Kings College London

Displaying 1-26 of 26 results

  • White Papers // Nov 2012

    A Decentralized Downlink Beamforming Algorithm for Multicell Processing

    In this paper, the authors tackle the problem of intercell-interference in the absence of cooperation amongst Base Stations (BSs). The problem originates from the simultaneous transmissions of several BSs to their local users within their corresponding cells using the same frequency band. They propose a decentralized downlink beamforming scheme in...

    Provided By Kings College London

  • White Papers // Nov 2012

    On Energy Efficient Routing Using Cooperative Physical Layer Network Coding

    In this paper, the authors focus on energy efficient routing in wireless ad hoc networks. They exploit modulo combining of continuous-time signals arriving at a receiving node from a number of synchronized transmitting nodes and introduce a Cooperative Physical Layer Network Coding (CPLNC) scheme. To demonstrate the effectiveness of the...

    Provided By Kings College London

  • White Papers // May 2012

    On the Outage and TIFR Capacity of Sensing Enhanced Spectrum Sharing Systems

    The potential of improving the achievable throughput of spectrum sharing cognitive radio networks by enhancing them with spectrum sensing capabilities has recently lead to the introduction of a new spectrum access scheme called sensingbased spectrum sharing (SSS) or sensing-enhanced spectrum sharing (SESS). In this paper, the authors study the truncated...

    Provided By Kings College London

  • White Papers // May 2012

    Interference Alignment With Cyclic Unidirectional Cooperation

    Breaking the interference barrier has been set to be a major challenge in fulfilling the demands for high spectral efficiency in the future generations of wireless cellular networks. Recently, the concept of Interference Alignment (IA) was initially introduced in the context of MIMO X-channel. Then, the IA concept was further...

    Provided By Kings College London

  • White Papers // May 2012

    Outage and TIFR Capacity of Sensing Enhanced Spectrum Sharing Cognitive Radio Networks With Missed Detection Protection Constraints

    Spectrum sharing has been considered an effective method of mitigating the spectrum scarcity in wireless communications by allowing the coexistence of both unlicensed and licensed devices in the same frequency bands, something which can be done by limiting the received interference power at the licensed user at an acceptable low...

    Provided By Kings College London

  • White Papers // May 2012

    Introducing Multi-Plane Routing for Next-Generation All-IP Wireless Access Networks

    It becomes more and more recognized that using IP as the underlying foundation for the next-generation of wireless networks makes strong economic sense. This is evident in installation and operation, and technical aspects as it takes advantage of the ubiquitous installed IP infrastructure. Because of that, a resilient, efficient and...

    Provided By Kings College London

  • White Papers // May 2012

    On Dynamic Policies to Switch Off Relay Nodes

    Regenerative (or non-regenerative) wireless relays have recently emerged as a key technology for future and emerging mobile wireless networks, since they allow quick network roll out and improved capacity and coverage of existing networks. Nonetheless, the usefulness of extra capacity (and/or coverage) afforded by relay nodes is largely wasted insofar...

    Provided By Kings College London

  • White Papers // May 2012

    Coordinated Beamforming Using Semidefinite Programming

    In this paper, the authors study a Coordinated BeamForming (CBF) scheme for a multi-cell scenario where pre-coding/beamforming vectors for all coordinating Base Stations (BSs) are jointly designed in a manner that each BS transmits to its local users. They minimise the total transmit power across coordinating BSs while keeping the...

    Provided By Kings College London

  • White Papers // Jan 2012

    Identifying Network Failure via Detecting Changes in Power Profile

    Failure in the network devices can be identified by detecting changes in the behavior of the network. Such a network can be part of the communication infrastructure, which will play a significant role in the emergency managements. Network power consumption behavior, namely its power profile, is a relatively robust profile...

    Provided By Kings College London

  • White Papers // Jan 2012

    Traffic Grooming on Path Network

    In traffic grooming the authors are given an optical network with nodes linked by optical fiber strand that support a number of wavelengths (light-path) with fixed bandwidth capacity, C. A demand (request) over the network is specified by a pair of source and destination node. A request is associated with...

    Provided By Kings College London

  • White Papers // May 2011

    Efficient Multi-Granularity Service Composition

    Dynamic composition of services provides the ability to build complex distributed applications at run time by combining existing services, thus coping with a large variety of complex requirements that cannot be met by individual services alone. However, with the increasing amount of available services that differ in granularity (amount of...

    Provided By Kings College London

  • White Papers // Apr 2011

    Opportunistic Load and Spectrum Management for Mobile Communications Energy Efficiency

    Dynamic load and spectrum usage management techniques can significantly improve the energy efficiency of mobile communications systems. This paper considers: the opportunistic reallocation of traffic loads between bands to allow radio network equipment in the bands that the traffic is originated from to be powered down, and the opportunistic selection...

    Provided By Kings College London

  • White Papers // Nov 2010

    Green Spectrum Management for Mobile Operators

    This paper proposes intra-operator dynamic spectrum access, i.e., dynamic spectrum access by an operator's networks of its available spectrum bands, as a means to improve power efficiency. It is based around four areas of interest: dynamically moving users into particularly active bands from other bands to allow radio network equipment...

    Provided By Kings College London

  • White Papers // Jul 2010

    Measuring and Improving Latency to Avoid Test Suite Wear Out

    This paper introduces the concept of test suite latency. The more latent a test suite, the more it is possible to repeatedly select subsets that achieve a test goal (such as coverage) without re-applying test cases. Where a test case is re-applied it cannot reveal new information. The more a...

    Provided By Kings College London

  • White Papers // Jul 2010

    A Manifesto for Higher Order Mutation Testing

    The authors argue that higher order mutants are potentially better able to simulate real faults and to reveal insights into bugs than the restricted class of first order mutants. The mutation testing community has previously shied away from higher order mutation testing believing it to be too expensive and therefore...

    Provided By Kings College London

  • White Papers // Jul 2010

    Evolving a CUDA Kernel From an NVidia Template

    The authors automatically generate an nVidia parallel CUDA graphics card kernel with identical functionality to existing highly optimised ancient sequential C code. Essentially generic GPGPU C++ code supplied by the hardware manufacturer is converted into a BNF grammar. Strongly typed genetic programming uses the BNF to generate compliable and runnable...

    Provided By Kings College London

  • White Papers // Feb 2010

    Evolving Gzip Matches Kernel From an NVidia CUDA Template

    Rather than attempting to evolve a complete program from scratch the authors demonstrate genetic interface programming by automatically generating a parallel CUDA kernel with identical functionality to existing highly optimised ancient sequential C code. Generic GPGPU nVidia kernel C++ code is converted into a BNF grammar. Strongly typed genetic programming...

    Provided By Kings College London

  • White Papers // Jan 2010

    Why the Virtual Nature of Software Makes It Ideal for Search Based Optimization

    This paper provides a motivation for the application of search based optimization to Software Engineering, an area that has come to be known as Search Based Software Engineering (SBSE). SBSE techniques have already been applied to many problems throughout the Software Engineering lifecycle, with new application domains emerging on a...

    Provided By Kings College London

  • White Papers // Nov 2009

    Cognitive Delay Tolerant Wired-Cum-Wireless Multimedia Networks

    It is surprising to note that as of 2010 the significantly larger bulk of electronic data is neither delivered via a wireless nor a wired interface - it is simply posted. A significant constituent of this data is multimedia delay tolerant bulk data. Examples are video and audio data which...

    Provided By Kings College London

  • White Papers // Sep 2009

    An Analysis and Survey of the Development of Mutation Testing

    Mutation Testing is a fault - based software testing technique that has been widely studied for over three decades. The literature on Mutation Testing has contributed a set of approaches, tools, developments and empirical results which have not been surveyed in detail until now. This paper provides a comprehensive analysis...

    Provided By Kings College London

  • White Papers // Jul 2009

    Quantitative Analysis of Secure Information Flow Via Probabilistic Semantics

    The authors present an automatic analyzer for measuring information flow within software systems. In this paper, they quantify leakage in terms of information theory and incorporate this computation into probabilistic semantics. Their semantic functions provide information flow measurement for programs given secure inputs under any probability distribution. The major contribution...

    Provided By Kings College London

  • White Papers // Jun 2009

    Automatically Compute Information Flow Quantity Via Probabilistic Semantics

    Measuring information flow in software has recently become an active research topic in the security community. Information about confidential inputs may flow to public outputs in batch programs. It would be useful to quantify such flows in the computational world. In this paper, the authors present an automatic analyzer for...

    Provided By Kings College London

  • White Papers // May 2009

    TCP-Aware Resource Allocation in Wireless Networks Via Utility Maximisation

    Motivated by the fact that a plethora of different applications, ranging from streaming video to file transferring, are using TCP the authors propose a set of utility functions that capture these application and optimise the transmission of TCP over wireless via a utility maximisation framework. They show that defining such...

    Provided By Kings College London

  • White Papers // Apr 2009

    Search Based Software Engineering: A Comprehensive Analysis and Review of Trends Techniques and Applications

    In the past five years there has been a dramatic increase in work on Search Based Software Engineering (SBSE), an approach to software engineering in which search based optimisation algorithms are used to address problems in Software Engineering. SBSE has been applied to problems throughout the Software Engineering lifecycle, from...

    Provided By Kings College London

  • White Papers // Jul 2008

    Test Data Augmentation : Generating New Test Data From Existing Test Data

    Existing automated test data generation techniques tend to start from scratch, implicitly assuming no pre-existing test data are available. However, this assumption may not always hold, and where it does not, there may be a missed opportunity; perhaps the pre-existing test cases could be used to assist the automated generation...

    Provided By Kings College London

  • White Papers // May 2008

    Constructing Subtle Faults Using Higher Order Mutation Testing

    Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easily killed. This paper investigates Higher Order Mutants (HOMs). It introduces the concept of a subsuming HOM; one that is harder to kill than...

    Provided By Kings College London

  • White Papers // Jan 2010

    Why the Virtual Nature of Software Makes It Ideal for Search Based Optimization

    This paper provides a motivation for the application of search based optimization to Software Engineering, an area that has come to be known as Search Based Software Engineering (SBSE). SBSE techniques have already been applied to many problems throughout the Software Engineering lifecycle, with new application domains emerging on a...

    Provided By Kings College London

  • White Papers // Jul 2010

    A Manifesto for Higher Order Mutation Testing

    The authors argue that higher order mutants are potentially better able to simulate real faults and to reveal insights into bugs than the restricted class of first order mutants. The mutation testing community has previously shied away from higher order mutation testing believing it to be too expensive and therefore...

    Provided By Kings College London

  • White Papers // May 2012

    On the Outage and TIFR Capacity of Sensing Enhanced Spectrum Sharing Systems

    The potential of improving the achievable throughput of spectrum sharing cognitive radio networks by enhancing them with spectrum sensing capabilities has recently lead to the introduction of a new spectrum access scheme called sensingbased spectrum sharing (SSS) or sensing-enhanced spectrum sharing (SESS). In this paper, the authors study the truncated...

    Provided By Kings College London

  • White Papers // May 2012

    Interference Alignment With Cyclic Unidirectional Cooperation

    Breaking the interference barrier has been set to be a major challenge in fulfilling the demands for high spectral efficiency in the future generations of wireless cellular networks. Recently, the concept of Interference Alignment (IA) was initially introduced in the context of MIMO X-channel. Then, the IA concept was further...

    Provided By Kings College London

  • White Papers // May 2012

    Outage and TIFR Capacity of Sensing Enhanced Spectrum Sharing Cognitive Radio Networks With Missed Detection Protection Constraints

    Spectrum sharing has been considered an effective method of mitigating the spectrum scarcity in wireless communications by allowing the coexistence of both unlicensed and licensed devices in the same frequency bands, something which can be done by limiting the received interference power at the licensed user at an acceptable low...

    Provided By Kings College London

  • White Papers // May 2012

    Introducing Multi-Plane Routing for Next-Generation All-IP Wireless Access Networks

    It becomes more and more recognized that using IP as the underlying foundation for the next-generation of wireless networks makes strong economic sense. This is evident in installation and operation, and technical aspects as it takes advantage of the ubiquitous installed IP infrastructure. Because of that, a resilient, efficient and...

    Provided By Kings College London

  • White Papers // May 2012

    On Dynamic Policies to Switch Off Relay Nodes

    Regenerative (or non-regenerative) wireless relays have recently emerged as a key technology for future and emerging mobile wireless networks, since they allow quick network roll out and improved capacity and coverage of existing networks. Nonetheless, the usefulness of extra capacity (and/or coverage) afforded by relay nodes is largely wasted insofar...

    Provided By Kings College London

  • White Papers // May 2012

    Coordinated Beamforming Using Semidefinite Programming

    In this paper, the authors study a Coordinated BeamForming (CBF) scheme for a multi-cell scenario where pre-coding/beamforming vectors for all coordinating Base Stations (BSs) are jointly designed in a manner that each BS transmits to its local users. They minimise the total transmit power across coordinating BSs while keeping the...

    Provided By Kings College London

  • White Papers // May 2011

    Efficient Multi-Granularity Service Composition

    Dynamic composition of services provides the ability to build complex distributed applications at run time by combining existing services, thus coping with a large variety of complex requirements that cannot be met by individual services alone. However, with the increasing amount of available services that differ in granularity (amount of...

    Provided By Kings College London

  • White Papers // Jan 2012

    Traffic Grooming on Path Network

    In traffic grooming the authors are given an optical network with nodes linked by optical fiber strand that support a number of wavelengths (light-path) with fixed bandwidth capacity, C. A demand (request) over the network is specified by a pair of source and destination node. A request is associated with...

    Provided By Kings College London

  • White Papers // May 2008

    Constructing Subtle Faults Using Higher Order Mutation Testing

    Traditional mutation testing considers only first order mutants, created by the injection of a single fault. Often these first order mutants denote trivial faults that are easily killed. This paper investigates Higher Order Mutants (HOMs). It introduces the concept of a subsuming HOM; one that is harder to kill than...

    Provided By Kings College London

  • White Papers // Jul 2008

    Test Data Augmentation : Generating New Test Data From Existing Test Data

    Existing automated test data generation techniques tend to start from scratch, implicitly assuming no pre-existing test data are available. However, this assumption may not always hold, and where it does not, there may be a missed opportunity; perhaps the pre-existing test cases could be used to assist the automated generation...

    Provided By Kings College London

  • White Papers // Apr 2009

    Search Based Software Engineering: A Comprehensive Analysis and Review of Trends Techniques and Applications

    In the past five years there has been a dramatic increase in work on Search Based Software Engineering (SBSE), an approach to software engineering in which search based optimisation algorithms are used to address problems in Software Engineering. SBSE has been applied to problems throughout the Software Engineering lifecycle, from...

    Provided By Kings College London

  • White Papers // Sep 2009

    An Analysis and Survey of the Development of Mutation Testing

    Mutation Testing is a fault - based software testing technique that has been widely studied for over three decades. The literature on Mutation Testing has contributed a set of approaches, tools, developments and empirical results which have not been surveyed in detail until now. This paper provides a comprehensive analysis...

    Provided By Kings College London

  • White Papers // Feb 2010

    Evolving Gzip Matches Kernel From an NVidia CUDA Template

    Rather than attempting to evolve a complete program from scratch the authors demonstrate genetic interface programming by automatically generating a parallel CUDA kernel with identical functionality to existing highly optimised ancient sequential C code. Generic GPGPU nVidia kernel C++ code is converted into a BNF grammar. Strongly typed genetic programming...

    Provided By Kings College London

  • White Papers // Jul 2010

    Evolving a CUDA Kernel From an NVidia Template

    The authors automatically generate an nVidia parallel CUDA graphics card kernel with identical functionality to existing highly optimised ancient sequential C code. Essentially generic GPGPU C++ code supplied by the hardware manufacturer is converted into a BNF grammar. Strongly typed genetic programming uses the BNF to generate compliable and runnable...

    Provided By Kings College London

  • White Papers // Nov 2009

    Cognitive Delay Tolerant Wired-Cum-Wireless Multimedia Networks

    It is surprising to note that as of 2010 the significantly larger bulk of electronic data is neither delivered via a wireless nor a wired interface - it is simply posted. A significant constituent of this data is multimedia delay tolerant bulk data. Examples are video and audio data which...

    Provided By Kings College London

  • White Papers // Jul 2010

    Measuring and Improving Latency to Avoid Test Suite Wear Out

    This paper introduces the concept of test suite latency. The more latent a test suite, the more it is possible to repeatedly select subsets that achieve a test goal (such as coverage) without re-applying test cases. Where a test case is re-applied it cannot reveal new information. The more a...

    Provided By Kings College London

  • White Papers // Apr 2011

    Opportunistic Load and Spectrum Management for Mobile Communications Energy Efficiency

    Dynamic load and spectrum usage management techniques can significantly improve the energy efficiency of mobile communications systems. This paper considers: the opportunistic reallocation of traffic loads between bands to allow radio network equipment in the bands that the traffic is originated from to be powered down, and the opportunistic selection...

    Provided By Kings College London

  • White Papers // Nov 2012

    A Decentralized Downlink Beamforming Algorithm for Multicell Processing

    In this paper, the authors tackle the problem of intercell-interference in the absence of cooperation amongst Base Stations (BSs). The problem originates from the simultaneous transmissions of several BSs to their local users within their corresponding cells using the same frequency band. They propose a decentralized downlink beamforming scheme in...

    Provided By Kings College London

  • White Papers // Nov 2012

    On Energy Efficient Routing Using Cooperative Physical Layer Network Coding

    In this paper, the authors focus on energy efficient routing in wireless ad hoc networks. They exploit modulo combining of continuous-time signals arriving at a receiving node from a number of synchronized transmitting nodes and introduce a Cooperative Physical Layer Network Coding (CPLNC) scheme. To demonstrate the effectiveness of the...

    Provided By Kings College London

  • White Papers // Jan 2012

    Identifying Network Failure via Detecting Changes in Power Profile

    Failure in the network devices can be identified by detecting changes in the behavior of the network. Such a network can be part of the communication infrastructure, which will play a significant role in the emergency managements. Network power consumption behavior, namely its power profile, is a relatively robust profile...

    Provided By Kings College London

  • White Papers // May 2009

    TCP-Aware Resource Allocation in Wireless Networks Via Utility Maximisation

    Motivated by the fact that a plethora of different applications, ranging from streaming video to file transferring, are using TCP the authors propose a set of utility functions that capture these application and optimise the transmission of TCP over wireless via a utility maximisation framework. They show that defining such...

    Provided By Kings College London

  • White Papers // Jun 2009

    Automatically Compute Information Flow Quantity Via Probabilistic Semantics

    Measuring information flow in software has recently become an active research topic in the security community. Information about confidential inputs may flow to public outputs in batch programs. It would be useful to quantify such flows in the computational world. In this paper, the authors present an automatic analyzer for...

    Provided By Kings College London

  • White Papers // Jul 2009

    Quantitative Analysis of Secure Information Flow Via Probabilistic Semantics

    The authors present an automatic analyzer for measuring information flow within software systems. In this paper, they quantify leakage in terms of information theory and incorporate this computation into probabilistic semantics. Their semantic functions provide information flow measurement for programs given secure inputs under any probability distribution. The major contribution...

    Provided By Kings College London

  • White Papers // Nov 2010

    Green Spectrum Management for Mobile Operators

    This paper proposes intra-operator dynamic spectrum access, i.e., dynamic spectrum access by an operator's networks of its available spectrum bands, as a means to improve power efficiency. It is based around four areas of interest: dynamically moving users into particularly active bands from other bands to allow radio network equipment...

    Provided By Kings College London