Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7577 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    Experimental demonstration of packet-rate 10-Gb/s OOK OSNR monitoring for QoS-aware cross-layer packet protection

    A cross-layer network platform may enable introspective access to the physical layer, allowing optical performance monitoring measurements to feedback to higher layers for packet rerouting and protection. The authors experimentally demonstrate quality-of-service-aware packet protection that leverages cross-layer signaling based on the monitoring of packets optical-signal-to-noise ratio. In order to detect...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    10-Gb/s Access Network Architecture Based on Micro-Ring Modulators With Colorless ONU and Mitigated Rayleigh Backscattering

    The authors demonstrate an optical access network architecture utilizing the wavelength-selective behavior of micro-ring modulators to achieve Single-SideBand (SSB) modulation, which generates a downstream signal and simultaneously provides a centrally distributed carrier for upstream phase-remodulation. Cascaded silicon micro-rings are capable for Complementary Metal - Oxide - Semiconductor (CMOS) integration and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2011

    Unified Performance Analysis of Two-Hop Amplify-and-Forward Relay Systems with Antenna Correlation

    The authors present a unified performance analysis of a system in which the source and the destination are equipped with multiple antennas and communicating via a single antenna relay. Their studies can be divided into two parts. First they consider a system with Maximal Ratio Transmission (MRT) at the source...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    Multi-User Scheduling in AF Relay Network with Antenna Correlation

    This paper presents the performance analysis of multi-user scheduling for Channel State Information (CSI)-assisted and fixed gain AF relaying with antenna correlation. The authors consider a source equipped with multiple correlated antennas communicating with multiple users via a relay which has dual correlated antennas. The system performance degrades with the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    CloudMoV: Cloud-based Mobile Social TV

    The rapidly increasing power of personal mobile devices (smartphones, tablets, etc.) is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    Peer-Assisted Online Games with Social Reciprocity

    Online games and social networks are cross-pollinating rapidly in today's Internet: online social network sites are deploying more and more games in their systems, while online game providers are leveraging social networks to power their games. An intriguing development as it is, the operational challenge in the previous game persists,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Accuracy Improvement Of Connectivity-Based Sensor Network Localization

    The early results from connectivity-based sensor network localization suffer from disappointing accuracy. The reason is partly due to the limited information of the problem and also the deficiencies of the algorithms. This paper proposes a two-level range/indication of connectivity between each pair of nodes, which would indicate three levels of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Localization in Wireless Sensor Networks with Gradient Descent

    In this paper, the authors present two distance-based sensor network localization algorithms. The location of the sensors is unknown initially and they can estimate the relative locations of sensors by using knowledge of inter-sensor distance measurements. Together with the knowledge of the absolute locations of three or more sensors, they...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Optimal Rate Assignment Strategy to Minimize Average Waiting Time in Wireless Networks

    In a wireless network that supports multiple flows, allocation of bandwidth resource among the flows is one of the critical problems. Different allocation strategies have been developed based on different optimization objectives. Unfortunately, these objectives may not reflect directly the time needed for a flow to transmit what it wants....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Coding and Interference Aware Path Bandwidth Estimation in Multi-hop Wireless Networks

    Network coding is known to be a promising technology to increase the bandwidth capacity in wireless networks. To the authors' best knowledge, there is limited work on studying the available bandwidth for a given path with network coding. This paper presents a new method to estimate the available bandwidth of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Routing in Multi-Radio Multi-Channel Multi-hop Wireless Mesh Networks with Bandwidth Guarantees

    In this paper, the authors propose a new path metric for finding the maximum available bandwidth path in the multi-radio multi-channel wireless mesh networks. They formally prove that the path metric is isotonic, which is the necessary and sufficient condition for assuring the proper operation of the routing algorithm. Based...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Coding Aware Routing in Wireless Networks with Bandwidth Guarantees

    In this paper, the authors discusses the problem of computing the maximum available bandwidth of a given path in TDMA-based network with network coding, which is a fundamental issue for supporting QoS with bandwidth requirement in wireless networks. They present a new path bandwidth computation mechanism considering physical-layer network coding....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Novel Bandwidth Strategy for Wireless P2P File Sharing

    With the rapid development of the mobile device technology and wireless network technology, the need of an efficient file sharing method on wireless network becomes more and more significant. Peer-To-Peer(P2P) file distribution, as a quite popular method being used now, is a promising choice. However, the limitation of bandwidth of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Joint Routing and Scheduling Algorithm for Efficient Broadcast in Wireless Mesh Networks

    With the increasing popularity of Wireless Mesh Networks (WMNs), broadcasting traffic (e.g. IP-TV) will contribute a large portion of network load. In this paper, the authors consider a multi-channel multi-interface WMN with real time broadcast call arrivals. Aiming at maximizing the call acceptance rate of the network, an efficient broadcast...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    On Joint Synchronization of Clock Offset and Skew for Wireless Sensor Networks Under Exponential Delay

    Wireless Sensor Network (WSN), emerged as an important research area in recent years, consists of many small-scale miniature devices (or sensor nodes) capable of onboard sensing, computing and communications. In this paper, the problem of clock synchronization for Wireless Sensor Network (WSN) under exponential delay is analyzed based on two-way...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Priority-Based Rate Adaptation Using Game Theory in Vehicular Networks

    Rate adaptation is extremely crucial to the system performance of wireless networks. Existing rate adaptation schemes mainly make use of channel information (e.g., packet error rate or signal strengths of received packets) to adapt transmission rates. In this paper, the authors find out that it is beneficial for rate adaptation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Effective SINR Computation for Maximum Likelihood Detector in MIMO Spatial Multiplexing Systems

    In this paper, the authors studies the computation of post-processing Signal-to-Interference plus Noise Ratio (SINR) for Maximum Likelihood Detector (MLD) in Multiple-Input and Multiple-Output (MIMO)-Orthogonal Frequency Division Multiplexing (OFDM) spatial multiplexing systems. They derive an effective post-MLD SINR for each spatial stream, which is computed as post Minimum Mean-Squared Error...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    On The Parameter Choice for Cyclic Delay Diversity Based Precoding with Spatial Multiplexing

    A method called open loop Cyclic Delay Diversity (CDD) precoding has recently become part of the standard for 3GPP Long-Term Evolution (LTE) cellular communications systems. CDD had previously been proposed as single stream diversity method for OFDM systems. The proposal in LTE is an extension to spatial multiplexing using so...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    An EM Algorithm for Path Delay and Complex Gain Estimation of Slowly Varying Fading Channel for CPM Signals

    In this paper, the authors addresses the joint path delay and time-varying complex gain estimation for Continuous Phase Modulation (CPM) over a time-selective slowly varying flat Rayleigh fading channel. They propose an Expectation-Maximization (EM) algorithm for path delay estimation in a Kalman smoother framework. The time-varying complex gain is modeled...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Error Performance and Diversity Analysis of Multi-Source Multi-Relay Wireless Networks with Binary Network Coding and Cooperative MRC

    In this paper, the authors contribute to the theoretical understanding, the design, and the performance evaluation of multi-source multi-relay network-coded cooperative diversity protocols. These protocols are useful to counteract the spectral inefficiency of repetition-based cooperation. They provide a general analytical framework for analysis and design of wireless networks using the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    CSI Sharing Strategies for Transmitter Cooperation in Wireless Networks

    Multiple-antenna "Based" transmitter (TX) cooperation has been established as a promising tool towards avoiding, aligning, or shaping the interference resulting from aggressive spectral reuse. The price paid in the form of feedback and exchanging Channel State Information (CSI) between cooperating devices in most existing methods is often underestimated however. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2013

    Two-Way Training for Discriminatory Channel Estimation in Wireless MIMO Systems

    In this paper, the authors examines the use of two-way training to efficiently discriminate the channel estimation performances at a Legitimate Receiver (LR) and an Unauthorized Receiver (UR) in a Multiple-Input Multiple-Output (MIMO) wireless system. This paper improves upon the original Discriminatory Channel Estimation (DCE) scheme proposed by Chang et...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    Cross-Layer Strategies for Throughput Maximization in a Data Aggregating Wireless Network

    The authors consider an ad-hoc wireless network where all nodes have data to send to a single destination node called the sink. They consider a linear placement of the wireless nodes with the sink at one end. They assume that the wireless nodes transfer data to the sink using single...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Joint User Pairing and Resource Allocation for Uplink SC-FDMA Systems

    In this paper, the authors investigate joint user pairing and resource allocation under the practical constraints in Single-Carrier Frequency-Division Multiple Access (SC-FDMA) LTE uplink systems. They first introduce a joint optimal algorithm based on branch-and-bound search as a benchmark. To reduce complexity, they divide the joint optimization problem into two...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Adaptive DRX Scheme for Beyond 3G Mobile Handsets

    Beyond 3G mobile networks will be data service centric. It is anticipated that UE will stay in the Connected State relatively long while supporting data services, so efficient power saving mechanisms for the Connected State are more significant in order to prolong the active time of a handset. Discontinuous Reception...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    A Novel Wideband Spectrum Sensing System for Distributed Cognitive Radio Networks

    A significant challenge of Cognitive Radio (CR) is to perform wideband spectrum sensing in a fading environment. In this paper, a novel Multi-rate Sub-Nyquist Spectrum Detection (MSSD) system is introduced for cooperative wideband spectrum sensing in a distributed CR network. Using only a few sub-Nyquist samples, MSSD is able to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Broadband Wireless Delivery Using An Inside-Out TV White Space Network Architecture

    In this paper, the authors investigate the feasibility of wireless broadband delivery using an "Inside-Out" community network architecture, where residential broadband customers share a portion of their home Access Point bandwidth for outdoor public use. They use system simulation studies performed for real-life BT FON service scenarios in the UK...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Distribute Provision Strategies of RESTful-Based Mobile Web Services

    Providing adaptive web services from mobile hosts is a new approach in mobile web services to cope resource scarcity of mobile network environment. This approach is explored through investigating some mechanisms to allow continuous and reliable service provisioning. However, there is a clear limitation in terms complexity and size of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Adaptive 10 Gbit/s Mobile Optical Wireless Systems Employing Beam Delay, Angle and Power Adaptation with Imaging Receivers

    In this paper, the authors propose a novel mobile Optical Wireless (OW) system that employs for the first time beam delay adaptation, and makes use of angle and power adaptation in a line strip multibeam spot diffusing configuration in conjunction with an imaging receiver (BDAPA-LSMS). Their ultimate goal is to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    TrC-MC: Decentralized Software Transactional Memory for Multi-Multicore Computers

    To achieve single-lock atomicity in software transactional memory systems, the commit procedure often goes through a common clock variable. When there are frequent transactional commits, clock sharing becomes inefficient. Tremendous cache contention takes place between the processors and the computing throughput no longer scales with processor count. Therefore, traditional transactional...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Automatic Generation of Normal Forms for Testing Object-Oriented Software

    Testing object-oriented software is more complex than its procedural counterpart. The concept of "Fundamental pairs" was introduced in the authors' TACCLE methodology for testing object-oriented software. It was proved that, although the set of fundamental pairs is only a proper subset of equivalent ground terms, the use of fundamental pairs...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Lean Implementations of Software Testing Tools Using XML Representations of Source Codes

    By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The conversions between a source program and its XML representation can be easily realized using existing conversion tools. In this way, the conversion tools can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering

    Software with graphics rendering is an important class of applications. Many of them use polygonal models to represent the graphics. Mesh simplification is a vital technique to vary the levels of object details and hence, improve the overall performance of the rendering process. It progressively enhances the effectiveness of rendering...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Zero-configuration Identity-based IP Network Encryptor

    For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as IPSec is more flexible than higher layer solutions since it is not application-dependent and can protect all...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Incentive Effects of Common and Separate Queues with Multiple Servers: The Principal-Agent Perspective

    A two-server service network has been studied by Gilbert and Weng from the principal-agent perspective. In the model, services are rendered by two independent facilities coordinated by an agency. The agency must devise a strategy to allocate customers to the facilities and determine the compensation. A common queue allocation scheme...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Inducing Optimal Service Capacities via Performance-Based Allocation of Demand in a Queueing System with Multiple Servers

    In this paper, the authors study the use of performance-based allocation of demand in a multiple-server queuing system. The same problem with two servers has been studied in the literature. Specifically, it has been proposed and proved that the linear allocation and mixed threshold allocation policies are, respectively, the optimal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers

    It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be easy to clone a copy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Taking Advantage of Service Selection: A Study on The Testing of Location-Based Web Services Through Test Case Prioritization

    Dynamic service compositions pose new verification and validation challenges such as uncertainty in service membership. Moreover, applying an entire test suite to loosely coupled services one after another in the same composition can be too rigid and restrictive. In this paper, the authors investigate the impact of service selection on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services

    Programs using Service-Oriented Architecture (SOA) often feature ultra-late binding among components. These components have well-defined interfaces and are known as web services. Messages between every pair of web services dually conform to the output interface of a sender and the input interface of a receiver. Unit testing of web services...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach

    Cognitive radio is a promising paradigm to achieve efficient utilization of spectrum resource by allowing the unlicensed users (i.e., secondary users, SUs) to access the licensed spectrum. Market-driven spectrum trading is an efficient way to achieve dynamic spectrum accessing/sharing. In this paper, the authors consider the problem of spectrum trading...

    Provided By Institute of Electrical and Electronics Engineers