Institute of Electrical & Electronic Engineers

Displaying 1-40 of 10514 results

  • White Papers // Jan 2015

    Tier-Aware Resource Allocation in OFDMA Macrocell-Small Cell Networks

    The authors present a joint sub-channel and power allocation framework for downlink transmission in an Orthogonal Frequency-Division Multiple Access (OFDMA)-based cellular network composed of a macrocell overlaid by small cells. In this framework, the Resource Allocation (RA) problems for both the macrocell and small cells are formulated as optimization problems....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Spatial Spectrum and Energy Efficiency of Random Cellular Networks

    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, the authors propose new spatial spectrum and energy efficiency models for Poisson-Voronoi Tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    Using Social Sensors for Influence Propagation in Networks with Positive and Negative Relationships

    Online social communities often exhibit complex relationship structures, ranging from close friends to political rivals. As a result, persons are influenced by their friends and foes differently. Future network applications can benefit from integrating these structural differences in propagation schemes through socially aware sensors. In this paper, the authors introduce...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2015

    On the Nanoscale Electromechanical Wireless Communication in the VHF Band

    Electromagnetic communication at the nanoscale has, to date, been studied in either the Very High Frequency (VHF) (30 - 300MHz) or in the TeraHertz band (0.1 - 10THz). This paper is on electromagnetic communication in the VHF band and determining the Bit Error Rate (BER) performance of nanoscale receivers utilizing...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Medium Access Control Design for Full-Duplex Wireless Systems: Challenges and Approaches

    Recent advances in self-interference cancellation techniques enable in-band Full-Duplex (FD) transmission in which a wireless node can simultaneously transmit and receive in the same frequency band. However, to fully exploit the benefits of FD technology in a wireless network, in addition to the PHYsical (PHY) layer issues, Medium Access Control...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2014

    Throughput of the Magnetic Induction Based Wireless Underground Sensor Networks: Key Optimization Techniques

    Wireless Underground Sensor Networks (WUSNs) present a variety of new research challenges. Recently, a Magneto-Inductive (MI) waveguide technique has been proposed to cope with the very harsh propagation conditions in WUSNs. This relay-based approach allows for an extension of the transmission range, which can be quite limited if relays are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Performance Model to Estimate Execution Time of Scientific Workflows on the Cloud

    Scientific workflows, which capture large computational problems, may be executed on large-scale distributed systems such as clouds. Determining the amount of resources to be provisioned for the execution of scientific workflows is a key component to achieve cost-efficient resource management and good performance. In this paper, a performance prediction model...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Coordinated Scheduling for the Downlink of Cloud Radio-Access Networks

    In this paper, the authors address the coordinated scheduling problem in cloud-enabled networks. Consider the downlink of a Cloud-Radio Access Network (C-RAN), where the cloud is only responsible for the scheduling policy and the synchronization of the transmit frames across the connected Base-Stations (BS). The transmitted frame of every BS...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection

    The emergence of Machine-To-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and PHYsical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods and is inherently capable to take advantage of the capture...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    LEoNIDS: A Low-Latency and Energy-Efficient Network-Level Intrusion Detection System

    Over the past decade, design and implementation of low-power systems has received significant attention. While it started with data centers and battery-operated mobile devices, it has recently branched to core network devices such as routers. However, this emerging need for low-power system design has not been studied for security systems,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization

    A multi-static radar set-up is considered in which distributed receive antennas are connected to a Fusion Center (FC) via limited-capacity backhaul links. Similar to cloud radio access networks in communications, the receive antennas quantize the received baseband signal before transmitting it to the FC. The problem of maximizing the detection...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    A Simple Distributed Power Control Algorithm for Cognitive Radio Networks

    In this paper, the authors study the power control problem for spectrum sharing based Cognitive Radio (CR) networks with multiple secondary Source-to-Destination (SD) pairs. A simple distributed algorithm is proposed for the Secondary Users (SUs) to iteratively adjust their transmit powers to improve the performance of the network. The proposed...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    MIMO Wiretap Channels With Unknown and Varying Eavesdropper Channel States

    In this paper, a class of information theoretic secrecy problems is addressed where the eavesdropper channel state is completely unknown to the legitimate parties. In particular, a Gaussian MIMO wiretap channel is considered, where the eavesdropper channel state can vary from one channel use to the next, and the overall...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Opportunistic Channel Access and RF Energy Harvesting in Cognitive Radio Networks

    Radio Frequency (RF) energy harvesting is a promising technique to sustain operations of wireless networks. In a cognitive radio network, a secondary user can be equipped with RF energy harvesting capability. In this paper, the authors consider such a network where the secondary user can perform channel access to transmit...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2014

    Efficient Embedded Microprocessor

    In this paper, the authors are trying to introduce an embedded microprocessor which is combination of embedded system and microprocessor. These embedded microprocessors are 8 bit devices programmed in assembly language. These processors are used as microcontrollers in devices such as automotive ignition control, digital radio tuning, printers, mobile phones,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Resource Allocation Optimization for Delay-Sensitive Traffic in Fronthaul Constrained Cloud Radio Access Networks

    The Cloud Radio Access Network (C-RAN) provides high spectral and energy efficiency performances, low expenditures and intelligent centralized system structures to operators, which has attracted intense interests in both academia and industry. In this paper, a Hybrid Coordinated Multi-Point transmission (H-CoMP) scheme is designed for the downlink transmission in C-RANs,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Ergodic Capacity Analysis of Remote Radio Head Associations in Cloud Radio Access Networks

    Characterizing user to Remote Radio Head (RRH) association strategies in Cloud Radio Access Networks (C-RANs) is critical for performance optimization. In this letter, the single nearest and N - nearest RRH association strategies are presented and the corresponding impact on the ergodic capacity of CRANs is analyzed, where RRHs are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Sparse Beamforming and User-Centric Clustering for Downlink Cloud Radio Access Network

    In this paper, the authors consider a downlink Cloud Radio Access Network (C-RAN) in which all the Base-Stations (BSs) are connected to a central computing cloud via digital backhaul links with finite capacities. Each user is associated with a user-centric cluster of BSs; the central processor shares the user's data...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Heterogeneous Cloud Radio Access Networks: A New Perspective for Enhancing Spectral and Energy Efficiencies

    To mitigate the severe inter-tier interference and enhance limited cooperative gains resulting from the constrained and non-ideal transmissions between adjacent base stations in Heterogeneous Networks (HetNets), Heterogeneous Cloud Radio Access Networks (H-CRANs) are proposed as cost-efficient potential solutions through incorporating the cloud computing into HetNets. In this paper, state-of-the-art research...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Cross-Layer Control for Worse Case Delay Guarantees in Heterogeneous Powered Wireless Sensor Network Via Lyapunov Optimization

    The delay guarantee is a challenge in Wireless Sensor Networks (WSNs), where energy constraints must be considered. The coexistence of renewable energy and electricity grid is expected as a promising energy supply manner for WSNs to remain function for a potentially infinite lifetime. In this paper, the authors address cross-layer...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Exploiting Mobility in Proportional Fair Cellular Scheduling: Measurements and Algorithms

    Proportional Fair (PF) scheduling algorithms are the de-facto standard in cellular networks. They exploit the users' channel state diversity (induced by fast-fading), and are optimal for stationary channel state distributions and an infinite time-horizon. However, mobile users experience a non-stationary channel, due to slow-fading (on the order of seconds), and...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

    Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. The authors propose a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    The Information Funnel: Exploiting Named Data for Information-Maximizing Data Collection

    In this paper, the authors describe the exploitation of hierarchical data names to achieve information-utility maximizing data collection in social sensing applications. They describe a novel transport abstraction, called the information funnel. It encapsulates a data collection protocol for social sensing that maximizes a measure of delivered information utility that...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Energy Efficient Resource Allocation and User Scheduling for Collaborative Mobile Clouds with Hybrid Receivers

    In this paper, the authors study the resource allocation and user scheduling algorithm for minimizing the energy cost of data transmission in the context of OFDMA Collaborative Mobile Cloud (CMC) with Simultaneous Wireless Information and Power Transfer (SWIPT) receivers. The CMC, which consists of several collaborating MTs offers one potential...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Spatial Coverage Cross-Tier Correlation Analysis for Heterogeneous Cellular Networks

    In the search for improved coverage and capacity, cellular networks are currently undergoing a major transformation. A thoroughly planned architecture comprised of macrocells served by large-coverage expensive Base Stations (BSs) is evolving toward a much more heterogeneous architecture where the macro-cell network is underlaid by one or several tiers of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Improving Network Connectivity in the Presence of Heavy-Tailed Interference

    The Heavy Tailed (HT) traffic from wireless users, caused by the emerging Internet and multimedia applications, introduces a HT interference region within which network users will experience unbounded delay with infinite mean and/or variance. Specifically, it is proven that, if the network traffic of primary networks (e.g., cellular and Wi-Fi...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Beamforming for Cooperative Retransmission via User Relaying in Multiple Antenna Cellular Systems

    The authors propose a novel cooperative user relaying scheme for a two-user multiple antenna downlink cellular system where each user has to receive a certain required amount of information. A user who successfully receives its required amount of information is supposed to help the other user in receiving its required...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    A Composite Approach to Self-sustainable Transmissions: Rethinking OFDM

    In this paper, the authors propose two novel strategies to extend the battery life of an Orthogonal Frequency Division Multiplexing (OFDM) receiver, by exploiting the concept of Wireless Power Transfer (WPT). First a new receiver architecture is devised that does not discard the Cyclic Prefix (CP), but instead, exploits it...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2014

    Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise with Secrecy Protected Zone

    Recently, the use of artificial noise has attracted considerable attention in enhancing the physical-layer security of wireless systems. However, the interaction between artificially generated noise and the inherent network interference can significantly affect the level of secrecy. In this paper, the authors consider the additional secrecy enhancement with artificial noise...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Performance Measurement of the CCNx Synchronization Protocol

    Content-Centric-Networking project (CCNx) is a software implementation of the content-centric networking approach. The motivation behind the CCNx synchronization protocol is to keep a collection of information synchronized between 2 CCNx nodes. An example of a possible synchronized collection is a private music directory that should be kept up-to-date in a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Bayesian Hierarchical Mechanism Design for Cognitive Radio Networks

    In this paper, the authors consider a cognitive radio network where the licensed network, referred to as the Primary User (PU) network, consists of a hierarchical structure in which multiple operators coexist in the same coverage area where each of the operators controls an exclusive set of frequency sub-bands. Unlicensed...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Cooperation in Delay Tolerant Networks with Wireless Energy Transfer: Performance Analysis and Optimization

    The authors consider a Delay Tolerant Network (DTN) whose mobile nodes are assigned to collect packets from data sources and deliver them to a sink (i.e., a gateway). Each mobile node operates by using energy transferred wirelessly from the gateway. This paper addresses two major issues in such a network....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    The Mean Interference-to-Signal Ratio and its Key Role in Cellular and Amorphous Networks

    The authors introduce a simple yet powerful and versatile analytical framework to approximate the SIR distribution in the downlink of cellular systems. It is based on the mean interference to-signal ratio and yields the horizontal gap (SIR gain) between the SIR distribution in question and a reference SIR distribution. As...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Towards a Practical Survivable Intrusion Tolerant Replication System

    The increasing number of cyber attacks against critical infrastructures, which typically require large state and long system lifetimes, necessitates the design of systems that are able to work correctly even if part of them is compromised. The authors present the first practical survivable intrusion tolerant replication system, which defends across...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Device-to-Device Communications Achieve Efficient Load Balancing in LTE-Advanced Networks

    In LTE-advanced networks, besides the overall coverage provided by traditional macrocells, various classes of low-power nodes (LPNs, like pico eNBs, femto eNBs, and relays) can be distributed throughout the macrocells as a more targeted underlay to further enhance the area spectral efficiency, alleviate traffic hot zones, and thus improve the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Joint Design of Optimal Cooperative Jamming and Power Allocation for Linear Precoding

    Linear precoding and cooperative jamming for multiuser broadcast channel is studied to enhance the physical layer security. The authors consider the system where multiple independent data streams are transmitted from the base station to multiple legitimate users with the help of a friendly jammer. It is assumed that a normalized...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2014

    Backhaul-Constrained Small Cell Networks: Refunding and QoS Provisioning

    Small cell Access Points (SAPs) can offload macrocell traffic, improve indoor coverage and cell-edge user performance, and boost network capacity. In this paper, the authors investigate the problem faced by the Mobile Network Operator (MNO) on how to properly incentivize the existing private SAPs to serve extra roaming macrocell users....

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2014

    A Cross-Layer Approach for Distributed Energy-Efficient Power Control in Interference Networks

    In contrast with existing works which rely on the same type of energy-efficiency measure to design distributed power control policies, the present work takes into account the presence of a finite packet buffer at the transmitter side and the impact of transport protocols. This approach is relevant when the transmitters...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2014

    On Modulation for Magnetic Induction based Transmission in Wireless Underground Sensor Networks

    Wireless Underground Sensor Networks (WUSNs) are an emerging and promising research area. In WUSNs, the goal is to establish an efficient wireless communication in the underground medium. Typical applications for such networks include soil condition monitoring, earthquake prediction, border patrol, etc. Since the propagation medium is soil, rock, and sand,...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2014

    Storage Capacity of Repairable Networks

    In this paper, the authors introduce a model of a distributed storage system that is locally recoverable from any single server failure. Unlike the usual local recovery model of codes for distributed storage, this model accounts for the fact that each server or storage node in a network is connectible...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Apr 2012

    A Platform-as-a-Service for In-Situ Development of Wireless Sensor Network Applications

    In this paper, the authors present a Platform-as-a-Service (PaaS) approach for rapid development of wireless sensor network (WSN) applications based on the dinam-mite concept, i.e. an embedded web-based development environment and run-time platform for WSN systems integrated in a single information appliance. The PaaS is hosted by a cloud of...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2010

    Rapid Prototyping for Urban Sensing

    Sensing applications with blanket coverage over urban areas can provide vital information for scientists looking to research the effects of specific phenomena on urban environments. Unfortunately there are many large hurdles which have to be overcome in order to implement such sensing networks, for example little or no access to...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2012

    Multipath Tracing With Paris Traceroute

    Traceroute is a tool to report the route packets take between two internet hosts. However, with the deployment of load balancing, there is no longer a single route to a destination, hence classic traceroute systematically misses some of these paths. In this paper, the authors specify an adaptive, stochastic probing...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2012

    Performance Comparison of Distributed IDM-STC Versus Cooperative OFDM for Practical Decode-and-Forward Relay-Networks

    In this paper, the authors compare two different multiplexing strategies for a two-hop parallel relay channel. Precisely, they show the performance of distributed Interleave-Division-Multiplexing Space-Time Coding (dIDM-STC) and cooperative Orthogonal Frequency Division Multiplexing (cOFDM) operating in a decode-and-forward relay network, under the constraint of imperfect channel knowledge and timing and...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2012

    An Improved Inter-Relay Cooperation Scheme for Distributed Relaying Networks

    The authors consider a two-hop distributed relaying network using Orthogonal Space-Time Block Codes (OSTBC), where several relays using Decode-Forward (DF) support the transmission from one source to one destination. In order to mitigate the impact of error propagation for DF, an Inter-Relay Cooperation (IRC) scheme allowing message exchanges among the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2012

    OFDM-IDM Space-Time Coding in Two-Hop Relay-Systems With Error-Prone Relays

    In this paper, the combination of distributed Interleave-Division-Multiplexing-Space-Time Codes (IDM-STCs) with Orthogonal Frequency Division Multiplexing (OFDM) in two-hop relay systems applying Decode-and-Forward (DF) is investigated. In order to cope with erroneous decoding at the relays, a model to capture the decoding reliabilities of the relays is formulated and a method...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2011

    Sparse Multi-User Detection for CDMA Transmission Using Greedy Algorithms

    A possible future application in communications is the wireless uplink transmission in sensor networks. This application is mainly characterized by sporadic transmission over a random access channel. Since each sensor has a low activity probability, the signal for Multi-User Detection (MUD) is sparse. Compressive Sensing (CS) theory introduces detectors that...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2010

    Generalized Sum-Product Algorithm for Joint Channel Decoding and Physical-Layer Network Coding in Two-Way Relay Systems

    In this paper a physical-layer network coded two-way relay system applying Low-Density Parity-Check (LDPC) codes for error correction is considered, where two sources A and B desire to exchange information with each other by the help of a relay R. The critical process in such a system is the calculation...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2010

    Joint Channel Decoding and Physical-Layer Network Coding in Two-Way QPSK Relay Systems by a Generalized Sum-Product Algorithm

    A physical-layer network coded two-way relay system applying Low-Density Parity-Check (LDPC) codes for error correction is considered in this paper, where two sources A and B desire to exchange information with each other by the help of a relay R. The critical process in such a system is the calculation...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2010

    An Improved Physical Layer Network Coding Scheme for Two-Way Relay Systems

    In this paper, the authors consider a two-way relaying system with two sources A, B and one relay R, where the two sources desire to exchange information through the relay. The transmission consists of two states: Multiple ACcess (MAC) stage, where A and B transmit the channel-coded signals to R...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Sep 2009

    Three-Dimensional Urban EM Wave Propagation Model for Radio Network Planning and Optimization Over Large Areas

    A new 3-D urban electromagnetic wave propagation model is presented. It provides fast 3-D deterministic predictions in urban radio configurations and over large areas. The various techniques to make it suitable to the network planning and optimization of large wireless networks are described. The resulting radio propagation maps exhibit seamless...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Aug 2009

    Characterizing Indoor Wireless Channels Via Ray Tracing Combined With Stochastic Modeling

    The authors investigate the reliability of radio channel simulators in predicting channel responses throughout a well-specified environment. Indoor environments for which the geometric layout and material properties of surfaces are known lend themselves to such site-specific simulation. They assess the performance of this approach by comparing its predictions with measurements...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2011

    Cloud-Based e-Learning Infrastructures With Load Forecasting Mechanism Based on Exponential Smoothing: A Use Case

    The development of cloud technologies allows the implementation of scalable, versatile, and customized systems, constructed on-demand. This allows more efficient use of computing resources, improving the revenue of the system and enhancing the Quality of Service (QoS) received by users while minimizing the power consumption of the machines. Several research...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2011

    A Improved Representation of Traceability Links in Requirements Engineering Knowledge Using Sunburst and Netmap Visualizations

    The representation of traceability links in requirements knowledge is vital to improve the general understanding of requirements as well as the relevance and consequences of relations between requirements artifacts and other artifacts in software engineering. Various visualization techniques have been developed to support the representation of traceability information, e.g. traceability...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2011

    Enhanced Traceability in Model-Based CASE Tools Using Ontologies and Information Retrieval

    Model-based CASE tools provide mechanisms to capture and store heterogeneous artifacts produced during the software development process. These tools incorporate a meta-model describing artifact types and traceability links. Although model-based CASE tools provide required means to create and link different artifact types, still the process of linking artifacts is primarily...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2011

    Using Requirements Traceability Links At Runtime - A Position Paper

    During software development a large amount of varied information is created. It comprises the requirements specification and depending artifacts such as design, code or test cases, as well as supporting information such as traceability links. This information is intended to be used during development time. The research in requirements at...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2010

    Integration Test Order Strategies to Consider Test Focus and Simulation Effort

    The integration testing process aims at uncovering faults within dependencies between the components of a software system. Due to the lack of resources, it is usually not possible to test all dependencies. Fault prone dependencies have to be selected as test focus. This test focus has to be considered during...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Feb 2010

    Using Dependency Information to Select the Test Focus Within the Integration Testing Process

    Existing software systems consist of thousands of software components realizing countless requirements. To fulfill these requirements, components have to interact with or depend on each other. The goal of the integration testing process is to test that the interactions between these components are correctly realized. However, it is impossible to...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2012

    Adaptive Sensor Activation for Target Tracking in Wireless Sensor Networks

    This paper presents an adaptive sensor activation for target tracking in wireless sensor networks by dynamically adjusting the range of sensor selective activation instead of fixed one. A closed-loop control algorithm for the range of adaptive sensor activation is designed according to the online feedback of the tracking quality. The...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jan 2010

    Dynamic Field Estimation Using Wireless Sensor Networks: Tradeoffs Between Estimation Error and Communication Cost

    This paper concerns the problem of estimating a spatially distributed, time-varying random field from noisy measurements collected by a wireless sensor network. When the field dynamics are described by a linear, lumped-parameter model, the classical solution is the Kalman - Bucy Filter (KBF). Bandwidth and energy constraints can make it...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2010

    Variance-Component Based Sparse Signal Reconstruction and Model Selection

    The authors propose a variance-component probabilistic model for sparse signal reconstruction and model selection. The measurements follow an underdetermined linear model, where the unknown regression vector (signal) is sparse or approximately sparse and noise covariance matrix is known up to a constant. The signal is composed of two disjoint parts:...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2012

    Sparse Signal Reconstruction From Quantized Noisy Measurements Via GEM Hard Thresholding

    The authors develop a Generalized Expectation-Maximization (GEM) algorithm for sparse signal reconstruction from quantized noisy measurements. The measurements follow an underdetermined linear model with sparse regression coefficients, corrupted by additive white Gaussian noise having unknown variance. These measurements are quantized into bins and only the bin indices are used for...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2009

    Novel Graph-Based Algorithms for Soft-Output Detection Over Dispersive Channels

    The authors address the design of low-complexity algorithms for soft-output detection over channels impaired by intersymbol interference. Unlike most works with similar aims, which assume the presence of the whitened matched filter at the receiver (Forney approach), algorithms that can directly work on the matched filter output (Ungerboeck approach) are...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2010

    Decode-and-Forward Two-Way Relaying With Network Coding and Opportunistic Relay Selection

    In this paper, the authors study a decode-and-forward two-way relaying network. They propose an Opportunistic Two-way Relaying (O-TR) scheme based on joint network coding and opportunistic relaying. In the proposed scheme, one single "Best relay" is selected by MaxMin criterion to perform network coding on two decoded symbols sent from...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2010

    Relay Selection With Network Coding in Two-Way Relay Channels

    In this paper, the authors consider the design of joint Network Coding (NC) and Relay Selection (RS) in two-way relay channels. In the proposed schemes, two users first sequentially broadcast their respective information to all the relays. They propose two RS schemes: a single RS with NC and a dual...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2010

    Differential Modulation for Bidirectional Relaying With Analog Network Coding

    In this paper, the authors propose an Analog Network Coding scheme with Differential Modulation (ANC-DM) using amplify-and-forward protocol for bidirectional relay networks when neither the source nodes nor the relay knows the Channel State Information (CSI). The performance of the proposed ANC-DM scheme is analyzed and a simple asymptotic Bit...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2010

    Cognitive Garment Design Interface Using User Behavior Tree Model

    An effective user interface helps to hinge on ideas and imagination from fashion designers and most importantly express their artworks with their flair. Shape, material, color, movement and flow - all these qualities give a piece of clothing its uniqueness, and the designer uses drawings to communicate his intentions. Sketches...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2009

    Using the Newton Trust-Region Method to Localize in WLAN Environment

    Localization systems for indoor areas using the existing Wireless Local Area Network (WLAN) infrastructure have been suggested recently. However, the current systems are not satisfactory. Common localization approaches suffer from inaccurate position tracking due to signal fluctuations in the wireless LAN. Newton Trust-Region method makes use of the convergence factor...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2009

    Cognitive Location-Aware Information Retrieval by Agent-Based Semantic Matching

    Agents operating in both wired and wireless networks find and retrieve location-aware information. Agents in the authors' system are required to endow with the full range of cognitive abilities, including perception, use of natural language, learning and the ability to understand the user query. The speed and accuracy of retrieval...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2010

    Wi-Fi Positioning Based on Fourier Descriptors

    Location Fingerprinting (LF) is a common Wi-Fi positioning method, which locates a device by accessing a pre-recorded database containing the location fingerprint (i.e., the received signal strengths and coordinates). Most LF methods use the absolute Received Signal Strength (RSS) to estimate the location. There are two drawbacks for using the...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Nov 2009

    Resource-Effective and Accurate WLAN Infrastructure Design and Localization Using a Cellstructure Framework

    Large scale WLAN infrastructures contain thousands of Access Points (APs) that are often deployed in an ad-hoc, empirical and non-optimal configurations. This unstructured approach leads to poor resource utilization and poor localization due to signal overlap and black spots. In this paper, the authors propose three structured approaches to WLAN...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2009

    Wireless Tracking Analysis in Location Fingerprinting

    Wireless tracking analysis is useful for deploying the efficient indoor positioning system. Location Fingerprinting (LF) method uses a training dataset of Wi-Fi Received Signal Strength (RSS) at different location to track the target. Fuzzy logic modeling can be applied to evaluate the behavior of wireless Received Signal Strength (RSS). Previous...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2009

    An Upper Bound on Network Size in Mobile Ad-Hoc Networks

    In this paper, the authors propose a model to compute an upper bound for the maximum network size in mobile ad-hoc networks. Their model is based on the foundation that for a unicast route to be useful to initiate data transport, it is necessary that the time required to discover...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Oct 2010

    Performance Analysis of Energy Detection-Based Spectrum Sensing Over Fading Channels

    The key enabling functionality of a cognitive radio is to ensure that it would not interfere with primary users, by reliably detecting primary user signals. Due to the low computational complexity, Energy detector is a widely used spectrum sensing method. The performance of energy detector in fading channels has been...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2009

    Interference Mitigation Techniques in 60 GHz Wireless Networks

    In recent years, the unlicensed 60 GHz band has motivated the computer, wireless communications, and consumer electronics industries to develop wireless personal area network and wireless local area network standards that support wireless applications with multi-gigabit data rates. One of the technical challenges is managing interference between networks in a...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2011

    On the Performance Analysis of Multi-Relay Cooperative Diversity Systems With Channel Estimation Errors

    In this paper, the authors investigate the performance of an Amplify-and-Forward (AF) cooperative diversity system with multiple relays in the presence of channel estimation errors. They consider both conventional relaying (in which all relay nodes participate in the relaying phase) and opportunistic relaying (in which only a single relay is...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jun 2012

    A Proposal for Enhancing User-Developer Communication in Large IT Projects

    A review of the paper showed that the probability of system success, i.e., user acceptance, system quality and system usage, can be increased by user-developer communication. So far most research on user participation focuses either on early or on late development phases. Especially large IT projects require increased participation, due...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Dec 2011

    Approximating User Values to Preserve Privacy - A Proposal

    Users have different sets of personal values, such as benevolence, self-direction, and tradition. Among other factors, these personal values influence users' emotions, preferences, motivations, and ways of performing tasks - and hence, information needs. The authors sketch a method where, during software development, multiple value-dependent interface variants with different functions...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // Jul 2012

    On the Performance of Packet Aggregation in IEEE 802.11ac MU-MIMO WLANs

    Multi-user spatial multiplexing combined with packet aggregation can significantly increase the performance of Wireless Local Area Networks (WLANs). In this paper, the authors present and evaluate a simple technique to perform packet aggregation in IEEE 802.11ac MU-MIMO (Multi-User Multiple Input Multiple Output) WLANs. Results show that in non-saturation conditions both...

    Provided By Institute of Electrical & Electronic Engineers

  • White Papers // May 2010

    False Conflict Reduction in the Swiss Transactional Memory (SwissTM) System

    Software Transactional Memory (STM) is a programming paradigm that allows a programmer to write parallel programs, without having to deal with the intricacies of synchronization. That burden is instead borne by the underlying STM system. SwissTM is a lock-based STM, developed at EPFL, Switzerland. Memory locations map to entries in...

    Provided By Institute of Electrical & Electronic Engineers