Institute of Electrical and Electronics Engineers

Displaying 361-400 of 8178 results

  • White Papers // Feb 2012

    Jointly Optimal Channel and Power Assignment for Dual-Hop Multi-Channel Multi-User Relaying

    The authors consider the problem of jointly optimizing channel pairing, channel-user assignment, and power allocation in a single-relay cooperative system with multiple channels and multiple users, under several common relaying strategies. Both weighted sum-rate and max-min rate are considered as the optimization objective, and transmission power constraints are imposed on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Balancing DRAM Locality and Parallelism in Shared Memory CMP Systems

    Modern memory systems rely on spatial locality to provide high bandwidth while minimizing memory device power and cost. The trend of increasing the number of cores that share memory, however, decreases apparent spatial locality because access streams from independent threads are interleaved. Memory access scheduling recovers only a fraction of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Throughput Optimization, Spectrum Allocation, and Access Control in Two-Tier Femtocell Networks

    The deployment of femtocells in a macrocell network is an economical and effective way to increase network capacity and coverage. Nevertheless, such deployment is challenging due to the presence of inter-tier and intra-tier interference, and the ad hoc operation of femtocells. Motivated by the flexible sub-channel allocation capability of OFDMA,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Analytical Evaluation of Fractional Frequency Reuse for Heterogeneous Cellular Networks

    Interference management techniques are critical to the performance of heterogeneous cellular networks, which will have dense and overlapping coverage areas, and experience high levels of interference. Fractional Frequency Reuse (FFR) is an attractive interference management technique due to its low complexity and overhead, and significant coverage improvement for low-percentile (cell-edge)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    New Results on the Sum of Gamma Random Variates With Application to the Performance of Wireless Communication Systems Over Nakagami-M Fading Channels

    In recent times, different diversity schemes have marked an important impact in the arena of wireless communication systems. The main reason behind this is that these different diversity schemes allow for multiple transmission and/or reception paths for the same signal. One of the optimal diversity combining scheme is the Maximal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Generalized FMD Detection for Spectrum Sensing Under Low Signal-to-Noise Ratio

    Spectrum sensing is a fundamental problem in cognitive radio. The authors propose a function of covariance matrix based detection algorithm for spectrum sensing in cognitive radio network. Monotonically increasing property of function of matrix involving trace operation is utilized as the cornerstone for this algorithm. The advantage of proposed algorithm...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Design and Analysis of Downlink Spectrum Sharing in Two-Tier Cognitive Femto Networks

    In two-tier networks consisting of a macrocell overlaid with femtocells in co-channel deployment and closed-access policy, spatial reuse is achieved at the price of severe intra-tier and cross-tier interference from concurrent transmissions. The interference causes significant performance degradation, particularly when coordination among Base Stations (BSs) is infeasible. Cognitive Radio (CR)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Group Secret Key Generation Over Broadcast Erasure Channels

    The authors consider a group of m trusted nodes that aim to create a shared secret key K over a wireless channel in the presence an eavesdropper Eve. They assume an erasure broadcast channel from one of the honest nodes to the rest of them including Eve. All of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Real Time Network Anomaly Detection Using Relative Entropy

    As the computer networks continue to increase in size, complexity and importance, the network security issue becomes more and more important. In this paper, the authors propose a real time anomaly detection system based on relative entropy. The proposed system captures the network traffic packets and then uses relative entropy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    A Combined Approach for QoS-Guaranteed and Low-Power Video Decoding

    This paper proposes a power management technique for video playback in mobile multimedia devices, which combines low-power video decoding and QoS-guaranteed algorithms: ILI (Interval-based Linear Interpolation) and QLB (QoS-guaranteed and Low-power Buffering). First, the proposed ILI algorithm precisely estimates the decoding time of video frames through interval-based linear interpolation. Second,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Cooperative Strategies in Wireless Relay Networks

    In this paper, the authors explain the cooperative strategies of relay stations in wireless relay networks. In such networks, relay stations distributed across the network and centrally controlled by the base station can be exploited to form cooperative antenna arrays. They show that via relay station cooperation, the achievable downstream...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Cyclic Feature Detection With Sub-Nyquist Sampling for Wideband Spectrum Sensing

    For cognitive radio networks, efficient and robust spectrum sensing is a crucial enabling step for dynamic spectrum access. Cognitive radios need to not only rapidly identify spectrum opportunities over very wide bandwidth, but also make reliable decisions in noise-uncertain environments. Cyclic spectrum sensing techniques work well under noise uncertainty, but...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Dynamic Spectrum Access: From Cognitive Radio to Network Radio

    Dynamic spectrum access is a new spectrum sharing paradigm that allows secondary users to access the abundant spectrum holes or white spaces in the licensed spectrum bands. DSA is a promising technology to alleviate the spectrum scarcity problem and increase spectrum utilization. While DSA has attracted many research efforts recently,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Routing in Pocket Switched Networks

    Pocket Switched Networks (PSNs) provide a new networking paradigm that takes advantage of human mobility to distribute data. Due to the frequent and long-duration disruptions of network links, routing in PSNs is non-trivial. In this paper, the authors first outline the challenges of PSN routing. After that, they summarize the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    GenProg: A Generic Method for Automatic Software Repair

    This paper describes GenProg, an automated method for repairing defects in off-the-shelf, legacy programs without formal specifications, program annotations, or special coding practices. GenProg uses an extended form of genetic programming to evolve a program variant that retains required functionality, but is not susceptible to a given defect, using existing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks

    In cognitive radio networks, the signal reception quality of a secondary user degrades due to the interference from multiple heterogeneous primary networks, and also the transmission activity of a secondary user is constrained by its interference to the primary networks. It is difficult to ensure the connectivity of the secondary...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Collaborative Caching in Wireless Video Streaming Through Resource Auctions

    Recent advances in wireless communications and mobile networking have dramatically increased the popularity of multimedia services for mobile users, with wireless video streaming at their fingertips. To facilitate efficient acquisition of video content, proxy caching has been widely used by Wireless Service Providers (WSPs), which typically deploy cache servers at...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Cooperative Geographic Routing With Radio Coverage Extension for SER-Constrained Wireless Relay Networks

    Cooperative communication for wireless networks has been extensively investigated from the perspective of physical layer design. However, the impact of physical-layer cooperation on the network-layer routing design still remains unclear. In this paper, the authors examine the potential benefit of radio coverage extension from cooperation, and present how to incorporate...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Opportunistic Cooperative Networking: To Relay or Not to Relay?

    In this paper, the authors consider Opportunistic Cooperative Networking (OCN) in wireless ad hoc networks, with a focus on characterizing the desired tradeoff between the probing cost for establishing cooperative relaying and hence higher throughput via opportunistic cooperative networking. Specifically, opportunistic cooperative networking is treated as an optimal stopping problem...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Distributed Best-Relay Selection for Improving TCP Performance Over Cognitive Radio Networks: A Cross-Layer Design Approach

    In Cognitive Radio (CR) networks, cooperative relaying is emerging as a key technology to improve the performance of secondary users (SUs), while ensuring the quality of service of primary transmissions. Most previous work in CR relay networks concentrates on maximizing physical layer data rate as a design criterion. However, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    MAC Centered Cooperation - Synergistic Design of Network Coding, Multi-Packet Reception, and Improved Fairness to Increase Network Throughput

    The authors design a cross-layer approach to aid in developing a cooperative solution using Multi-Packet Reception (MPR), Network Coding (NC), and Medium ACcess (MAC). They construct a model for the behavior of the IEEE 802.11 MAC protocol and apply it to key small canonical topology components and their larger counterparts....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Spectrum Harvesting and Sharing in Multi-Hop CRNs Under Uncertain Spectrum Supply

    The essential impediment to apply Cognitive Radio (CR) technology for efficient spectrum utilization lies in the uncertainty of licensed spectrum supply. In this paper, the authors propose a novel architecture for spectrum harvesting and sharing, and investigate the joint routing and frequency scheduling problem in multi-hop Cognitive Radio Networks (CRNs)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Joint Zero-Forcing Based Precoder Design for QoS-Aware Power Allocation in MIMO Cooperative Cellular Network

    In this paper, the authors explain about the cellular system scenario where multiple data streams originating from a Base Station (BS) targeted to multiple cell-edge Mobile Stations (MSs) are transmitted via preinstalled cooperative Relay Stations (RSs) with multiple antennas. Their objective is to guarantee Quality-of-Service (QoS) in terms of predefined...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Decomposed LT Codes for Cooperative Relay Communications

    Forward Error Correction (FEC) is commonly adopted in cooperative relay communications to ensure link-layer communication reliability. Among those schemes, rate-less fountain codes, such as Luby Transform (LT) codes, are favorable for their low complexity and rate adaptability to channel fading dynamics. However, the cooperative transmission schemes based on primitive fountain...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Delegation-Based I/O Mechanism for High Performance Computing Systems

    Massively parallel applications often require periodic data checkpointing for program restart and post-run data analysis. Although high performance computing systems provide massive parallelism and computing power to fulfill the crucial requirements of the scientific applications, the I/O tasks of high-end applications do not scale. Strict data consistency semantics adopted from...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Secure Virtualization for Cloud Environment Using Hypervisor-based Technology

    Cloud computing is one of today's most exciting technologies, because it can reduce the cost and complexity of applications, and it is flexible and scalable. These benefits changed cloud computing from a dreamy idea into one of the fastest growing technologies today. Actually, virtualization technology is built on virtualization technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks

    The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at different geographic locations. Furthermore, even the same stationary receiver may experience drastic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Extending Attack Graph-Based Security Metrics and Aggregating Their Application

    The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Model Based Separation of Overlapping Latent Fingerprints

    Latent fingerprints lifted from crime scenes often contain overlapping prints, which are difficult to separate and match by state-of-the-art fingerprint matchers. A few methods have been proposed to separate overlapping fingerprints to enable fingerprint matchers to successfully match the component fingerprints. These methods are limited by the accuracy of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2012

    Characterizing the Gaming Traffic of World of Warcraft: From Game Scenarios to Network Access Technologies

    Over the past decade, massively multiplayer online role-playing games have become very popular and profitable, and they have attracted millions of people to play for fun in the virtual world. In this paper, the authors first identify the fundamental challenges in MMORPG traffic analysis. Then, they mainly focus on the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Modifying Boolean Functions to Ensure Maximum Algebraic Immunity

    The algebraic immunity of cryptographic Boolean functions is studied in this paper. Proper modifications of functions achieving maximum algebraic immunity are proved, in order to yield new functions of also maximum algebraic immunity. It is shown that the derived results apply to known classes of functions. Moreover, two new efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Real-Time Behaviour Profiling for Network Monitoring

    This paper addresses the problem of target counting based on the Monte Carlo simulation. The authors rely on an Accept-Reject process to guide the placement of virtual targets in a virtual sensor field, which has exactly the same sensor layout as the real one. The objective of this construction is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Iterative Tracking the Minimum of Overall Energy Consumption in OFDMA Systems

    Although energy efficiency of communication systems has been studied for years, minimizing overall energy consumption of OFDMA downlink systems is still a challenge. In view of usual implementations, in this paper the energy consumption of control processor, specific circuit and analog front-end are jointly minimized, with algorithm complexity, resource scheduling,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Exploring Terabit Wireless Potential of Wavelength Division Multiplexing

    Terabit wireless potential of Wavelength Division Multiplexing (WDM) is explored in this paper, through a novel detection algorithm over single-slit receiver. Different from current solutions that separates signals on different wavelengths by optical components (e.g. lens), the authors' solution is based on simpler architecture and signal processing. The receiving signal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Energy Efficient OFDMA: Trade-Off Between Computation and Transmission Energy

    The authors study minimization of overall energy consumption of OFDMA systems, which are widely adopted in future wireless communications. Based on the existing resource allocation to minimize transmission energy, the computation energy increases due to the complexity of allocating algorithms. Since, high performance algorithms usually have high complexity, there exist...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Cross-layer Optimization Using Advanced Physical Layer Techniques in Wireless Mesh Networks

    The objective of this paper is to study the impact of advanced physical layer techniques on the maximum achievable throughput of wireless multi-hop mesh networks. The authors formulate a cross-layer optimization framework for the routing and scheduling problem jointly with the following physical layer techniques: successive interference cancellation, superposition coding,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

    Continuously monitoring link performance is important to network diagnosis. In this paper, the authors address the problem of minimizing the probing cost and achieving identifiability in probe based network link monitoring. Given a set of links to monitor, their objective is to select the minimum number of probing paths that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    CellSense: An Accurate Energy-Efficient GSM Positioning System

    Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, the authors present CellSense, a probabilistic RSSI-based fingerprinting location determination system for GSM phones. They discuss the challenges of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Detecting Botnet Using Data Mining

    As with the increase in the number of spywares, malwares over Internet and Distributed Networks, Botnets are emerging as the most serious threat against Cyber security in one way or another as they act as basis for various Illegal activities like Denial of Service Attacks (DoS Attacks), Malwares, Phishing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Community Dynamics and Analysis of Decadal Trends in Climate Data

    The application of complex networks to study complex phenomena, including the Internet, social networks, food networks, and others, has seen a growing interest in recent years. In particular, the use of complex networks and network theory to analyze the behavior of the climate system is an emerging topic. This newfound...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Optimal Pilots for Frequency Offset and Channel Estimation in OFDMA Uplink

    Optimal pilots design and placement for the frequency offset and channel estimation in Orthogonal Frequency Division Multiplexing Access (OFDMA) uplink systems are proposed. The received pilots of multiple users can always be demodulated, even if they are totally overlapped due to the large frequency offsets. With the knowledge of Channel...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Power Allocation in Wireless Relay Networks: A Geometric Programming-Based Approach

    In this paper, the authors consider an Amplify-and-Forward (AF) wireless relay system where multiple source nodes communicate with their corresponding destination nodes with the help of relay nodes. While each user is assisted by one relay, one relay can assist many users. Conventionally, each relay node is assumed to equally...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    On the Eigenvalue Distribution of Correlated MIMO Channels by Character Expansion of Groups

    Multiple-Input Multiple-Output (MIMO) channels have been studied from various aspects including the average of the mutual information between the transmitter and receiver (ergodic capacity) when the channel gains are known to the receiver only. A common approach for capacity analysis is to find the Moment Generating Function (MGF) of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Maximum Likelihood Detection for Differential Unitary Space-Time Modulation With Carrier Frequency Offset

    Can conventional Differential Unitary Space Time Modulation (DUSTM) be applied when there is an unknown Carrier Frequency Offset (CFO)? This paper answers this question affirmatively and derives the necessary Maximum Likelihood (ML) detection rule. The asymptotic performance of the proposed ML rule is analyzed, leading to a code design criterion...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    On the Interplay of Parallelization, Program Performance, and Energy Consumption

    This paper derives simple, yet fundamental formulas to describe the interplay between parallelism of an application, program performance, and energy consumption. Given the ratio of serial and parallel portions in an application and the number of processors, the authors derive optimal frequencies allocated to the serial and parallel regions in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Perfectory: A Fault-Tolerant Directory Memory Architecture

    The number of CPUs in chip multiprocessors is growing at the Moore's Law rate, due to continued technology advances. However, new technologies pose serious reliability challenges, such as more frequent occurrences of degraded or even nonoperational devices, and they threaten the cost-effectiveness and dependability of future computing systems. This work...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2009

    Protecting Location Privacy With Personalized k-Anonymity: Architecture and Algorithms

    Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of Location-Based Services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level Dynamics

    The authors consider multiuser scheduling in wireless networks with channel variations and flow-level dynamics. Recently, it has been shown that the MaxWeight algorithm, which is throughput-optimal in networks with a fixed number of users, fails to achieve the maximum throughput in the presence of flow-level dynamics. In this paper, they...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Buffered Aloha With K-Exponential Backoff Part I: Stability and Throughput Analysis

    This two-part paper series studies the performance of buffered Aloha networks with K-Exponential Backoff collision resolution algorithms. Part I focuses on stability and throughput analysis and Part II presents the delay analysis. In Part I, the buffered Aloha network is modeled as a multi-queue single-server system. The authors adopt a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2010

    Performance and Energy Implications of Many-Core Caches for Throughput Computing

    Processors that target throughput computing often have many cores, which stresses the cache hierarchy. Logically centralized, shared data storage is needed for many-core chips to provide high cache throughput for heavily read-write shared lines. Techniques to reduce on-die and off-die traffic have a dramatic energy benefit for many-core chips Throughput...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    MobiCent: A Credit-Based Incentive System for Disruption Tolerant Network

    When Disruption Tolerant Network (DTN) is used in commercial environments, incentive mechanism should be employed to encourage cooperation among selfish mobile users. Key challenges in the design of an incentive scheme for DTN are that disconnections among nodes are the norm rather than exception and network topology is time varying....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Information Quality Aware Routing in Event-Driven Sensor Networks

    Upon the occurrence of a phenomenon of interest in a wireless sensor network, multiple sensors may be activated, leading to data implosion and redundancy. Data aggregation and/or fusion techniques exploit spatio-temporal correlation among sensory data to reduce traffic load and mitigate congestion. However, this is often at the expense of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Robustness of DTN Against Routing Attacks

    In this paper, the authors study robustness of DTN routing in the absence of authentication. They identify conditions for an attack to be effective and present an attack based on a combination of targeted flooding and acknowledgement counterfeiting that is highly effective even with only a small number of attackers....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    Using the Physical Layer for Wireless Authentication in Time-Variant Channels

    The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper the authors propose ways to exploit the spatial variability of the radio channel response in a rich scattering environment, as is typical of indoor environments. Specifically, they describe a physical-layer...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Developing a Single Model and Test Prioritization Strategies for Event-Driven Software

    Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and Web applications. These EDSs pose a challenge to testing because there are a large number of possible event sequences that users can invoke through a user interface. While valuable contributions have been made for testing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    GUI Interaction Testing: Incorporating Event Context

    Graphical User Interfaces (GUIs), due to their event driven nature, present an enormous and potentially unbounded way for users to interact with software. During testing it is important to "Adequately cover" this interaction space. In this paper, the authors develop a new family of coverage criteria for GUI testing grounded...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Using Methods & Measures From Network Analysis for GUI Testing

    Graphical User Interfaces (GUIs) for today's applications are extremely large. Moreover, they provide many degrees of freedom to the end-user, thus allowing the user to perform a very large number of event sequences on the GUI. The large sizes and degrees of freedom create severe problems for GUI quality assurance,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation

    It is crucial to detect zero-day polymorphic worms and to generate signatures at network gateways or honeynets so that the authors can prevent worms from propagating at their early phase. However, most existing network-based signatures are specific to exploit and can be easily evaded. In this paper, the authors propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2009

    POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority

    Packet Forwarding Prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of network measurements, the performance of applications and the effectiveness of network troubleshooting procedures. Despite its potential impacts, no information on PFP settings is readily...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    A Threat Taxonomy for MHealth Privacy

    Networked mobile devices have great potential to enable individuals (and their physicians) to better monitor their health and to manage medical conditions. In this paper, the authors examine the privacy-related threats to these so-called mHealth technologies. They develop a taxonomy of the privacy-related threats, and discuss some of the technologies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Meta-Recognition: The Theory and Practice of Recognition Score Analysis

    In this paper, the authors define meta-recognition, a performance prediction method for recognition algorithms, and examine the theoretical basis for its post-recognition score analysis form through the use of the statistical Extreme Value Theory (EVT). The ability to predict the performance of a recognition system based on its outputs for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Quantifying Overprovisioning Vs. Class-of-Service: Informing the Net Neutrality Debate

    The benefit of Class-of-Service (CoS) is an important topic in the "Network Neutrality" debate. Proponents of network neutrality suggest that over-provisioning is a viable alternative to CoS. The authors quantify the extra capacity requirement for an over-provisioned classless (i.e., best-effort) network compared to a CoS network providing the same delay...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Meta-Headers: Top-Down Networking Architecture With Application-Specific Constraints

    The direction of cross-layer wireless research has been prominently bottom-up, i.e., optimizing higher layer protocols based on the characteristics of the underlying wireless communication medium. Though this approach has been essential for efficient use of scarce wireless connectivity and bandwidth, there is a recent trend for massive availability of wireless...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2008

    Large-Scale Network Parameter Configuration Using an On-Line Simulation Framework

    As the Internet infrastructure grows to support a variety of services, its legacy protocols are being overloaded with new functions such as traffic engineering. Today, operators engineer such capabilities through clever, but manual parameter tuning. In this paper, the authors propose a back-end support tool for large-scale parameter configuration that...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Limited Scale-Free Overlay Topologies for Unstructured Peer-to-Peer Networks

    In unstructured Peer-To-Peer (P2P) networks, the overlay topology (or connectivity graph) among peers is a crucial component in addition to the peer/data organization and search. Topological characteristics have profound impact on the efficiency of a search on such unstructured P2P networks, as well as other networks. A key limitation of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Cross-Layer Techniques for Failure Restoration of IP Multicast With Applications to IPTV

    Broadcast TV distribution over an IP network requires stringent QoS constraints, such as low latency and loss. Streaming content in IPTV is typically delivered to distribution points on an IP backbone using IP multicast protocols such as Protocol Independent Multicast Source Specific Mode (PIMSSM). Link-restoration using MPLS or layer-2 Fast...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Prototyping Multi-Transceiver Free-Space-Optical Communication Structures

    Wireless networking has conventionally been realized via Radio Frequency (RF) based communication technologies. However, the capacity of these networks is limited by the availability of the RF spectrum. Free-Space-Optical (FSO) communication has the potential to deliver wireless communication links at optical-level speeds. Although it has the advantage of high-speed modulation,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Virtual Direction Routing for Overlay Networks

    The enormous interest for peer-to-peer systems in recent years has prompted research into finding scalable and robust seeding and searching methods to support these overlay networks. Routing and search in these overlay networks have ranged from flooding-based unstructured techniques to structured ones mainly for popular and rate items respectively. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    3-D Optical Wireless Localization

    In this paper, the authors explore the possibility of using directionality of free-space-optical (a.k.a. optical wireless) communications for solving the 3-D localization problem in ad-hoc networking environments. Range-based localization methods either require a higher node density (i.e., at least three other localized neighbours must exist) than required for assuring connectedness...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Scheduling Data Delivery in Heterogeneous Wireless Sensor Networks

    In this paper the authors present a proxy-level scheduler that can significantly improve QoS in heterogeneous wireless sensor networks while at the same time reducing the overall power consumption. The scheduler is transparent to both applications and MAC in order to take the advantage of the standard off-the-shelf components. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Unraveling the BitTorrent Ecosystem

    BitTorrent is the most successful open Internet application for content distribution. Despite its importance, both in terms of its footprint in the Internet and the influence it has on emerging P2P applications, the BitTorrent Ecosystem is only partially understood. The authors seek to provide a nearly complete picture of the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Accurate Temperature Estimation for Efficient Thermal Management

    Dynamic thermal management techniques require accurate runtime temperature information in order to operate effectively and efficiently. In this paper, the authors propose two novel solutions for accurate sensing of on-chip temperature. The first technique is used at design time for sensor allocation and placement to minimize the number of sensors...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Adaptive Precoding for Switching Between Spatial Multiplexing and Diversity in MIMO OFDM With Transmit Antenna and Path Correlations

    The path and antenna correlations significantly degrade the system capacity in spatially-multiplexed Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency-Division Multiplexing (OFDM) systems and increase Bit Error Rate (BER) in Orthogonal Space-Time Block Coded (OSTBC) OFDM. The authors develop adaptive dual-mode precoding to improve system performance with transmit antenna and path correlations. Both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Non-Linear Precoding for OFDM Systems in Spatially-Correlated Frequency-Selective Fading MIMO Channels

    This paper presents non-linear precoding design in closed-loop Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency-Division Multiplexing (OFDM) over spatially-correlated, frequency-selective fading channels. The authors' analysis takes into consideration receiver channel mismatch due to imperfect channel estimates, and transmitter channel mismatch due to estimation errors, channel variations over feedback delay and feedback noise....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Performance Analysis of Decode-And-Forward Relay Network Under Adaptive M-QAM

    In this paper, the performance of a cooperative Decode-and-Forward (DF) relay network with adaptive M-ary Quadrature Amplitude Modulation (M-QAM) is analyzed. A five mode adaptive M-QAM scheme is employed, and the system performance is investigated for both fixed switching levels and for optimized switching levels with a target Bit Error...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Unified Performance Analysis of Two Hop Amplify and Forward Relaying

    Wireless relay networks have been studied extensively in the recent literature. Amplify and Forward (AF) is one of the most widely used type of relaying. Even though special cases such as channel-noise-assisted, channel-assisted and blind relay modes have been analyzed, a unified performance analysis seems to be not available. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    The Effect of Imperfect Carrier Frequency Offset Estimation on an OFDMA Uplink

    In the uplink of Orthogonal Frequency-Division Multiple Access (OFDMA) systems, the user carrier frequency offsets result in Inter-Carrier-Interference (ICI) and Multiple-User-Interference (MUI), leading to a degradation of the Bit Error Rate (BER). This paper treats this uplink scenario and derives the average uplink capacity and the BER using the Signal-to-Interference-and-Noise...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    On the Capacity of Rayleigh Fading Cooperative Systems Under Adaptive Transmission

    In this paper, the use of adaptive source transmission with amplify-and-forward relaying is proposed. Three different adaptive techniques are considered: optimal simultaneous power and rate adaptation; constant power with optimal rate adaptation; and channel inversion with fixed rate. The capacity upper bounds of these adaptive protocols are derived for the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Performance of Optimum Switching Adaptive M-QAM for Amplify-and-Forward Relays

    Adaptive transmission techniques have been extensively studied in conjunction with classical (i.e., non-cooperative) communication networks. Adaptation effectively exploits the time-varying wireless channel by transmitting at higher speeds and/or higher power under favorable channel conditions and reduced speeds and/or power under poor channel conditions. For instance, the transmitted power level, the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Network Lifetime Maximization With Node Admission in Wireless Multimedia Sensor Networks

    Wireless Multimedia Sensor Networks (WMSNs) are expected to support multimedia services such as delivery of video and audio streams. However, due to the relatively stringent Quality-of-Service (QoS) requirements of multimedia services (e.g., high transmission rates and timely delivery) and the limited wireless resources, it is possible that not all the...

    Provided By Institute of Electrical and Electronics Engineers