMMs) have applications in several areas of computer security. One drawback of HMMs is the selection of appropriate model parameters, which is often ad hoc or requires domain-specific knowledge. While algorithms exist to find local optima for some parameters, the number of states must always be specified...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Oct 2009

    Malicious or Selfish- Analysis of Carrier Sense Misbehavior in IEEE 802.11 WLAN

    The behavior of selfish users, which does not respect the backoff procedure of IEEE 802.11 WLAN, has been nicely studied in game-theoretic frameworks. However, in these studies, the effect of physical carrier sense has not been properly incorporated into the analysis. In this paper, the authors study the problem of...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Sep 2009

    The Audacity of Fiber-Wireless (FiWi) Networks

    A plethora of enabling optical and wireless technologies have been emerging that can be used to build future-proof bimodal Fiber-Wireless (FiWi) broadband access networks. After over-viewing key enabling Radio-over-Fiber (RoF) and Radio-and-Fiber (R&F) technologies and briefly surveying the state of the art of FiWi networks, the authors introduce an Ethernet-based...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2009

    Credit-Token Based Inter-Cell Radio Resource Management: A Game Theoretic Approach

    In this paper, a radio resource sharing scheme for wireless cellular network is investigated to achieve efficiency and fairness among base stations. The authors propose a credit-token based spectrum sharing algorithm. Game theory is utilized to formulate and analyze the proposed spectrum sharing algorithm. They first discuss the simplest two-base-station...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Nov 2010

    An Efficient Power Control Algorithm for Supporting Cognitive Communications in Shared Spectrum Areas

    The concept of Cognitive Radio (CR) is meant to be utilised by both licensed and license-exempt users that coexist in a shared spectrum area whenever they need to avoid causing unaffordable interference to each other by following some rules. In fact, primary users should be protected by any license-exempt transmission....

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Dec 2009

    A New Bio-Inspired Approach to the Traveling Salesman Problem

    The host-seeking behavior of mosquitoes is very interesting. In this paper, the authors propose a novel Mosquito Host-Seeking Algorithm (MHSA) as a new branch of biology-inspired algorithms for solving TSP problems. The MHSA is inspired by the host-seeking behavior of mosquitoes. They present the mathematical model, the algorithm, the motivation...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering

  • White Papers // Aug 2009

    Functional Model of Carbon Nanotube Programmable Resistors for Hybrid Nano/CMOS Circuit Design

    Hybrid nano (e.g. nanotube and nanowire)/CMOS circuits combine both the advantages of nano-devices and CMOS technologies; they have thus become the most promising candidates to relax the intrinsic drawbacks of CMOS circuits beyond Moore's law. A functional simulation model for an hybrid nano/CMOS design is presented in this paper. It...

    Provided By Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering