Institute of Electrical and Electronics Engineers

Displaying 1-40 of 7109 results

  • White Papers // Mar 2015

    Wireless Sensor Network Virtualization: A Survey

    Wireless Sensor Networks (WSNs) are the key components of the emerging Internet-of-Things (IoTs) paradigm. They are now ubiquitous and used in a plurality of application domains. WSNs are still domain specific and usually deployed to support a specific application. However, as WSNs' nodes are becoming more and more powerful, it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    Wireless Sensor Network Virtualization: Early Architecture and Research Perspectives

    Wireless Sensor Networks (WSNs) have become pervasive and are used in many applications and services. Usually the deployments of WSNs are task oriented and domain specific; thereby precluding re-use when other applications and services are contemplated. This inevitably leads to the proliferation of redundant WSN deployments. Virtualization is a technology...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2015

    A Data Annotation Architecture for Semantic Applications in Virtualized Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have become very popular and are being used in many application domains (e.g. smart cities, security, gaming and agriculture). Virtualized WSNs allow the same WSN to be shared by multiple applications. Semantic applications are situation-aware and can potentially play a critical role in virtualized WSNs. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2014

    Autonomic Allocation of Communicating Virtual Machines in Hierarchical Cloud Data Centers

    Cloud providers are typically hierarchically organized into interconnected data centers, each with a collection of racks of servers organized into clusters. The communication cost between two servers is a function of their relative location in the cloud infrastructure. Cloud consumers submit allocation requests for virtual machines, of different types and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2014

    Read Disturb Fault Detection in STT-MRAM

    Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) has potential to become a universal memory technology because of its various advantageous features such as high density, non-volatility, scalability, and high endurance and CMOS compatibility. However, read disturb is a major reliability issue in which a read operation can lead to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Area-Delay-Power Efficient Carry-Select Adder

    In this paper, the logic operations involved in conventional Carry SeLect Adder (CSLA) and Binary to Excess-1 Converter (BEC)-based CSLA are analyzed to study the data dependence and to identify redundant logic operations. The authors have eliminated all the redundant logic operations present in the conventional CSLA and proposed a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2014

    Using Lifetime-Aware Progressive Programming to Improve SLC NAND Flash Memory Write Endurance

    In this paper, the authors advocate a lifetime-aware progressive programming concept to improve single-level per cell NAND flash memory write endurance. NAND flash memory Program/Erase (P/E) cycling gradually degrades memory cell storage noise margin, and sufficiently strong fault tolerance must be used to ensure the memory P/E cycling endurance. As...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Quaternary Logic Lookup Table in Standard CMOS

    Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this paper, they propose...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2014

    Parallel Algorithms for Big Data Optimization

    The authors propose a decomposition framework for the parallel optimization of the sum of a differentiable function and a (block) separable non-smooth, convex one. The latter term is usually employed to enforce structure in the solution, typically sparsity. Their framework is very flexible and includes both fully parallel Jacobi schemes...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2014

    Compatibility-Aware Cloud Service Composition Under Fuzzy Preferences

    When a single cloud service (i.e., a software image and a virtual machine), on its own, cannot satisfy all the user requirements, a composition of cloud services is required. Cloud service composition, which includes several tasks such as discovery, compatibility checking, selection, and deployment, is a complex process and users...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2013

    Constrained Pricing for Cloud Resource Allocation

    Constrained pricing in a cloud computing environment is addressed using game theory. The objective of the model and the game is to enable cloud providers to maximize their revenue while satisfying users by maximizing their utilities. The user's net utility is modeled as a function of resource demand with a...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    IT Security Threats in Cloud Computing Sourcing Model

    New information technologies have been developing now-a-days at an amazing speed, affecting the functioning of organizations significantly. Due to the development of new technologies, especially mobile ones, borders in the functioning of modern organizations diminish and models of running business change. Almost all organizations are involved in some way in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2013

    Advancements in Cloud Computing for Logistics

    The emergence of new cloud computing services is steadily increasing. More and more companies realize the benefits and opportunities of using IT-resources with unlimited scalability and on-demand services at pay per use conditions over the Internet, as opposed to \"Classical\" on-premise installation and operation. A recent survey of webhosting and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Hardware Security Strategies Exploiting Nanoelectronic Circuits

    Hardware security has emerged as an important field of study aimed at mitigating issues such as piracy, counterfeiting, and side channel attacks. One popular solution for such hardware security attacks are Physical Unclonable Functions (PUF) which provide a hardware specific unique signature or identification. The uniqueness of a PUF depends...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    The Security Onion Cloud Client: Network Security Monitoring for the Cloud

    With \"Cloud\" servers continuing to become ever more popular, along with typical off-site servers (VPS/Dedicated), Network Security Monitoring (NSM) practitioners struggle to gain insight into these devices, as they usually don't have the ability to tap the network traffic flowing to and from the servers - To solve this problem,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    Design and Implementation of Digital Signatures

    Digital Signature schemes are commonly used as primitives in cryptographic protocols that provide other services including entity authentication, authenticated key transport, and authenticated key agreement. A VLSI implementation of the digital signature scheme is proposed in this paper, for efficient usage in any cryptographic protocol. This architecture is based on...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2013

    On the Quality of Service of Cloud Gaming Systems

    Cloud gaming, i.e., real-time game playing via thin clients, relieves users from being forced to upgrade their computers and resolve the incompatibility issues between games and computers. As a result, cloud gaming is generating a great deal of interests among entrepreneurs, venture capitalists, general public's, and researchers. However, given the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks

    A Wireless Sensor Network (WSN) commonly requires lower level security for public information gathering, whilst a Body Sensor Network (BSN) must be secured with strong authenticity to protect personal health information. In this paper, some practical problems with the Message Authentication Codes (MACs), which were proposed in the popular security...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2013

    On Service Migration in the Cloud to Facilitate Mobile Accesses

    Using service migration in clouds to satisfy a sequence of mobile batch-request demands is a popular solution to enhanced QoS and cost effectiveness. As the origins of the mobile accesses are frequently changed over time, moving services closer to client locations not only reduces the service access latency but also...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Enhancing Survivability in Virtualized Data Centers: A Service-Aware Approach

    In this paper, the authors propose a service-aware approach to enhance survivability in virtualized data centers. The idea is to create and maintain a Survivable Virtual Infrastructure (SVI) for each service or tenant, which includes Virtual Machines (VMs) hosting the corresponding application and their backup VMs. A fundamental problem is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Near Field Authentication for Smart Devices

    Near Field Communication (NFC) systems provide a good location-limited channel so that many security systems can use it to force the participants to stay close to each other. Unfortunately, only a small number of smart devices in the market are equipped with NFC chips that are essential for NFC systems....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Data On-Boarding in Federated Storage Clouds

    One of the main obstacles hindering wider adoption of storage cloud services is vendor lock-in, a situation in which large amounts of data that are placed in one storage system cannot be migrated to another vendor, e.g., due to time and cost considerations. In this paper, the authors present an...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Cloud Computing : The Dark side

    The Rapid growth of data has turned out to be a very unstable for the cloud vendors. Such bulky data is very difficult to handle and protect from malicious hackers. Lack of security is the major problem to overcome in wide adoption of cloud computing and networking. The amount of...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2013

    Review of Agent Oriented Technology in Cloud Node Application

    Cloud computing provides virtualized resources and scalable infrastructure in the form of services over the Internet. It is a model for enabling demand network access to a shared pool of computing resources. Cloud infrastructure is implemented on virtual machines which are remotely located. Any user who wants to access his...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Synchronous Physical-Layer Network Coding: A Feasibility Study

    Recently, Physical-layer Network Coding (PNC) attracts much attention due to its ability to improve throughput in relay-aided communications. However, the implementation of PNC is still a work in progress, and synchronization is a significant and difficult issue. This paper investigates the feasibility of synchronous PNC with M-ary Quadrature Amplitude Modulation...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Programmable Neuromorphic Circuits for Spike-Based Neural Dynamics

    Hardware implementations of spiking neural networks offer promising solutions for a wide set of tasks, ranging from autonomous robotics to brain machine interfaces. The authors propose a set of programmable hybrid analog/digital neuromorphic circuits than can be used to build compact low-power neural processing systems. In particular, they present both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Enabling DUI Systems in Handheld Devices Using Cloud

    Application distribution among Mobile devices through cloud. Cloud computing support for energy saving, privacy, security, data protection, and fast exchange of data over the internet currently, application can't scale over multiple Cloud Computing Service Providers. Since there is no interoperability between Cloud Computing Service Providers due to device interoperability it's...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    The Second-Order Coding Rate of the MIMO Rayleigh Block-Fading Channel

    The authors study the second-order coding rate of the Multiple-Input Multiple-Output (MIMO) Rayleigh block-fading channel via statistical bounds from information spectrum methods and Gaussian tools from random matrix theory. A Gaussian approximation is then used to establish an upper bound on the error probability for arbitrary code rates which is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Business and IT Alignment with SEAM for Enterprise Architecture

    To align an IT system with an organization's needs, it is necessary to understand the organization's position within its environment as well as its internal configuration. In SEAM for Enterprise Architecture the organization is considered as a hierarchy of systems that span from business down to IT. The alignment process...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Auditing for Distributed Storage Systems

    In this paper, the authors bridge the gap between these two currently disconnected bodies of work. They propose NC-Audit, a novel remote data integrity checking scheme, designed specifically for network coding-based distributed storage systems. NC-Audit combines, for the first time, the following desired properties: efficient checking of data integrity, efficient...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Convergence and Recovery Analysis of the Secure Distributed Control Methodology for D-NCS

    Distributed control algorithms (e.g., consensus algorithms) are vulnerable to the misbehaving agent compromised by cyber attacks in the Distributed Networked Control Systems (DNCS). In this paper, the authors continue their work on a proposed secure distributed control methodology that is capable of performing a secure consensus computation in D-NCS in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    TCP and Network Coding Equilibrium and Dynamic Properties

    In this paper, the authors analyze the impact on the TCP-Reno congestion control mechanism of a Network Coding (NC) layer inserted in the TCP/IP stack. A multi-source multi-link model is considered to study the equilibrium and dynamic properties of the TCP-NC protocol with RED as active queue management mechanism. The...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2013

    Using Quasi-EZ-NAND Flash Memory to Build Large-Capacity Solid-State Drives in Computing Systems

    Future flash-based Solid-State Drives (SSDs) must employ increasingly powerful Error Correction Code (ECC) and Digital Signal Processing (DSP) techniques to compensate the negative impact of technology scaling on NAND flash memory device reliability. Currently, all the ECC and DSP functions are implemented in a central SSD controller. However, the use...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Achieving Maximum Energy-Efficiency in Multi-Relay OFDMA Cellular Networks: A Fractional Programming Approach

    In this paper, the joint power and subcarrier allocation problem is solved in the context of maximizing the Energy-Efficiency (EE) of a multi-user, multi-relay Orthogonal Frequency Division Multiple Access (OFDMA) cellular network, where the objective function is formulated as the ratio of the Spectral-Efficiency (SE) over the total power dissipation....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Guest Editors' Introduction: Special Issue on Cloud Computing

    Cloud is a novel computing paradigm that builds on the foundations of distributed computing, grid computing, networking, virtualization, service orientation, and marketoriented computing. Cloud provides flexible resource allocation on demand with the promise of realizing elastic, Internet-accessible computing on a pay-as-you-go basis. Cloud services include infrastructure such as computing and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Communication over Finite-Chain-Ring Matrix Channels

    Though network coding is traditionally performed over finite fields, recent work on nested-lattice-based network coding suggests that, by allowing network coding over finite chain rings, more efficient physical-layer network coding schemes can be constructed. This paper considers the problem of communication over the finite-chain-ring matrix channel Y = AX +...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    Denial Attacks in Cloud Computing

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end-recipients. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagram. The authors are aimed at implement the denial...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    The Role of Cloud Computing in Mobile

    The mobile cloud computing approach has emerged as a promising way to address the new challenges in the application development and implementation of resources sharing or distributed computing. The capabilities of mobile devices have been improving quickly than computers. Many researchers focus on the area of mobile computing and cloud...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2013

    A Novel Approach for Preventing Hackers in Data Communication

    In the electronic communication system the user authentication is an important issue to be considered for the information security. The concept of username with password is an efficient method of maintaining shared secret information between a user and a remote system. Any communication through the internet passes across an unsecured...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2013

    A Novel Underlay TV Spectrum Sharing Scheme Based On Polarization Adaption for TD-LTE System

    Spectrum opportunities in time, space and power domain are exploited by secondary users in traditional Cognitive Radio studies. While spectrum opportunities in polarization domain, namely simultaneous utilization of spectrum between primary and secondary system with polarization signal characteristics, is exploited inadequately. With the merits of polarization mismatch, primary system lies...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Radio Access Network Traffic Generation for Mobile Switching Center

    One of the challenges faced by telecom companies is to provide robust and powerful servers that are capable to handle the great increase of the number of subscribers and to accomplish the heavy Internet-based applications that generate a tremendous traffic load. Companies evaluate their products' performance before releasing them to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    Scalable Directory Services Using Proactivity

    Common to computational grids and pervasive computing is the need for an expressive, efficient, and scalable directory service that provides information about objects in the environment. The paper argues that a directory interface that 'pushes' information to clients about changes to objects can significantly improve scalability. This paper describes the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Dec 2009

    Field-Modulated Packet Forwarding Chips for Label-Switched Optical Routing

    Wavelength Division Multiplexing (WDM) has become the enabling technology for utilizing the available Bandwidth (BW) in fiber optic links. However, as BW usage increases, the capacity of the network nodes must be scaled to accommodate larger amounts of data received and transmitted through each fiber. The capacity of today's OEO...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Design and Implementation of the High Speed TCP/IP Offload Engine

    As the growth of Ethernet speed surpassed the growth of microprocessor performance. TCP/IP Offload Engine (TOE) technology has emerged and aimed at not only releasing servers and communication systems from burdened conventional TCP/IP stack but improving the network utilization rate. To lower the risk in developing TOE, one may rely...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2013

    Programmable Neuromorphic Circuits for Spike-Based Neural Dynamics

    Hardware implementations of spiking neural networks offer promising solutions for a wide set of tasks, ranging from autonomous robotics to brain machine interfaces. The authors propose a set of programmable hybrid analog/digital neuromorphic circuits than can be used to build compact low-power neural processing systems. In particular, they present both...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Markov Approximation for Combinatorial Network Optimization

    Many important network design problems can be formulated as a combinatorial optimization problem. A large number of such problems, however, cannot readily be tackled by distributed algorithms. The Markov approximation framework studied in this paper is a general technique for synthesizing distributed algorithms. The authors show that when using the...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Performance of VoIP Over Multiple Co-Located IEEE 802.11 Wireless LANs

    IEEE 802.11 WLAN has high data rates (e.g., 11 Mbps for 802.11b and 54 Mbps for 802.11g), while voice streams of VoIP typically have low-data-rate requirements (e.g., 29.2 Kbps). One may, therefore, expect WLAN to be able to support a large number of VoIP sessions (e.g., 200 and 900 sessions...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Average-Value Analysis of 802.11 WLANs With Persistent TCP Flows

    In this paper, the authors develop an average-value analysis of the TCP performance in 802.11WLANs. Their model characterizes the equilibrium conditions of the network, and this method yields a simple, yet precise, estimate of the throughput obtained by persistent TCP flows. Via simulations they study the accuracy of the model...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Optimizing Aggregate Throughput in 802.11 Networks Through Balancing Spatial Reuse and Transmission Rate

    Traditional Medium Access Control (MAC) protocols utilize temporal mechanism to do contention resolution. This paper explores an alternative approach by adapting the space occupied by a transmission to resolve contention. Each successful transmission in a wireless network needs to occupy a certain part of space in which there are no...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Apr 2010

    Link Failure Monitoring Via Network Coding

    In network tomography, the authors seek to infer link status parameters (delay, congestion, loss rates etc.) inside a network through end-to-end measurements at (external) boundary nodes. As can be expected, such approaches generically suffer from identifiability problems; i.e., status of links in a large number of network topologies is not...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2011

    Multiple Access Scheme for Future (4G) Communication: A Comparison Survey

    The demand for wireless broadband communication services has been growing steadily for last several years. Over the last two decades, wireless communications have gained enormous popularity in all over the world. It offers an attractive option for many personal as well as organizational communication requirements due to various parameters including...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    IEEE 802.15.4 Network Emulation Testbed

    IEEE 802.15.4 networks are promising solutions for wireless personal area networks, and in particular for wireless home area networks. IEEE 802.15.4 has numerous applications in fields such as energy management and home automation. However, real-world trials with 802.15.4 devices are difficult because of the characteristics of these devices (small dimensions,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Performance Analysis of VoIP Codecs Over BE WiMAX Network

    IEEE802.16 technology due to its outstanding larger coverage area, high data rates, inexpensive equipments, ease of deployment and guaranteed QoS make it a suitable candidate for future broadband wireless access networks. The Mobile WiMAX has been designed to provide Broadband Internet service to mobile users. The VoIP is flexible and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2010

    AEROMAN: A Novel Architecture to Evaluate Routing Protocols for Multi-Hop Ad-Hoc Networks

    In this paper, the authors present AEROMAN (Architecture to Evaluate Routing PrOtocols for Multi-hop Ad-hoc Networks) which is designed and implemented for evaluation of routing protocols for multi-hop wireless networks. AEROMAN uses QOMET, a wireless link emulation tool, to compute parameters of wireless links, such as bandwidth, delay, packet loss...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    QOMB: A Wireless Network Emulation Testbed

    In this paper, the authors present QOMB, a testbed they designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless network emulation set of tools QOMET so as to reproduce in a wired network, in real time, the wireless network conditions corresponding...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Physical Layer Network Coding with Multiple Antennas

    The two-phase MIMO NC (Network Coding) scheme can be used to boost the throughput in a two-way relay channel in which nodes are equipped with multiple antennas. The obvious strategy is for the relay node to extract the individual packets from the two end nodes and mix the two packets...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2009

    Channel Coding and Decoding in a Relay System Operated With Physical-Layer Network Coding

    The Two-Way Relay Channel (TWRC) is a fundamental network structure of much interest to the wireless communications research community. Application of network coding in TWRC, in particular, has attracted intense interest recently. The first proposal of network coding for TWRC can be traced to, in which network coding is applied...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2011

    Energy Conservation and Interference Mitigation: From Decoupling Property to Win-Win Strategy

    This paper studies the problem of energy conservation of mobile terminals in a multi-cell TDMA network supporting real-time sessions. The corresponding optimization problem involves joint scheduling, rate control, and power control, which is often highly complex to solve. To reduce the solution complexity, the authors decompose the overall problem into...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks

    This paper started out with the authors' discovery of a pattern of throughput distributions among links in IEEE 802.11 networks from experimental results. This pattern gives rise to an easy computation method, which they term as Back-of-the-Envelop (BoE) computation. For many network configurations, very accurate results can be obtained by...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Fast Algorithms for Joint Power Control and Scheduling in Wireless Networks

    This paper studies the problem of finding a minimum-length schedule of a power-controlled wireless network subject to traffic demands and SINR (Signal-to-Interference-plus-Noise Ratio) constraints. The authors propose a column generation based algorithm that finds the optimal schedules and transmit powers. The column generation method decomposes a complex linear optimization problem...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2010

    Scaling Capacity by Two Channels in IEEE 802.11 Ad Hoc Networks With an SIR Comparison Algorithm

    A wireless ad hoc network is a self-configuring peer-to-peer network of mobile nodes connected by wireless links. One of the major problems of a wireless ad hoc network is limited capacity due to its carrier-sensing mechanism. A wireless terminal decides if it should transmit data based on its local environment....

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Towards a More Accurate Carrier Sensing Model for CSMA Wireless Networks

    In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships among links. This is a 0-1 model in which two links can either sense each other completely or not. In real experiments, the authors observed that this is generally not...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2011

    A Simple Analytical Model for Energy Efficient Ethernet

    The recently approved Energy Efficient Ethernet standard IEEE 802.3az achieves energy savings by using a low power mode when the link is idle. However, those savings heavily depend on the traffic patterns, due to the overhead inherent in transitions between active and low power modes. This makes it impractical to...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Degree Constrained Topology Control for Very Dense Wireless Sensor Networks

    The authors present a novel topology control algorithm for very dense wireless sensor networks that is constrained by a small maximum nodal degree k. Particularly, they limit k=4 which makes it challenging to formulate a connected network that possesses favorable properties such as a small diameter, short average path length...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2011

    Distributed Fault-Tolerant Topology Control in Static and Mobile Wireless Sensor Networks

    In wireless sensor networks, minimizing power consumption and at the same time maintaining desired properties in the network topology is of prime importance. In this paper, the authors present a distributed algorithm for assigning minimum possible power to all the nodes in the wireless sensor network, such that the network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Integration of a QoS Aware End User Network Within the TISPAN NGN Solutions

    The development of specifications for next generation networks has introduced a new network paradigm that has features and capabilities to ensure the provisioning of new value-added multimedia services over the broadband access technologies that are currently being deployed in the market. In this respect, the TISPAN group from ETSI is...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // May 2011

    Flat Access and Mobility Architecture: An IPv6 Distributed Client Mobility Management Solution

    The use of centralized mobility management approaches - such as Mobile IPv6 - poses some difficulties to operators of current and future networks, due to the expected large number of mobile users and their exigent demands. All this has triggered the need for distributed mobility management alternatives that alleviate operators'...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Mar 2010

    Resource Utilization Mechanism for Multi-Rate Ultra-Wide Band Networks

    Ultra-WideBand (UWB) communications has emerged as a burgeoning technology for high data rate Wireless Personal Area Networks (WPANs). In this paper, the authors propose a novel Resource Utilization Mechanism (RUM) for improving the throughput in multi-rate UWB-based WPANs. RUM is intended to remedy a critical issue in both unicast and...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Nov 2010

    Exploiting Microscopic Spectrum Opportunities in Cognitive Radio Networks Via Coordinated Channel Access

    Under the current Opportunistic Spectrum Access (OSA) paradigm, a common belief is that a Cognitive Radio (CR) can use a channel only when this channel is not being used by any neighboring Primary Radio (PR). Therefore, the existence of a spectrum opportunity hinges on the absence of active co-channel PRs...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Aug 2010

    Providing Service Guarantees in 802.11e EDCA WLANs With Legacy Stations

    Although the EDCA access mechanism of the 802.11e standard supports legacy DCF stations, the presence of DCF stations in the WLAN jeopardizes the provisioning of the service guarantees committed to the EDCA stations. The reason is that DCF stations compete with Contention Windows (CWs) that are predefined and cannot be...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Oct 2010

    Cardinality Estimation for Large-Scale RFID Systems

    Counting the number of RFID tags (cardinality) is a fundamental problem for large-scale RFID systems. Not only does it satisfy some real application requirements, it also acts as an important aid for RFID identification. Due to the extremely long processing time, slotted ALOHA-based or tree-based arbitration protocols are often impractical...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jul 2009

    A Game Theoretical Algorithm for Joint Power and Topology Control in Distributed WSN

    In this paper, the issue of network topology control in wireless networks using a fully distributed algorithm is considered. Whereas the proposed distributed algorithm is designed applying game theory concepts to design a non-cooperative game, network connectivity is guaranteed based on asymptotic results of network connectivity. Simulations show that for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Sep 2010

    Rope Ladder Routing: Position-Based Multipath Routing for Wireless Mesh Networks

    In this paper, the authors present a novel multipath structure called rope-ladder which combines the advantages of path, node and link protection schemes. They also propose a position-based multipath routing protocol in order to efficiently construct rope-ladders in wireless networks. By design, the paths which are constructed by their protocol...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Self-Organizing Dynamic Fractional Frequency Reuse on the Uplink of OFDMA Systems

    Reverse link (or uplink) performance of cellular systems is becoming increasingly important with the emergence of new uplink-bandwidth intensive applications such as Video Share, where end users upload video clips captured through their mobile devices. In particular, it is important to design the system to provide good user throughput in...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    A Cost Sensitiviy Analysis for Carrier Grade Wireless Mesh Networks With Tabu Optimization

    The authors present an insight on the sensitivity of total cost (CAPEX+OPEX) towards various key input parameters for CARrier Grade Wireless MEsh Networks (CARMEN) deployment. These input parameters span across three main categories namely the network design options, environment conditions and cost. Various boundary conditions are imposed to allow network...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jan 2010

    The Dynamic Community of Interest and Its Realization in ZODIAC

    The ZODIAC project has been exploring a security first approach to networking based on a new idea, the dynamic community of interest, based on groups of users with a demonstrable need to know. ZODIAC uses the most challenging network setting (the mobile ad hoc network) as a target, since each...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Supporting Carrier Grade Services Over Wireless Mesh Networks: The Approach of the European FP-7

    Wireless Mesh Networks (WMNs) are a very promising technology to provide an easily deployable and cost-efficient solution for access to packet-based services for metropolitan areas with high population densities. Thus, WMNs may be a key technology in future 4G wireless networks and are currently becoming attractive in situations where it...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Feb 2010

    Mitigation of Toxicity in Marine Musscls by Autonomous Mobile Agents

    The authors propose an autonomous algorithm for mobile agents in multisensor fusion. Their algorithm is based on the concept of Mutual Information (MI) and the bounds obtained for correlated information. The bounds are obtained by their technique of Determinant Inequalities to maximize the mutual information to achieve the conditions for...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2010

    Robustness Analysis and New Hybrid Algorithm of Wideband Source Localization for Acoustic Sensor Networks

    Wideband source localization using acoustic sensor networks has been drawing a lot of research interest recently in wireless communication applications, such as cellular handset localization, Global Positioning Systems (GPS), and land navigation technologies, etc. The maximum-likelihood is the predominant objective which leads to a variety of source localization approaches. However,...

    Provided By Institute of Electrical and Electronics Engineers

  • White Papers // Jun 2009

    Towards Clustering Algorithms in Wireless Sensor Networks-A Survey

    Wireless Sensor Networks (WSNs) are emerging as essential and popular ways of providing pervasive computing environments for various applications. In all these environments energy constraint is the most critical problem that must be considered. Clustering is introduced to WSNs because of its network scalability, energy-saving attributes and network topology stabilities....

    Provided By Institute of Electrical and Electronics Engineers