Institute of Electrical and Electronics Engineers

Displaying 1-40 of 8168 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Robotic Router Formation - A Bit Error Rate Approach

    In this paper, the authors consider the problem of robotic router formation, where a node needs to maintain its connectivity to a fixed station by using a number of mobile routers. While most literature on this topic optimizes the formation of the routers by maximizing the Fiedler eigen-value of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Multi-Target Tracking in Distributed Active Sensor Networks

    In this paper, the authors consider the problem of tracking multiple targets using Distributed Active Sensing Networks (DASNs). The particle filter technique is adopted to estimate the trajectories of targets moving in the DASNs. They propose a novel joint measurement method, which allows the estimation of the states of targets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Extremum Tracking in Sensor Fields With Spatio-Temporal Correlation

    Physical phenomena such as temperature, humidity, and wind velocity often exhibit both spatial and temporal correlation. The authors consider the problem of tracking the extremum value of a spatio-temporally correlated field using a wireless sensor network. Determining the extremum at the fusion center after making all sensor nodes transmitting their...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Multiple Visual-Targets Tracking in Decentralized Wireless Camera Sensor Networks

    To track 3-dimensional multiple visual-targets states, the authors develop the decentralized Wireless Camera Sensor Network (WCSN) and the corresponding data fusion scheme. In their proposed scheme, each activated camera sensor-node obtains the local encoded 2-dimensional observation of the visual-targets' states and sends it to the global fusion center. This global...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Localization in Wireless Sensor Networks Based on Ad Hoc Routing and Evolutionary Computation

    The authors propose evolutionary computation to estimate positions of nodes within a sensor network. The approach uses signal strength measurements between nodes and given positions for a subset of these nodes (anchor nodes). The signal strength measurements and routing requests take place simultaneously. A data collecting unit (sink node) receives...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Ferromagnetic Target Detection and Localization With a Wireless Sensor Network

    This paper attempts to address challenges of using magnetic sensors for target detection, localization and tracking with a Wireless Sensor Network (WSN). A WSN comprised of magnetic sensors was constructed to investigate the modeling, detection, and localization of ferrous targets. The system was established as a centralized tree-based wireless network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Trust Establishment in Cooperative Wireless Networks

    In cooperative wireless networks, relay nodes are used to improve the channel capacity of the system. However, the presence of malicious relays in the network may severely degrade the performance of the system. More specifically, there exists a possibility that a node refuses to cooperate when it is selected for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Distributed Combined Authentication and Intrusion Detection With Data Fusion in High Security Mobile Ad-Hoc Networks

    This paper studies distributed, combined authentication and intrusion detection with data fusion in Mobile Ad-hoc NETworks (MANETs). Multimodal biometrics are deployed to work with Intrusion Detection Systems (IDSs) to alleviate the shortcomings of unimodal biometric systems. Since each device in the network has measurement and estimation errors, more than one...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Effect of On/Off Misbehavior on Overhearing Based Cooperation Scheme for MANET

    Misbehaving nodes, including malicious and selfish ones, will disturb the cooperation among all wireless nodes in a Mobile Ad hoc NETwork (MANET). Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. These schemes worked well...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Anonymity Under Flow Insertion: A Game Theoretic Approach

    The problem of anonymous wireless networking is considered when an adversary is capable of controlling a subset of routes in the network. For a desired Quality-of-Service (QoS), as measured by network throughput, the problem of maximizing anonymity is studied from a game-theoretic perspective. Anonymity is quantified using conditional entropy of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    GDS-B: A Protocol to Support HAIPE Peer Discovery Server Communication

    HAIPE devices provide encrypted tunneling and transporting services for Internet Protocol (IP) datagrams through an unsecured network on behalf of secure Plain Text (PT) enclaves. Traditionally, secure tunnels were established by manually configuring the local HAIPE with information for peer enclaves. When a large number of enclaves are involved, automation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    XO: XMPP Overlay Service for Distributed Chat

    This paper discusses the adaptation of group-oriented messaging and chat technology for operation in serverless, multicast-capable mobile wireless architectures. The main goals are to allow group messaging and chat sessions to fragment/coalesce, operate through disrupted TCP conditions, and improve bandwidth utilization when multicast is available. In addition, the solution demonstrates...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Distributed Geolocation Mapping in a Mobile Tactical Environment Using Service Overlay Over MANET

    This paper evaluates the efficacy of a distributed location mapping application running over a Service Overlay Network (SON) in a MANET wireless environment. In the application, an application-layer routing protocol facilitates data forwarding from mobile nodes to a Command Centre. The performance of the location mapping application is evaluated by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Digital IF for MILSATCOM Terminals

    A compelling case has been made for transitioning MILitary SATellite COMmunications (MILSATCOM) terminal architectures from conventional analog IF (Intermediate Frequency) formats to newer more capable digital IF (Intermediate Format) systems. Digital IF has been shown to offer clear and substantial advantages in all aspects of MILSATCOM terminal activity and operations,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    SDRPHY - XML Description for SDR Physical Layer

    Software defined radio hardware has matured to a point where wide deployment is called for. Unfortunately, the standardization efforts have not yet achieved maturity. Military users are not reaping the benefits of SDR due to excessively complex software development and tight coupling between hardware and software. This paper proposes a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Advanced Model-Based Software Engineering Technologies for Software Defined Radio Configuration

    Model based technologies can be used to reduce the cost of development and maintenance software intensive systems and to enable additional capabilities such as load time configuration and run time adaptation. Such systems include complex communications systems based on software defined radios that have adaptive or cognitive capabilities. Advanced methodologies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    A Low Spurious and Small Step Frequency Synthesizer Based on PLL-DDS-PLL Architecture

    Nowadays, frequency synthesizers are widely used in modern communication systems. There are many frequency synthesis technologies, such as Direct analogy Synthesis (DS), the DDS, the PLL and the mixture of the former technologies, etc. The DS has advantages of fast hopping time and high output frequency but it also has...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Fairness-Optimal Initial Shaping Rate for HSDPA Transport Network Congestion Control

    In the HSDPA (High-Speed Downlink Packet Access) Iub Transport Network (TN) which connects the Radio Network Controller with base stations (Node Bs), congestion control is needed. Because of the TN's often narrow resources, fairness of resource sharing is an important issue. Basic Additive Increase Multiplicative Decrease (AIMD) congestion control guarantees...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Developing DSLs Using Combinators. A Design Pattern

    The development of Domain-Specific Languages (DSLs) is considered by many authors as a hard task. To simplify the design of DSLs the authors describe a design pattern based on the combinators technique, which can also provide guidelines for previous domain analysis phase because it is based on equational reasoning over...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Some Thoughts About the Past and the Future of the IFAC Workshops on Real-Time Programming: Welcome Address of the Founder

    The paper presents an account of the early occurrences of the Workshop on Real-Time Programming by one of its original organizers and advocates. Some comments on current state and future of real-time programming are also given. A few months ago Prof. Zalewski, the program chairman of this 30th IFAC/IFIP Workshop...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Safe and Secure Partitioned Systems and Their Certification

    The paper reviews some of the most important aspects of certification of real-time safety-critical systems, using the example of Integrated Modular Avionics. Security issues are also addressed where these relate to airborne systems and may be used to provide multiple independent levels of security. With the ever-increasing computing power, memory...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2009

    Fuzzy Edge Detection Based on Pixel's Gradient and Standard Deviation Values

    This paper presents a new fuzzy based edge detection algorithm. Each different edge detection method has its own advantages and disadvantages. For example, each method detects part of real edges and also some unreal edges. To reduce this effect, the authors have used two different source of information and a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Acknowledgment-Based Broadcast Protocol for Reliable and Efficient Data Dissemination in Vehicular Ad Hoc Networks

    The authors propose a broadcast algorithm suitable for a wide range of vehicular scenarios, which only employs local information acquired via periodic beacon messages, containing acknowledgments of the circulated broadcast messages. Each vehicle decides whether it belongs to a Connected Dominating Set (CDS). Vehicles in the CDS use a shorter...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Asymptotic Laws for Joint Content Replication and Delivery in Wireless Networks

    The authors study the scalability of multi-hop wireless communications, a major concern in networking, for the case that users access content replicated across the nodes. In contrast to the standard paradigm of randomly selected communicating pairs, content replication is efficient for certain regimes of file popularity, cache and network size....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    On Geometric Upper Bounds for Positioning Algorithms in Wireless Sensor Networks

    This paper studies the possibility of upper bounding the position error of an estimate for range based positioning algorithms in wireless sensor networks. In this paper, the authors argue that in certain situations when the measured distances between sensor nodes are positively biased, e.g., in non-line-of-sight conditions, the target node...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2012

    On Optimal Link Activation With Interference Cancellation in Wireless Networking

    A fundamental aspect in performance engineering of wireless networks is optimizing the set of links that can be concurrently activated to meet given Signal-to-Interference-and-Noise Ratio (SINR) thresholds. The solution of this combinatorial problem is the key element in scheduling and cross-layer resource management. Previous works on link activation assume single-user...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2011

    Performance Analysis of Hybrid Relay Selection in Cooperative Wireless Systems

    The Hybrid Relay Selection (HRS) scheme, which adaptively chooses Amplify-and-Forward (AF) and Decode-and-Forward (DF) protocols, is very effective to achieve robust performance in wireless networks. This paper analyzes the Frame Error Rate (FER) of the HRS scheme in general cooperative wireless networks without and with utilizing error control coding at...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Analytical Evaluation of Fractional Frequency Reuse for Heterogeneous Cellular Networks

    Interference management techniques are critical to the performance of heterogeneous cellular networks, which will have dense and overlapping coverage areas, and experience high levels of interference. Fractional Frequency Reuse (FFR) is an attractive interference management technique due to its low complexity and overhead, and significant coverage improvement for low-percentile (cell-edge)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Cooperative Wireless Medium Access Exploiting Multi-Beam Adaptive Arrays and Relay Selection

    Cooperative transmission among wireless network nodes can be exploited to resolve collisions and thereby enhance the network throughput. Incorporation of Multi-Beam Adaptive Array (MBAA) at a base station/access point (destination) receiver has been shown to improve the network performance. In this paper, the authors propose an efficient cooperative wireless medium...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Priority-Based Access Schemes and Throughput Performance in Wireless Networks Exploiting Multibeam Antennas

    Multi-Beam Antennas (MBAs) are capable of supporting concurrent communications with multiple neighboring users in wireless networks and, thus, can improve the throughput over omni-directional antennas and switched-beam directional antennas. The throughput performance, however, may degrade in the absence of a proper access scheme for user scheduling, and thus, collisions occur....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Time-Frequency Analysis for the Localization of Multiple Moving Targets Using Dual-Frequency Radars

    A dual-frequency radar, which estimates the range of a target based on the phase difference between two closely spaced frequencies, has been shown to be a cost-effective approach to accomplish both range-to-motion estimation and tracking. This approach, however, suffers from two drawbacks: it cannot deal with multiple moving targets, and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2011

    IEEE 1900.6: Spectrum Sensing Interfaces and Data Structures for Dynamic Spectrum Access and Other Advanced Radio Communication Systems Standard: Technical Aspects and Future Outlook

    Currently, the IEEE Standards Association is very active in the framework of cognitive radio with an aim to provide a bridge between research results, implementation, and widespread deployment of this new communication paradigm. This paper reports recent developments within the IEEE Dynamic Spectrum Access Network Standards Committee1 on dynamic spectrum...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2011

    An Analytical Energy Consumption Model for Packet Transfer Over Wireless Links

    The authors provide a detailed analytical model for estimating the total energy consumed to exchange a packet over a wireless link. Their model improves many of the current models by considering details such as consumed energy by processing elements of transceivers, packet retransmission, reliability of links, size of data packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Performance Analysis of Synchronization Frame Based Interference Mitigation in 60 GHz WPANs

    Sixty GHz radio is a promising technology due to its potential to provide multi-Gbps based data rate. It is capable to support emerging wireless multimedia applications like uncompressed high definition video streaming. However, due to the stringent link budget, 60GHz communication is very fragile to the Co-Channel Interference (CCI). An...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Analyzing 60 GHz Radio Links for Indoor Communications

    With the increase in the capacity of mobile communication devices, it is but natural to expect that these devices would work ubiquitously anywhere anytime to offer high data rate support. Recently 60 GHz frequency band has been identified as an obvious choice for the high data rate indoor communications. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Performance Analysis of Multichannel Medium Access Control Algorithms for Opportunistic Spectrum Access

    Static spectrum assignment, which has been applied to radio frequencies for almost a century, has led to a quasi-scarcity of the spectrum. Therefore, finding a new unassigned frequency slot has forced system designers toward higher frequencies, e.g., 60 GHz. However, most of the already allocated radio bands are not used...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2009

    Quality of Service Assessment of Opportunistic Spectrum Access: A Medium Access Control Approach

    Opportunistic Spectrum Access (OSA) is a promising new spectrum management approach that will allow coexistence of both licensed and opportunistic users in each spectrum band, potentially decreasing the spectrum licensing costs for both classes of users. However, this has significant implications on the QoS experienced by the licensed and opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Order Statistics for Voice Activity Detection in VoIP

    Real-time voice communication over the Internet has rapidly gained popularity. It is indeed essential to reduce the total bandwidth consumption to efficiently use the available bandwidth for the subscribers having low speed connectivity and even otherwise. In this paper, the authors introduce a novel technique to identify the voice and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Jump-Stay Rendezvous Algorithm for Cognitive Radio Networks

    Cognitive Radio Networks (CRNs) have emerged as advanced and promising paradigm to exploit the existing wireless spectrum opportunistically. It is crucial for users in CRNs to search for neighbors via rendezvous process and thereby establish the communication links to exchange the information necessary for spectrum management and channel contention etc....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Cyclic Feature Detection With Sub-Nyquist Sampling for Wideband Spectrum Sensing

    For cognitive radio networks, efficient and robust spectrum sensing is a crucial enabling step for dynamic spectrum access. Cognitive radios need to not only rapidly identify spectrum opportunities over very wide bandwidth, but also make reliable decisions in noise-uncertain environments. Cyclic spectrum sensing techniques work well under noise uncertainty, but...

    Provided By Institute of Electrical and Electronics Engineers