Institute of Electrical and Electronics Engineers

Displaying 41-80 of 7347 results

  • White Papers // Mar 2013

    Enhanced Power Management for Wi-Fi Direct

    Research presented in this paper enhances the power management schemes of Wi-Fi Direct to provide better services for a wider range of Wi-Fi Peer-To-Peer (P2P) applications. Although the Wi-Fi Direct defines two power management schemes to provide energy efficiency in P2P devices, neither is enough to meet power efficiency and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Contention-Vector Based Hybrid Scheduling Algorithm for Wireless Networks

    A good scheduling algorithm in wireless networks is the key for the efficient use of wireless medium. This paper presents a hybrid scheduling algorithm, called Contention-Vector based Hybrid Scheduling (CVHS) algorithm, for wireless networks wherein stations can sense each other. Examples of such wireless networks include Wireless LANs and small...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding with Remix Qualification for Multicasting in Delay-Tolerant Networks

    In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and Mobile Ad-hoc NETworks. However, multicasting with replication-based methodologies can induce considerable message traffic and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Wideband MIMO Channel Capacity Analysis Based on Indoor Channel Measurement

    Based on the channel measurement in a typical indoor environment, wideband Multi-Input Multi-Output (MIMO) channel capacity analysis result is reported in this paper. A series of Non Line-Of-Sight (NLOS) and LOS measurement positions are planned for capacity comparison in different propagation conditions. For fixed received Signal-to-Noise Ratio (SNR), slight average...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Error Performance and Diversity Analysis of Multi-Source Multi-Relay Wireless Networks with Binary Network Coding and Cooperative MRC

    In this paper, the authors contribute to the theoretical understanding, the design, and the performance evaluation of multi-source multi-relay network-coded cooperative diversity protocols. These protocols are useful to counteract the spectral inefficiency of repetition-based cooperation. They provide a general analytical framework for analysis and design of wireless networks using the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Inducing Optimal Service Capacities via Performance-Based Allocation of Demand in a Queueing System with Multiple Servers

    In this paper, the authors study the use of performance-based allocation of demand in a multiple-server queuing system. The same problem with two servers has been studied in the literature. Specifically, it has been proposed and proved that the linear allocation and mixed threshold allocation policies are, respectively, the optimal...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers

    It is getting popular that customers make use of third party data service providers to store their data and emails. It is common to have a large server shared by many different users. This creates a big problem for forensic investigation. It may not be easy to clone a copy...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Taking Advantage of Service Selection: A Study on The Testing of Location-Based Web Services Through Test Case Prioritization

    Dynamic service compositions pose new verification and validation challenges such as uncertainty in service membership. Moreover, applying an entire test suite to loosely coupled services one after another in the same composition can be too rigid and restrictive. In this paper, the authors investigate the impact of service selection on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    An Empirical Study of the Use of Frankl-Weyuker Data Flow Testing Criteria to Test BPEL Web Services

    Programs using Service-Oriented Architecture (SOA) often feature ultra-late binding among components. These components have well-defined interfaces and are known as web services. Messages between every pair of web services dually conform to the output interface of a sender and the input interface of a receiver. Unit testing of web services...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Real-Time GPU-Based Software Beamformer Designed for Advanced Imaging Methods Research

    High computational demand is known to be a technical hurdle for real-time implementation of advanced methods like Synthetic Aperture Imaging (SAI) and Plane Wave Imaging (PWI) that work with the pre-beamform data of each array element. In this paper, the authors present the development of a software beamformer for SAI...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    RFID-Enabled Real-time Manufacturing Execution System for Discrete Manufacturing: Software Design and Implementation

    Discrete Manufacturing (DM) refers to produce products in non-sequential processes so as to respond to market and customer requirements quickly under limited lead-time. However, in shop-floor management, DM companies usually confront challenges such as information gaps between different manufacturing units, slow responsiveness to customer changes, and poor visualization. The main...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    An Extendible Software for Learning to Write Chinese Characters in Correct Stroke Sequences on Smartphones

    With the fast economic development in China, learning to understand Chinese becomes very crucial and popular worldwide. To most foreigners and even native Chinese students, one of the major challenges in learning Chinese is to write Chinese characters in correct stroke sequences since the correct stroke sequences of writing any...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    TrC-MC: Decentralized Software Transactional Memory for Multi-Multicore Computers

    To achieve single-lock atomicity in software transactional memory systems, the commit procedure often goes through a common clock variable. When there are frequent transactional commits, clock sharing becomes inefficient. Tremendous cache contention takes place between the processors and the computing throughput no longer scales with processor count. Therefore, traditional transactional...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Automatic Generation of Normal Forms for Testing Object-Oriented Software

    Testing object-oriented software is more complex than its procedural counterpart. The concept of "Fundamental pairs" was introduced in the authors' TACCLE methodology for testing object-oriented software. It was proved that, although the set of fundamental pairs is only a proper subset of equivalent ground terms, the use of fundamental pairs...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Lean Implementations of Software Testing Tools Using XML Representations of Source Codes

    By utilizing XML representations of source programs under test, a new approach is proposed to concisely implement some prototypes for TACCLE, a software testing methodology. The conversions between a source program and its XML representation can be easily realized using existing conversion tools. In this way, the conversion tools can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reference Models and Automatic Oracles for the Testing of Mesh Simplification Software for Graphics Rendering

    Software with graphics rendering is an important class of applications. Many of them use polygonal models to represent the graphics. Mesh simplification is a vital technique to vary the levels of object details and hence, improve the overall performance of the rendering process. It progressively enhances the effectiveness of rendering...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Incentive Effects of Common and Separate Queues with Multiple Servers: The Principal-Agent Perspective

    A two-server service network has been studied by Gilbert and Weng from the principal-agent perspective. In the model, services are rendered by two independent facilities coordinated by an agency. The agency must devise a strategy to allocate customers to the facilities and determine the compensation. A common queue allocation scheme...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Accuracy Improvement Of Connectivity-Based Sensor Network Localization

    The early results from connectivity-based sensor network localization suffer from disappointing accuracy. The reason is partly due to the limited information of the problem and also the deficiencies of the algorithms. This paper proposes a two-level range/indication of connectivity between each pair of nodes, which would indicate three levels of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Localization in Wireless Sensor Networks with Gradient Descent

    In this paper, the authors present two distance-based sensor network localization algorithms. The location of the sensors is unknown initially and they can estimate the relative locations of sensors by using knowledge of inter-sensor distance measurements. Together with the knowledge of the absolute locations of three or more sensors, they...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Optimal Rate Assignment Strategy to Minimize Average Waiting Time in Wireless Networks

    In a wireless network that supports multiple flows, allocation of bandwidth resource among the flows is one of the critical problems. Different allocation strategies have been developed based on different optimization objectives. Unfortunately, these objectives may not reflect directly the time needed for a flow to transmit what it wants....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Coding and Interference Aware Path Bandwidth Estimation in Multi-hop Wireless Networks

    Network coding is known to be a promising technology to increase the bandwidth capacity in wireless networks. To the authors' best knowledge, there is limited work on studying the available bandwidth for a given path with network coding. This paper presents a new method to estimate the available bandwidth of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Routing in Multi-Radio Multi-Channel Multi-hop Wireless Mesh Networks with Bandwidth Guarantees

    In this paper, the authors propose a new path metric for finding the maximum available bandwidth path in the multi-radio multi-channel wireless mesh networks. They formally prove that the path metric is isotonic, which is the necessary and sufficient condition for assuring the proper operation of the routing algorithm. Based...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Coding Aware Routing in Wireless Networks with Bandwidth Guarantees

    In this paper, the authors discusses the problem of computing the maximum available bandwidth of a given path in TDMA-based network with network coding, which is a fundamental issue for supporting QoS with bandwidth requirement in wireless networks. They present a new path bandwidth computation mechanism considering physical-layer network coding....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Novel Bandwidth Strategy for Wireless P2P File Sharing

    With the rapid development of the mobile device technology and wireless network technology, the need of an efficient file sharing method on wireless network becomes more and more significant. Peer-To-Peer(P2P) file distribution, as a quite popular method being used now, is a promising choice. However, the limitation of bandwidth of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Joint Routing and Scheduling Algorithm for Efficient Broadcast in Wireless Mesh Networks

    With the increasing popularity of Wireless Mesh Networks (WMNs), broadcasting traffic (e.g. IP-TV) will contribute a large portion of network load. In this paper, the authors consider a multi-channel multi-interface WMN with real time broadcast call arrivals. Aiming at maximizing the call acceptance rate of the network, an efficient broadcast...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    On Joint Synchronization of Clock Offset and Skew for Wireless Sensor Networks Under Exponential Delay

    Wireless Sensor Network (WSN), emerged as an important research area in recent years, consists of many small-scale miniature devices (or sensor nodes) capable of onboard sensing, computing and communications. In this paper, the problem of clock synchronization for Wireless Sensor Network (WSN) under exponential delay is analyzed based on two-way...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Throughput-Optimized Opportunistic Scheduling for Rate-Guaranteed and Best-Effort Users in Wireless Networks

    The authors study opportunistic scheduling algorithms in a wireless network with a central base station communicating with multiple users on a single shared channel using time division multiple access. They assume the coexistence of both Rate Guaranteed (RG) users and Best Effort (BE) users in the system. A RG user...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    VCG-Based Time-Slot Auctioning in IEEE 802.16 OFDM/TDMA Wireless Mesh Networks

    In this paper, the authors study the problem of bandwidth resource allocation in a non-cooperative IEEE 802.16 OFDM/TDMA based wireless mesh network and propose an auction based framework in which the gateway, equipped with the precious high speed Internet connection, serves as the auctioneer while the first-level Mesh Routers (MRs)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    The Effect of Information on Scheduling Performance in Multi-hop Wireless Networks

    Previous research has estimated the capacity of wireless networks by assuming that each node in the network can obtain precise network information. However, in reality, available network information is mostly imprecise and incomplete. In this paper, the authors study the relationship between the information obtained by each node and the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Mobile Computing - A Green Computing Resource

    Cloud computing provides an approach to accessing shared computing resources. However, a traditional cloud is composed of powerful but energy-hungry workstations. The growth of the population of mobile devices such as smart phones and tablets provides huge amount of idling computing power. In this paper, the authors describe the design...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Impact of Overhead on Spectral Efficiency of Cooperative Relaying

    It is well known that cooperative relaying has the potential to improve the performance of wireless communication. However, compared with point-to-point communication, cooperative relaying requires much more overhead to implement. In this paper, the authors quantitatively analyze the overhead in implementing cooperative relaying, in particular, the overhead to acquire essential...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    Cross-Layer Strategies for Throughput Maximization in a Data Aggregating Wireless Network

    The authors consider an ad-hoc wireless network where all nodes have data to send to a single destination node called the sink. They consider a linear placement of the wireless nodes with the sink at one end. They assume that the wireless nodes transfer data to the sink using single...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    CSI Sharing Strategies for Transmitter Cooperation in Wireless Networks

    Multiple-antenna "Based" transmitter (TX) cooperation has been established as a promising tool towards avoiding, aligning, or shaping the interference resulting from aggressive spectral reuse. The price paid in the form of feedback and exchanging Channel State Information (CSI) between cooperating devices in most existing methods is often underestimated however. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    A Survey of Intrusion Detection Systems in Wireless Sensor Networks

    Wireless sensor networking is one of the most promising technologies that have applications ranging from health care to tactical military. Although Wireless Sensor Networks (WSNs) have appealing features (e.g., low installation cost, unattended network operation), due to the lack of a physical line of defense (i.e., there are no gateways...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches

    The proliferation of wideband and Internet technologies in the last decade has generated a significant growth of the risk of security threats hidden in single packets. This fact has lead ISP networks to the adoption of Intrusion Detection Systems, burdening the basic routing with packets inspection, in order to provide...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2013

    A Scheme for the Generation of Strong ICMetrics Based Session Key Pairs for Secure Embedded System Applications

    In this paper, the authors present a scheme for the generation of strong session based ICMetrics key pairs for security critical embedded system applications. ICMetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. In the proposed scheme a random...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Linear Processing and Sum Throughput in the Multiuser MIMO Downlink

    The authors consider linear precoding and decoding in the downlink of a multiuser Multiple-Input, Multiple-Output (MIMO) system, wherein each user may receive more than one data stream. They propose several Mean Squared Error (MSE) based criteria for joint transmit-receive optimization and establish a series of relationships linking these criteria to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    Frequency Planning for Inter-Cell Interference Reduction in 3-Cell Collaborative MIMO Systems

    Multi-BS MIMO can substantially mitigate the inter-cell interference for enhance the cell coverage. But the cell edge user may or may not support this feature. On the other hand, the system also provides the FFR feature to mitigate the inter-cell interference for cell edge user. How the multi-BS MIMO operation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    FOTP: Face-Based Object Tracking Protocol in Wireless Sensor Network

    Object tracking is an important application in Wireless Sensor Network (WSN). High-accuracy and energy-efficiency are key requirements. In this paper, the authors propose a novel Face-based Object Tracking Protocol (FOTP), which is used to track the object with low energy consumption and high quality. FOTP combines a hexagon algorithm with...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Speckled Computing: Evolution and Challenges

    Speckled computing is an emerging technology in which data will be sensed in a minute, ultimately around one cubic millimeter, semi conductor grain called speck. Wireless network of thousands of specks called SpeckNet and distributed processing of information on programmable network is termed as Speckled Computing. Specks are not new,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Energy-Efficiency Continuous Object Tracking Via Automatically Adjusting Sensing Range in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) can be used in many applications. Object tracking is one of the most important applications. There are many researches about tracking individual object but few researches on tracking continuous object. Continuous object affects a large number of nodes so needs more communication and cooperation to track...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2009

    Private Cluster Head Election in Wireless Sensor Networks

    Clustering is a useful mechanism in wireless sensor networks that helps to cope with scalability problems and, if combined with in-network data aggregation, may increase the energy efficiency of the network. At the same time, by assigning a special role to the cluster head nodes, clustering makes the network more...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Cloud Computing the New Frontier of Internet Computing

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies and raises issues in the architecture, design, and implementation of existing networks and data centers. The relevant research has just recently gained momentum, and the space of potential ideas and solutions is still far...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    A Secure Distributed Transport Protocol for Wireless Sensor Networks

    The authors propose a secure distributed transport protocol for wireless sensor networks that resists against attacks on the reliability service provided by the protocol, as well as against energy depleting attacks. Their protocol is based on the Distributed Transport for Sensor Networks (DTSN) protocol, to which they add a security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments

    In this paper, the authors address the problem of assigning the sink role to a subset of nodes in a wireless sensor network with a given topology such that the resulting network configuration is robust against denial-of-service type attacks such as node destruction, battery exhaustion and jamming. In order to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Misbehaving Router Detection in Link-State Routing for Wireless Mesh Network

    In this paper, the authors address the problem of detecting misbehaving routers in wireless mesh networks and avoiding them when selecting routes. They assume that link-state routing is used, and they essentially propose a reputation system, where trusted gateway nodes compute Node Trust Values for the routers, which are fed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Real-Time Location and Inpatient Care Systems Based on Passive RFID

    RFID technology meets identification and tracking requirements in healthcare environments with potential to speed up and increase reliability of involved processes. Due to this, high expectations for this integration have emerged, but hospital and medical centers interested in adoption of RFID technology require prior knowledge on how to squeeze RFID...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    Sensor Placement Algorithms for Fusion-Based Surveillance Networks

    Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fusion has been shown as an effective technique for improving system detection performance by enabling efficient collaboration among sensors with limited sensing capability. Due to the high cost...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Optimal Power Allocation for Achieving Perfect Secrecy Capacity in MIMO Wire-Tap Channels

    In this paper, the authors investigate optimal power allocation to achieve perfect secrecy capacity in Gaussian MIMO wiretap channels. The number of antennas in the MIMO wire-tap channel is arbitrary at the transmitter, the intended receiver, and the eavesdropper. For this challenging non-convex optimization problem, they design a novel global...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    A Simple Information-Theoretic Analysis of Clustered Sensor Networks With Decentralized Detection

    Distributed detection has been an active research field for a long time. The increasing interest for sensor networks has spurred a significant activity on the design of efficient distributed detection techniques. Information theoretic approaches have also been proposed for the study of sensor networks with decentralized detection. The authors propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    On Non-Cooperative Block-Faded Orthogonal Multiple Access Schemes With Correlated Sources

    In this paper, the authors study the performance of non-cooperative multiple access systems with noisy separated channels, where correlated sources communicate to an Access Point (AP) through block-faded links. In the considered scenario, perfect Channel State Information (CSI) is assumed at the receiver while no CSI is available at the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2011

    Design of Optimized Convolutional and Serially Concatenated Convolutional Codes in the Presence of A-Priori Information

    In this paper, the authors focus on the design of optimized binary Convolutional Codes (CCs) and Serially Concatenated Convolutional Codes (SCCCs) in the presence of A-Priori Information (API) at the receiver. For large Signal-to-Noise Ratios (SNRs), they first propose a CC design criterion based on the minimization of a union...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    A Tiling-Based Approach for Directional Sensor Network Deployment

    In this paper, the authors propose a tiling-based Wireless Sensor Network (WSN) deployment approach based on the polygon model for sensor nodes with directional sensing areas. In the tiling-based deployment approach, a hexagon tile is first generated from the polygon that represents the sensing area of a given directional sensor....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues

    Although 3G networks have been largely deployed to cope with the increasing demand of wireless data services, little is known on how these networks are used from the network perspective. In this paper, the authors present analysis of data services based on a nation-wide 3G network trace collected from one...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    Balancing the Tradeoffs Between Query Delay and Data Availability in MANETs

    In Mobile Ad hoc NETworks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2011

    V-PADA: Vehicle-Platoon-Aware Data Access in VANETs

    The high mobility of vehicles and the unreliable wireless communication significantly degrade the performance of data access in Vehicular Ad hoc NETworks (VANETs). To address this problem, the authors propose a novel vehicle-platoon-aware data access solution called V-PADA. In V-PADA, vehicles contribute part of their buffers to replicate data for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Cost-Effective Multiperiod Spraying for Routing in Delay-Tolerant Networks

    In this paper, the authors present a novel multi-period spraying algorithm for routing in Delay-Tolerant Networks (DTNs). The goal is to minimize the average copy count used per message until the delivery while maintaining the predefined message delivery rate by the given deadline. In each period, some numbers of additional...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Decentralized Detection in Clustered Sensor Networks

    The authors investigate decentralized detection in clustered sensor networks with hierarchical multi-level fusion. They focus on simple majority-like fusion strategies, leading to closed-form analytical performance evaluation. The sensor nodes observe a binary phenomenon and transmit their own data to an Access Point (AP), possibly through intermediate Fusion Centers (FCs). They...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Vehicular Ad Hoc Network Paradigm and Evaluation of IEEE 802.11a and IEEE 802.11p Using Realistic Vehicular Traces

    In recent years, the vehicular communication has become an innovative and sophisticated way to provide necessary information to the rural or urban travelers in roads and motorways. Through the idea of multi-hop ad hoc networking, it is possible to efficiently disseminate traffic related information to the drivers and utilise the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2009

    An Intelligent Handoff Decision Algorithm

    In this paper, a new handoff algorithm has been proposed. The subscriber in a mobile communication network is free to move around. Handoff occurs when the subscriber moves from one cell to another cell. In the proposed handoff decision algorithm mobile station can intelligently make a prediction of its next...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Seamless Handover of IPTV Streams in a Wireless LAN Network

    A robust mechanism to enable seamless handover of streamed IPTV in a WLAN is presented. Handover in a wireless network is usually based on signal strength measurements, but that approach does not consider levels of congestion within the network. Here, the case of stationary nodes with varying levels of network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2011

    Improving Physical Layer Multicast by Cooperative Communications in Heterogeneous Networks

    Recently, Heterogeneous Networks (HetNets) have drawn significant attention from academia and industry as an efficient way to improve the capacity and coverage of cellular systems. In addition to unicast communication, many important applications in HetNets, such as video/audio conferencing and mobile TV, require the support of multicast. In this paper,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    On the Capacity Bounds of Large-Scale Wireless Network With Physical-Layer Network Coding Under the Generalized Physical Model

    Recently, Physical Layer Network Coding (PLNC) has attracted enormous interests because of its potential to improve the throughput of wireless networks. Most of the current work discuss a simple three-node system. In this model, source nodes A and B try to exchange their information x and y through the help...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Performance of Cognitive Radio-Based Wireless Mesh Networks

    Cognitive radio presents a new approach to wireless spectrum utilization and management. In this paper, the potential performance improvement gained by applying cognitive radio to wireless mesh networks is investigated. Specifically, the potential benefits in terms of QoS provided to users and the efficiency of resource utilization are quantified in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    A Bayesian Routing Framework for Delay Tolerant Networks

    Routing in Delay Tolerant Networks (DTN) can benefit from the fact that most real life DTN, especially in the context of people-centric networks (e.g. Pocket Switching Networks (PSN)), exhibit some sort of periodicity in their mobility patterns. For example, public transportation networks follow periodic schedules. Even most individuals have fairly...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Pervasive Smart Camera Networks Exploiting Heterogeneous Wireless Channels

    Smart cameras are embedded systems that perform on-board video content analysis and only report detected events instead of permanently streaming videos. Visual sensor networks aim at integrating smart cameras with wireless sensor networks. Camera sensors have higher requirements regarding computing power and communication bandwidth than those typically used in wireless...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Resource-Aware Coverage and Task Assignment in Visual Sensor Networks

    A Visual Sensor Network (VSN) consists of a large amount of camera nodes which are able to process the captured image data locally and to extract the relevant information. The tight resource limitations in these networks of embedded sensors and processors represent a major challenge for the application development. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    Trajectory-Based Data Forwarding for Light-Traffic Vehicular Ad-Hoc Networks

    This paper proposes a Trajectory-Based Data Forwarding (TBD) scheme, tailored for the data forwarding for road-side reports in light-traffic vehicular ad-hoc networks. State-of-the-art schemes have demonstrated the effectiveness of their data forwarding strategies by exploiting known vehicular traffic statistics (e.g., densities and speeds). These results are encouraging; however, further improvements...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks

    Vehicular Ad hoc NETworks (VANETs) represent promising technologies for improving driving safety and efficiency. Due to the highly dynamic driving patterns of vehicles, it has been a challenging research problem to achieve effective and time-sensitive data forwarding in vehicular networks. In this paper, a Shared-Trajectory-based Data Forwarding Scheme (STDFS) is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    Distributed Storage-Assisted Data-Driven Overlay Network for P2P VoD Services

    Providing VCR-like operations in Peer-To-Peer (P2P) environments is a significant challenge. This paper proposes a distributed Storage-assisted Data-driven overlay Network (SDNet) to support P2P Video-on-Demand (VoD) services. It integrates two networks: a Data-driven Overlay Network (DONet) and a multi-way tree. DONet is enhanced and used for the routine video distribution...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2009

    A Balanced Tree-Based Strategy for Unstructured Media Distribution in P2P Networks

    Most research on P2P multimedia streaming assumes that users access video content sequentially and passively. Unlike P2P live streaming in which the peers start playback from the current point of streaming when they join the streaming session, in P2P video-on-demand streaming VCR-like operations such as forward, backward, and random-seek have...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Characterization of a Large-Scale Delay Tolerant Network

    In this paper, the authors' statistical analysis of a large scale vehicular network confirms several key properties which also exist in many other people-centric networks (e.g. pocket-switched networks). First of all, they demonstrate that the inter-contact distribution follows power-law properties. Secondly, they show that the degree distribution of nodes and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Mitigating the Effect of Interference in Wireless Sensor Networks

    Performance of a deployed Wireless Sensor Network (WSN) is greatly influenced by the interference it is subject to during operation. Degradation happens due to interference resulting in packet drops, retransmissions, link instability and inconsistent protocol behavior. The authors have conducted experiments that highlight the fact that interference caused by WiFi...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Quality Improvement of Mobile Video Using Geo-Intelligent Rate Adaptation

    Adaptive video is a popular technique to continuously deliver a video stream to a user in the best quality possible when the underlying network bandwidth cannot be guaranteed. As such, quality of adaptive video depends critically on the agility of the rate adaptation algorithms in tracking the varying bandwidth. In...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study

    Effective communication is critical to the success of response and rescue operations; however, unreliable operation of communication systems in high-stress environments is a significant obstacle to achieving this. The contribution of this paper is threefold. First, it outlines those common characteristics that impair communication in high-stress environments and then evaluates...

    Provided By Institute of Electrical and Electronics Engineers