Institute of Electrical and Electronics Engineers

Displaying 1-40 of 8955 results

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Opportunistic and Efficient Resource Block Allocation Algorithms for LTE Uplink Networks

    In this paper, the authors propose two new Resource Block (RB) allocation algorithms for the LTE uplink. They take into account the RB adjacency constraint and update the allocation metric. Two different heuristics are proposed: an Opportunistic and Efficient RB allocation Algorithm (OEA) and a Quality of Service based Opportunistic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel UHF RFID Dual-Band Tag Antenna with Inductively Coupled Feed Structure

    A dual-band tag antenna for UHF RFID systems is proposed. The tag antenna is composed of a zigzag main body and a zigzag loop, which is an inductively coupled feed structure antenna. The proposed structure is simple, which is not only easy to adjust the matching impedance but also to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks

    Device-To-Device (D2D) communications underlaying cellular networks have recently been considered as a promising means to improve the resource utilization of the cellular network and the user throughput between devices in proximity to each other. In this paper, the authors investigate the resource sharing problem to optimize the system performance in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Joint Relay Assignment and Channel Allocation for Energy-Efficient Cooperative Communications

    Cooperative Communication (CC) has been proposed to achieve spatial diversity without requiring multiple antennas on a single device. Many efforts in exploiting the benefits of CC focus on improving the performance in terms of outage probability and channel capacity. However, the energy efficiency of CC, which is critical for the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Space-Time Coded MPSK Coherent MIMO FSO Systems in Gamma-Gamma Turbulence

    Coherent free-space optical communication employing M-ary phase-shift keying is investigated for space-time coded Multiple-Input Multiple-Output (MIMO) systems over Gamma-Gamma turbulence channels. The proposed space-time coded system offers an efficient utilization of coherent free-space optical channel capacity by exploiting the degree of freedom at both the transmitter and receiver ends. Such...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Enhanced Power Management for Wi-Fi Direct

    Research presented in this paper enhances the power management schemes of Wi-Fi Direct to provide better services for a wider range of Wi-Fi Peer-To-Peer (P2P) applications. Although the Wi-Fi Direct defines two power management schemes to provide energy efficiency in P2P devices, neither is enough to meet power efficiency and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Dynamic Resource Allocation for Machine-Type Communications in LTE/LTE-A with Contention-Based Access

    In this paper, the authors propose a dynamic resource allocation method to enable efficient and low-latency Machine Type Communications (MTC) in LTE/LTE-A with the Contention Based random Access (CBA) scheme. In the proposed method, they firstly estimate the probabilities of events caused by a CBA transmission and then calculate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Reliable Throughput for Two-way Relay Systems by Network Coding

    The throughput of wireless network can be improved by wireless network coding, without adding additional resources. However, most of the previous work focuses on the AWGN channel. In fact, the signal is subject to severe fading over wireless channel. The network coding reliable throughput of two-way system under Rayleigh fading...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Network Coding Based Reliable Broadcast Protocol in Multi-Channel Multi-Radio Wireless Mesh Networks

    Multi-Channel Multi-Radio (MCMR) Wireless Mesh Networks (WMNs) have emerged as a new paradigm in multi-hop wireless networks. In a typical MCMR WMNs, each node has multiple radios with multiple available channels on each radio, which allows nodes to have simultaneous transmissions and receptions. Therefore, network performance is improved. As a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    Group-Wise Channel Sensing and Resource Pre-Allocation for LTE D2D on ISM Band

    Device-To-Device communication has been regarded as a promising technology to improve the cellular system efficiency, which allows mobile devices communicate directly with each other on the licensed frequency resources under the control of a base station (or eNB). However, the benefits of D2D using license exempt bands, such as ISM...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Community Dynamics and Analysis of Decadal Trends in Climate Data

    The application of complex networks to study complex phenomena, including the Internet, social networks, food networks, and others, has seen a growing interest in recent years. In particular, the use of complex networks and network theory to analyze the behavior of the climate system is an emerging topic. This newfound...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    Learning to GroupWeb Text Incorporating Prior Information

    Clustering similar items for web text has become increasingly important in many Web and Information Retrieval applications. For several kinds of web text data, it is much easier to obtain some external information other than textual features which can be utilized to improve the performance of clustering analysis. This external...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2012

    SES: Sentiment Elicitation System for Social Media Data

    Social Media is becoming major and popular technological platform that allows users discussing and sharing information. Information is generated and managed through either computer or mobile devices by one person and consumed by many other persons. Most of these user generated content are textual information, as Social Networks (Facebook, LinkedIn),...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Sensitive and Specific Identification of Protein Complexes in "Perturbed" Protein Interaction Networks From Noisy Pull-Down Data

    High-throughput mass-spectrometry technology has enabled genome-scale discovery of protein-protein interactions. Yet, computational inference of protein interaction networks and their functional modules from large-scale pull-down data is challenging. Over-expressed or "Sticky" bait is not specific; it generates numerous false positives. This "Curse" of the technique is also its "Blessing" - the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2011

    Efficient Pairwise Statistical Significance Estimation for Local Sequence Alignment Using GPU

    Pairwise statistical significance has been found to be quite accurate in identifying related sequences (homologs), which is a key step in numerous bioinformatics applications. However, it is computational and data intensive, particularly for a large amount of sequence data. To prevent it from becoming a performance bottleneck, the authors resort...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Using Subfiling to Improve Programming Flexibility and Performance of Parallel Shared-file I/O

    There are two popular parallel I/O programming styles used by modern scientific computational applications: unique-file and shared-file. Unique-file I/O usually gives satisfactory performance, but its major drawback is that managing a large number of files can overwhelm the task of post-simulation data processing. Shared-file I/O produces fewer files and allows...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Combining I/O Operations for Multiple Array Variables in Parallel NetCDF

    Parallel netCDF (PnetCDF) is a popular library used in many scientific applications to store scientific datasets. It provides high-performance parallel I/O while maintaining file-format compatibility with Unidata's netCDF. Array variables comprise the bulk of the data in a netCDF dataset, and for accesses to large regions of single array variables,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    Exploring Concentration and Channel Slicing in On-chip Network Router

    Sharing on-chip network resources efficiently is critical in the design of a cost-efficient Network on-Chip (NoC). Concentration has been proposed for on-chip networks but the trade-off in concentration implementation and performance has not been well understood. In this paper, the authors describe cost-efficient implementations of concentration and show how external...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2011

    AHPIOS: An MPI-Based Ad-Hoc Parallel I/O System

    This paper presents the design and implementation of a portable Ad-Hoc Parallel I/O System (AHPIOS). AHPIOS virtualizes on-demand available distributed storage resources and allows the files to be striped over several storage devices. Additionally, the design unifies the configuration of the MPI-IO library and the AHPIOS data servers. By a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Dynamically Adapting File Domain Partitioning Methods for Collective I/O Based on Underlying Parallel File System Locking Protocols

    Collective I/O, such as that provided in MPI-IO, enables process collaboration among a group of processes for greater I/O parallelism. Its implementation involves file domain partitioning, and having the right partitioning is a key to achieving high-performance I/O. As modern parallel file systems maintain data consistency by adopting a distributed...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2008

    Scaling Parallel I/O Performance through I/O Delegate and Caching System

    Increasingly complex scientific applications require massive parallelism to achieve the goals of fidelity and high computational performance. Such applications periodically offload checkpointing data to file system for post-processing and program resumption. As a side effect of high degree of parallelism, I/O contention at servers doesn't allow overall performance to scale...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Multicast Throughput Optimization and Fair Spectrum Sharing in Cognitive Radio Networks

    By enabling opportunistic Secondary Users' (SUs) usage of licensed spectrum, Cognitive Radio (CR) technology notably improves spectrum utilization. However, the fundamental multicast throughput optimization problem in Cognitive Radio Networks (CRNs) is still under-explored. Considering spectrum availability and sharing fairness, in this paper, the authors propose a cross-layer approach to maximize...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Rateless Code Based Opportunistic Multicasting over Cognitive Radio Networks

    Cognitive Radio (CR) represents an exciting new paradigm on spectrum utilization and potentially more bandwidth for exploding multimedia traffic. The authors focus on the layer encoded video multicast problem over CR and contribute an opportunistic multicasting framework, based on rateless Forward Error Correction (FEC) codes, a mechanism for adaptation of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Multi-path Routing in Cognitive Radio Networks for Multimedia Communication using Sample Division Multiplexing

    The authors propose a novel scheme for multi-path routing in a Cognitive Radio Network (CRN) for multimedia communication, even when a contiguous band of required width is not available for any hop in the route. The proposed scheme is based on an extension of the idea of Sample Division Multiplexing...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Procedure to Build Interference Map in Peer to Peer IEEE 802.22 Networks

    Peer to Peer Wireless Regional Area Network (P2PWRAN) is proposed as an extension to support peer to peer communication based on IEEE 802.22. Multiple channel allocation and reuse of channels in the same time slot in P2PWRAN significantly increase the network capacity compared to standard IEEE 802.22 networks. One of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    A Polarization Enabled Cooperation Framework for Cognitive Radio Networking

    A novel polarization enabled two-phase cooperation framework for cognitive radio networking is proposed in this paper. By leveraging the degrees of freedom provided by orthogonally dual-polarized antennas, secondary users can relay the traffic of primary users and transmit their own in the same time slot without interference. To evaluate the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Optimal Energy-Delay Tradeoff Policies in Cognitive Radio Networks

    Cognitive Radio (CR) has been considered as a promising technology to enhance spectrum efficiency via opportunistic transmission at link level. The authors consider Opportunistic Spectrum Access (OSA) mechanism that takes into account packet delay and energy consumption. They formulate the OSA problem as a Partially Observable Markov Decision Process (POMDP)...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Fair Channel Allocation and Access Design for Cognitive Ad Hoc Networks

    The authors investigate the fair channel assignment and access design problem for cognitive radio ad hoc network in this paper. In particular, they consider a scenario where ad hoc network nodes have hardware constraints which allow them to access at most one channel at any time. They investigate a fair...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Coordinated Optimization of Underlay Network Communication for Efficient Use of Spectrum

    Underlay communications has the potential to become a valuable tool for increasing the capacity of spectrum provided that the quality of communications is upheld. In this paper, the authors propose a method for underlay nodes to detect, and coordinate with, other underlay nodes to form a network on preoccupied spectrum....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Joint Spectrum Sensing and Resource Allocation for Multi-band Cognitive Radio Systems with Heterogeneous Services

    In this paper, the authors study joint spectrum sensing and resource allocation for heterogeneous services in multi-band cognitive radio systems. Two types of services are considered: Delay-Sensitive (DS) services and Delay-Tolerant (DT) services. Considering the influence of the probabilities of miss detection and false alarm, the detection threshold, power and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Incremental Relaying Transmissions with Relay Selection in Cognitive Radio Networks

    In this paper, the authors investigate and evaluate the performance of incremental relaying and relay selection, when used in the context of cognitive radio networks. Assuming that a number of cognitive radio relay nodes N (N-2) are co-located with simultaneous primary and secondary transmissions, the "Best" relays are chosen to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Secure MISO Cognitive Radio System with Perfect and Imperfect CSI

    In cognitive Radio (CR) systems, harmful interference from the secondary system degrades the data rate of the primary system. However, this interference may be beneficial to the primary system in terms of the secrecy rate, when unauthorized users eavesdrop on the primary link. This paper explores Multiple-Input Single-Output (MISO) CR...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On the User Scheduling in Cognitive Radio MIMO Networks

    The cognitive radio technology allows the design of dynamic spectrum sharing techniques where unlicensed secondary users can use frequency bands owned by license primary holders. Thus, this emerging technology is regarded as the ideal candidate that can enhance the efficiency of spectrum usage for the next generation of wireless communication...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Modeling and Performance Analysis of Device Discovery in Bluetooth Low Energy Networks

    BlueTooth Low Energy (BT LE) is a low power air interface technology recently released by the BlueTooth Special Interest Group (BT SIG). As a promising radio, BT LE realizes many designing features to fulfill foreseeable requirements of short range communication, such as fast device discovery, power saving transmitting, encryption and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Improved Energy Detection with Interference Cancellation in Heterogeneous Cognitive Wireless Networks

    Energy detection is the most popular method among spectrum sensing techniques due to its low implementation complexity. However, its performance will be severely degraded by the interference from other Secondary Users (SUs). In this paper, the authors first analyze the interference impact on the energy detection in a Heterogeneous Cognitive...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Energy Saving through a Learning Framework in Greener Cellular Radio Access Networks

    Recent papers have validated the possibility of energy efficiency improvement in Radio Access Networks (RAN), depending on dynamically turn on/off some Base Stations (BSs). In this paper, the authors extend the research over BS switching operation, matching up with traffic load variations. However, instead of depending on the predicted traffic...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On Path Selection and Wavelength Assignment in Inter-Domain Lightpath Provisioning

    Despite the research advances in intra-domain lightpath provisioning in WDM networks, efficient and practical schemes for path computation and resource advertisement in multi-domain mesh networks still need to be developed. Most of the proposed solutions in the literature lacks the ability to convey optical network-specific Traffic Engineering information and are...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    A Congestion Level Based End-to-end Acknowledgement Mechanism for Delay Tolerant Networks

    End-to-end reliability in Delay Tolerant Networks (DTNs) is challenging and complicated because of high delay and absence of stable end-to-end path in the intermittently connected mobile environment. Some existing acknowledgement mechanisms use active forwarding to provide the end-to-end reliability, while incurring excessive retransmissions or replications. The other passive mechanisms aim...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    A Robust WiMAX Scheduler for EPON-WiMAX Networks

    The integration of WiMAX networks with EPON networks capitalizes on the large availability of bandwidth in optical access networks with the mobility provided by wireless technologies. In this integration, a WiMAX scheduler needs to take into account the variability of the channel capacity provided by the EPON scheduler. This paper...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Impact of Relay Station Positioning on LTE Uplink Performance at Flow Level

    Long Term Evolution (LTE) is the latest cellular system that is being standardized by the 3rd Generation Partnership Project (3GPP) and is expected to substantially improve end-user throughput and reduce user plane latency, while at the same time significantly improve user experience with full mobility. To realize these expectations, 3GPP...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On Adaptive Routing in Urban Vehicular Networks

    Efficient data delivery in vehicular networks has received increasing attention in recent years. Existing routing protocols for vehicular networks can be loosely divided into two classes: Road Based Routing (RBR) and Road Oblivious Routing (ROR). RBR finds a routing path along roads while ROR does not explicitly forward packets along...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    A Self-Evolving Anomaly Detection Framework for Developing Highly Dependable Utility Clouds

    Utility clouds continue to grow in scale and in the complexity of their components and interactions, which introduces a key challenge to failure and resource management for highly dependable cloud computing. Autonomic anomaly detection is a crucial technique for understanding emergent, cloud-wide phenomena and self-managing cloud resources for system-level dependability...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Adaptive Provisioning for Evolving Virtual Network Request in Cloud-based Datacenters

    Cloud based datacenters provide on demand services and resources, both transparently and cost effectively. These services and applications are typically hosted and run on the servers located in interconnected datacenters. The task or application request from users can be called as a Virtual Network (VN) request. How to efficiently accommodate...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Impact of Communication Uncertainties on Workflow Scheduling in Hybrid Clouds

    The so-called hybrid cloud is the composition of an infrastructure that comprises private resources as well as public resources leased from public clouds. Hybrid clouds can be utilized for the execution of applications composed of dependent jobs, usually modeled as workflows. In this scenario, a scheduler must distribute the components...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    On the Integrated Control of Virtual Machine Live Migration and Traffic Engineering for Cloud Computing

    Virtual machine live migration, which migrates a virtual machine between data centers, is studied as a way to improve quality of services hosted on clouds. Meanwhile, traffic engineering is performed in networks that connect geographically dispersed data centers. These two controls are originally designed and operated individually. Though it is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Double Auction-based Optimal Relay Assignment for Many-to-Many Cooperative Wireless Networks

    Recently, as it can increase the capacity of wireless networks greatly through spatial diversity by taking advantage of antennas on other nodes, Cooperative Communication (CC) has been obtaining more and more attention. However, as the selfish nature, the wireless node may be unwilling to serve as relay node if they...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Resource Contention-Aware Virtual Machine Management for Enterprise Applications

    Consolidating Virtual Machines (VMs) in data centers is desirable as it reduces hardware and power costs. However the performances of VMs on shared physical servers are not isolated from each other as they contend for the same server resources. This contention degrades the performance of delay sensitive applications and can...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Community Detection in an Integrated Internet of Things and Social Network Architecture

    In this paper, the authors propose a community detection scheme in an integrated Internet of Things (IoT) and Social Network (SN) architecture. The paper takes a graph mining approach to solve the problem in complex network of IoT and SN. A number of pieces of research literature exist on community...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    Multidimensional Resource Allocation Strategy for High-Speed Railway MIMO-OFDM System

    With the wide deployment of high-speed railway at more than 300 kilometers per hour, providing various services effectively for users in the train becomes both practical demand and interesting challenge for wireless communication. Resource allocation problem in high-speed railway communication system is one of the key issues to improve the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2012

    GROOV: A Geographic ROuting Over VANETs and Its Performance Evaluation

    Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be inefficient in VANETs. In acknowledgment to the requirement for new VANET protocols addressing issues of routing, data...

    Provided By Institute of Electrical and Electronics Engineers