Nanjing University

Displaying 1-40 of 45 results

  • White Papers // Mar 2014

    Wireless Network-on-Chip: A Survey

    To alleviate the complex communication problems arising in the Network-on-Chip (NoC) architectures as the number of on-chip components increases, several novel interconnect infrastructures have been recently proposed to replace the traditional on-chip interconnection systems that are reaching their limits in terms of performance, power, and area constraints. Wireless Network-on-Chip (WiNoC)...

    Provided By Nanjing University

  • White Papers // Sep 2013

    Product-Form Solutions for Integrated Services Packet Networks and Cloud Computing Systems

    The authors iteratively derive the product-form solutions of stationary distributions of priority multiclass queuing networks with multi-sever stations. The networks are Markovian with exponential interarrival and service time distributions. These solutions can be used to conduct performance analysis or as comparison criteria for approximation and simulation studies of large scale...

    Provided By Nanjing University

  • White Papers // May 2013

    QoS-Aware Service Selection in Geographically Distributed Clouds

    As more and more services are offered in clouds, it is possible to meet the diverse demands of users via service composition. Selecting the optimal set of services, in terms of QoS, is the crucial issue when many functionally equivalent services are available. In this paper, the authors investigate the...

    Provided By Nanjing University

  • White Papers // Feb 2013

    Energy Efficient Virtual Machine Placement Algorithm With Balanced and Improved Resource Utilization in Data Center

    Powerful data centers are the essential supporting infrastructure for mobile, ubiquitous, and cognitive computing, which are the most popular computing paradigms to utilize all kinds of physical resources and provide various services. To ensure the high quality of services, the performance and cost of a data center is a critical...

    Provided By Nanjing University

  • White Papers // Feb 2013

    Optimization of Large Scale of Files Transfer in Meteorological Grid

    In this paper, the authors focus on performance enhancement of large scale of small files transfer, which is critical to the performance of meteorological grid. GridFTP and compression techniques are used to optimize the efficiency. The transfer parameters are configured before transmission, such as extended block mode (Mode E), TCP...

    Provided By Nanjing University

  • White Papers // Feb 2013

    A Novel Key Management Scheme Supporting Network Dynamic Update in Wireless Sensor Network

    With the development of Wireless Sensor Network (WSN) technology, it has been adopted in a wide variety of applications such as the health care system and so on. Yet, there are still some problems need to be addressed, one of which is the security issue. A lot of schemes from...

    Provided By Nanjing University

  • White Papers // Dec 2012

    An Energy-Efficient Competitive Clustering Algorithm for Wireless Sensor Networks Using Mobile Sink

    Wireless sensor networks commonly consist of a large number of tiny sensor nodes that are deployed either inside the target area or very close to it to cooperatively monitor the target area. Energy efficiency and network lifetime are two challenges that most of researchers deal with. In this paper, to...

    Provided By Nanjing University

  • White Papers // Dec 2012

    An Context-aware Management and Control Mechanism in a Mobile Ad-Hoc Environment

    Complete integration and interaction of network objects can be achieved in a mobile ad-hoc environment. Yet, the dynamic nature of free movement and interaction among these objects also brings challenges on information representation, processing and communication. This paper presents a context-aware mechanism, which is able to implement efficient information exchange...

    Provided By Nanjing University

  • White Papers // Dec 2012

    Application of Improved DBSCAN Algorithm in the Plan Compilation Management

    For further solving the problem of normative emergency plan, text mining should be combined with emergency plan compilation. Fixed "Threshold strategy is used by traditional DBSCAN, which would lead to the problem of cluster boundary wrong recognition. Improved DBSCAN algorithm is introduced in this paper. Least Square Fit is taken...

    Provided By Nanjing University

  • White Papers // Nov 2012

    Online Vector Scheduling and Generalized Load Balancing

    Scheduling with costs is a very well studied problem in combinatorial optimization. The traditional paradigm assumes single-cost scenario: each job incurs a single cost to the machine that it is assigned to. The load of a machine is the total cost incurred by the jobs it serves. The objective is...

    Provided By Nanjing University

  • White Papers // Oct 2012

    Collaborative Mobile Charging for Sensor Networks

    The limited battery capacity of sensor nodes has become the biggest impediment to Wireless Sensor Network (WSN) applications. Two recent breakthroughs in the areas of wireless energy transfer and rechargeable lithium batteries promise the use of mobile vehicles, with high volume batteries, as mobile chargers that transfer energy to sensor...

    Provided By Nanjing University

  • White Papers // Sep 2012

    On Minimum Delay Duty-Cycling Protocol in Sustainable Sensor Network

    To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, the authors are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper,...

    Provided By Nanjing University

  • White Papers // Jul 2012

    Virtual Network Embedding With Substrate Support for Parallelization

    Network virtualization has been the focus of intense research interest and is a promising approach to overcome the ossification of the Internet. A major challenge with network virtualization is virtual network embedding, which deals with the efficient embedding of virtual networks with resource constraints into a substrate network. Many research...

    Provided By Nanjing University

  • White Papers // May 2012

    A Layer-Based Routing Protocol for Heterogeneous Wireless Sensor Networks

    Due to requirements in different applications, sensors with various capacities are deployed. Data routing in such Heterogeneous Wireless Sensor Networks (HWSNs) poses challenges. First, the heterogeneous features create asymmetric links in the communication graphs which are not dealt with by conventional routing algorithms using undirected graphs. Second, it is important...

    Provided By Nanjing University

  • White Papers // May 2012

    Quality-Delay Tradeoff for Video Streaming Over Mobile Ad Hoc Networks

    In this paper, the authors study the quality-delay tradeoff for video streaming over mobile ad hoc network by utilizing a class of scheduling schemes. They show that node spatial mobility indeed impacts on the performance of wireless video transmission under the assumption that all the nodes can identically and uniformly...

    Provided By Nanjing University

  • White Papers // May 2012

    Optimal Power Allocation for OFDM-Based Cooperative Relay Cognitive Radio Networks

    Cognitive Radio (CR) network with cooperative relay is potentially a promising technique to solve current spectrum inefficiency and spectrum scarcity problem. In this paper, the authors study the power allocation in Cognitive Radio (CR) networks with cooperative relay. The interference to the licensed primary system and the power budget of...

    Provided By Nanjing University

  • White Papers // May 2012

    Neighbor Discovery in Peer-to-Peer Wireless Networks With Multi-Channel MPR Capability

    The authors study the time duration of neighbor discovery in peer-to-peer wireless networks with multi-channel multi-packet reception capability. Radios with this capability, at any time slot, can either transmit messages in one channel or receive messages from all channels. This capability is provided by emerging CDMA/OFDMA techniques. Neighbor discovery in...

    Provided By Nanjing University

  • White Papers // Apr 2012

    Efficient Median Estimation for RFID Systems

    Radio Frequency IDentification (RFID) tags are used in a lot of applications such as production line and inventory management. Sensors are also a widely adopted wireless technology. This large-scale deployment of both RFID technology and sensor technology has opened the door to innovative ways to integrate RFID and sensor technology....

    Provided By Nanjing University

  • White Papers // Mar 2012

    A Particle Swarm Optimization Algorithm for Resource Allocation in Femtocell Networks

    Femtocell network is an efficient configuration to improve coverage and Quality of Service (QoS) in cellular networks. However, due to dense deployment, users in a femtocell may be interfered by the base stations nearby, resulting in a deteriorated throughput of the femtocell. In this paper, the authors investigate the resource...

    Provided By Nanjing University

  • White Papers // Mar 2012

    An Anti-Cheating Bidding Approach for Resource Allocation in Cloud Computing Environments

    Cloud computing is a large-scale distributed computing paradigm, which uses a usage-based pricing model to deliver various services and resources on demand to participants globally distributed over the Internet. Cloud computing systems incorporate different types of participants with varied private valuations for resources and multi-priority tasks which should be considered...

    Provided By Nanjing University

  • White Papers // Mar 2012

    A Framework for Service-Based Business Process Collaboration

    Now-a-days, web services-based systems have gained the attention of researchers, and it enables business process system to automatically discover and invocate suitable web services at run time. Further with portable terminals, it has become more and more popular for mobile users to do their business management in modern business process...

    Provided By Nanjing University

  • White Papers // Jan 2012

    DOTA: A Double Truthful Auction for Spectrum Allocation in Dynamic Spectrum Access

    Spectrum auctions have been proposed as an effective approach to fairly and efficiently trade the scarce spectrum resource among wireless users. The most significant challenge of the auction design to provide economic robustness, particularly truthfulness, under the local-dependent interference constraints. However, existing designs either do not consider spectrum reuse or...

    Provided By Nanjing University

  • White Papers // Jan 2012

    Resource Allocation for Heterogeneous Multiuser OFDM-Based Cognitive Radio Networks with Imperfect Spectrum Sensing

    In this paper, the authors study the resource allocation in OFDM-based Cognitive Radio (CR) networks, under the consideration of many practical limitations such as imperfect spectrum sensing, limited transmission power, different traffic demands of secondary users, etc. They formulated this general problem as a mixed integer programming task. Considering that...

    Provided By Nanjing University

  • White Papers // Oct 2011

    Characterizing System-Level Vulnerability for Instruction Caches Against Soft Errors

    With continuous scaling down of the semiconductor technology, the soft errors induced by energetic particles have become an increasing challenge in designing current and next-generation reliable microprocessors. Due to their large share of the transistor budget and die area, cache memories suffer from an increasing vulnerability against soft errors. Previous...

    Provided By Nanjing University

  • White Papers // Sep 2011

    A History Record-Based Service Optimization Method for QoS-Aware Service Composition

    The performance of a service's QoS may evolve relatively frequently with its internal changes or the changes of dynamic Internet environment, especially when some "Intentional" deceptions are taken into consideration. Therefore, the service providers could not always deliver their services according to their "Promised" quality. In view of this challenge,...

    Provided By Nanjing University

  • White Papers // Aug 2011

    Throughput Maximization in Cognitive Radio Based Wireless Mesh Networks

    Cognitive radio is a key technology needed to better utilize the available spectrum more efficiently. In this paper, the authors consider the throughput optimization problem via spectrum allocation in the Cognitive Radio based Wireless Mesh Networks (CR-based WMNs). Unlike prior research, they consider both the lower layer noncontinuous OFDM features...

    Provided By Nanjing University

  • White Papers // Jul 2011

    Opportunistic Bandwidth Sharing for Virtual Network Mapping

    Network virtualization has emerged as a powerful way to fend off the current ossification of the Internet. A major challenge is virtual network mapping, which is to assign substrate resources to Virtual Networks (VNs) such that some predefined constraints are satisfied and substrate resources are utilized in an effective and...

    Provided By Nanjing University

  • White Papers // Jun 2011

    Application of NoSQL Database in Web Crawling

    Web crawling is one of the most important applications of the Internet; the selection of database storage directly affects the performance of search engines. In the past few decades, the traditional relational databases almost monopolize all areas of the database applications. However, with the continuous development of web applications, they...

    Provided By Nanjing University

  • White Papers // Mar 2011

    Spatial Ordering Derivation for One-Dimensional Wireless Sensor Networks

    Sensors can be deployed along a road or bridge to form a one-dimensional wireless sensor network where nodes have a spatial ordering. This spatial characteristic indicates relative locations for nodes and facilitates functions like object tracking and monitoring in the network. The authors target at deriving this ordering without attaching...

    Provided By Nanjing University

  • White Papers // Nov 2010

    Efficient Emergency Rescue Navigation With Wireless Sensor Networks

    Recently, many applications in Wireless Sensor Networks (WSNs) have been discussed. Navigation with WSNs is among the most heated debated ones. Previous navigation algorithms attempt to find safe and efficient escape paths for individuals under various environmental dynamics but ignore possible congestion caused by the individuals rushing for the exits....

    Provided By Nanjing University

  • White Papers // Aug 2010

    PCAR: A Power Controlled Routing Protocol for Wireless Ad Hoc Networks

    Power control and routing are two fundamental supporting techniques for wireless communications in ad hoc networks. However, most existing power control and routing proposals are not really efficient enough, due to separate considerations on them. In this paper, motivated by the observation on the necessity and feasibility of the combination...

    Provided By Nanjing University

  • White Papers // Jul 2010

    On Detecting Clustered Anomalies Using SCiForest

    Detecting local clustered anomalies is an intricate problem for many existing anomaly detection methods. Distance-based and density-based methods are inherently restricted by their basic assumptions - anomalies are either far from normal points or being sparse. Clustered anomalies are able to avoid detection since they defy these assumptions by being...

    Provided By Nanjing University

  • White Papers // Jun 2010

    APEX: A Personalization Framework to Improve Quality of Experience for DVD-Like Functions in P2P VoD Applications

    The requirement for supporting DVD-like functions raises new challenges to the design of P2P VoD systems. The uncertainty of frequent user DVD-like interactivity makes it difficult to ensure user perceived Quality of Experience (QoE) for real-time streaming services over distributed self-organized P2P overlay networks. Most existing solutions are based on...

    Provided By Nanjing University

  • White Papers // Dec 2009

    Efficient Tag Identification in Mobile RFID Systems

    In this paper, the authors consider how to efficiently identify tags on the moving conveyor. Considering conditions like the path loss and multi-path effect in realistic settings, they first propose a probabilistic model for RFID tag identification. Based on this model, they propose efficient solutions to identify moving RFID tags,...

    Provided By Nanjing University

  • White Papers // Nov 2009

    Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments

    Context consistency checking, the checking of specified constraint on properties of contexts, is essential to context-aware applications. In order to delineate and adapt to dynamic changes in the pervasive computing environment, context-aware applications often need to specify and check behavioral consistency constraints over the contexts. This problem is challenging mainly...

    Provided By Nanjing University

  • White Papers // Aug 2009

    iBrush: Writing Chinese Characters With Flashlight and Wireless Sensor Grid

    Light is the widely available and pervasive resource in one's daily life. Existing research shows that light can be used in localization in wireless sensor networks. Meanwhile, the former work also indicates that wireless sensor networks can track light sources. This paper demonstrates iBrush, a system which allows users to...

    Provided By Nanjing University

  • White Papers // Jun 2009

    On Maximum Stability With Enhanced Scalability in High-Churn DHT Deployment

    When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is prohibitively high, they must be effectively utilized due to the lack of stable participants. Thus, determining how to leverage unstable nodes to enhance system scalability and...

    Provided By Nanjing University

  • White Papers // May 2009

    Semi-Supervised Learning by Disagreement

    In many real-world tasks there are abundant unlabeled examples but the number of labeled training examples is limited, because labeling the examples requires human efforts and expertise. So, semi-supervised learning which tries to exploit unlabeled examples to improve learning performance has become a hot topic. Disagreement-based semi-supervised learning is an...

    Provided By Nanjing University

  • White Papers // Mar 2009

    Multi-Instance Learning Based Web Mining

    In multi-instance learning, the training set comprises labeled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. In this paper, a web mining problem, i.e. web index recommendation, is investigated from a multi-instance view. In detail, each web index page is...

    Provided By Nanjing University

  • White Papers // Mar 2009

    A Novel Bag Generator for Image Database Retrieval with Multi-Instance Learning Techniques

    In multi-instance learning, the training examples are bags composed of instances without labels and the task is to predict the labels of unseen bags through analyzing the training bags with known labels. In Content-Based Image Retrieval (CBIR), the query is ambiguous because it is hard to ask the user precisely...

    Provided By Nanjing University

  • White Papers // Dec 2012

    An Energy-Efficient Competitive Clustering Algorithm for Wireless Sensor Networks Using Mobile Sink

    Wireless sensor networks commonly consist of a large number of tiny sensor nodes that are deployed either inside the target area or very close to it to cooperatively monitor the target area. Energy efficiency and network lifetime are two challenges that most of researchers deal with. In this paper, to...

    Provided By Nanjing University

  • White Papers // Dec 2012

    An Context-aware Management and Control Mechanism in a Mobile Ad-Hoc Environment

    Complete integration and interaction of network objects can be achieved in a mobile ad-hoc environment. Yet, the dynamic nature of free movement and interaction among these objects also brings challenges on information representation, processing and communication. This paper presents a context-aware mechanism, which is able to implement efficient information exchange...

    Provided By Nanjing University

  • White Papers // Dec 2012

    Application of Improved DBSCAN Algorithm in the Plan Compilation Management

    For further solving the problem of normative emergency plan, text mining should be combined with emergency plan compilation. Fixed "Threshold strategy is used by traditional DBSCAN, which would lead to the problem of cluster boundary wrong recognition. Improved DBSCAN algorithm is introduced in this paper. Least Square Fit is taken...

    Provided By Nanjing University

  • White Papers // Nov 2012

    Online Vector Scheduling and Generalized Load Balancing

    Scheduling with costs is a very well studied problem in combinatorial optimization. The traditional paradigm assumes single-cost scenario: each job incurs a single cost to the machine that it is assigned to. The load of a machine is the total cost incurred by the jobs it serves. The objective is...

    Provided By Nanjing University

  • White Papers // Nov 2010

    Efficient Emergency Rescue Navigation With Wireless Sensor Networks

    Recently, many applications in Wireless Sensor Networks (WSNs) have been discussed. Navigation with WSNs is among the most heated debated ones. Previous navigation algorithms attempt to find safe and efficient escape paths for individuals under various environmental dynamics but ignore possible congestion caused by the individuals rushing for the exits....

    Provided By Nanjing University

  • White Papers // Feb 2013

    Optimization of Large Scale of Files Transfer in Meteorological Grid

    In this paper, the authors focus on performance enhancement of large scale of small files transfer, which is critical to the performance of meteorological grid. GridFTP and compression techniques are used to optimize the efficiency. The transfer parameters are configured before transmission, such as extended block mode (Mode E), TCP...

    Provided By Nanjing University

  • White Papers // Feb 2013

    A Novel Key Management Scheme Supporting Network Dynamic Update in Wireless Sensor Network

    With the development of Wireless Sensor Network (WSN) technology, it has been adopted in a wide variety of applications such as the health care system and so on. Yet, there are still some problems need to be addressed, one of which is the security issue. A lot of schemes from...

    Provided By Nanjing University

  • White Papers // May 2013

    QoS-Aware Service Selection in Geographically Distributed Clouds

    As more and more services are offered in clouds, it is possible to meet the diverse demands of users via service composition. Selecting the optimal set of services, in terms of QoS, is the crucial issue when many functionally equivalent services are available. In this paper, the authors investigate the...

    Provided By Nanjing University

  • White Papers // Feb 2013

    Energy Efficient Virtual Machine Placement Algorithm With Balanced and Improved Resource Utilization in Data Center

    Powerful data centers are the essential supporting infrastructure for mobile, ubiquitous, and cognitive computing, which are the most popular computing paradigms to utilize all kinds of physical resources and provide various services. To ensure the high quality of services, the performance and cost of a data center is a critical...

    Provided By Nanjing University

  • White Papers // Aug 2009

    iBrush: Writing Chinese Characters With Flashlight and Wireless Sensor Grid

    Light is the widely available and pervasive resource in one's daily life. Existing research shows that light can be used in localization in wireless sensor networks. Meanwhile, the former work also indicates that wireless sensor networks can track light sources. This paper demonstrates iBrush, a system which allows users to...

    Provided By Nanjing University

  • White Papers // Jan 2009

    Energy Efficient Reliable Multi-Path Routing Using Network Coding for Sensor Network

    With the advantage from network coding, the packets are encoded at source and intermediate nodes respectively, and the sink node obtains the data by decoding. Even if partial packets are lost, some nodes or links are failure, the original data can be recovered at the sink node. This paper presents...

    Provided By Nanjing University

  • White Papers // Jun 2009

    On Maximum Stability With Enhanced Scalability in High-Churn DHT Deployment

    When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is prohibitively high, they must be effectively utilized due to the lack of stable participants. Thus, determining how to leverage unstable nodes to enhance system scalability and...

    Provided By Nanjing University

  • White Papers // Nov 2009

    Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments

    Context consistency checking, the checking of specified constraint on properties of contexts, is essential to context-aware applications. In order to delineate and adapt to dynamic changes in the pervasive computing environment, context-aware applications often need to specify and check behavioral consistency constraints over the contexts. This problem is challenging mainly...

    Provided By Nanjing University

  • White Papers // Mar 2009

    Towards Hierarchical Cluster Based Cache Coherence for Large-Scale Network-on-Chip

    Network-on-Chip (NoC) is considered to be a promising scheme for future MPSoCs. NoC can provide high bandwidth, low latency, parallel communication and scalable design exploration space. The increasing integration density will allow NoCs to integrate more and more components. The memory system will consume large part of on-chip area. The...

    Provided By Nanjing University

  • White Papers // Jul 2011

    Opportunistic Bandwidth Sharing for Virtual Network Mapping

    Network virtualization has emerged as a powerful way to fend off the current ossification of the Internet. A major challenge is virtual network mapping, which is to assign substrate resources to Virtual Networks (VNs) such that some predefined constraints are satisfied and substrate resources are utilized in an effective and...

    Provided By Nanjing University

  • White Papers // Aug 2010

    PCAR: A Power Controlled Routing Protocol for Wireless Ad Hoc Networks

    Power control and routing are two fundamental supporting techniques for wireless communications in ad hoc networks. However, most existing power control and routing proposals are not really efficient enough, due to separate considerations on them. In this paper, motivated by the observation on the necessity and feasibility of the combination...

    Provided By Nanjing University

  • White Papers // Dec 2009

    Efficient Tag Identification in Mobile RFID Systems

    In this paper, the authors consider how to efficiently identify tags on the moving conveyor. Considering conditions like the path loss and multi-path effect in realistic settings, they first propose a probabilistic model for RFID tag identification. Based on this model, they propose efficient solutions to identify moving RFID tags,...

    Provided By Nanjing University

  • White Papers // Aug 2011

    Throughput Maximization in Cognitive Radio Based Wireless Mesh Networks

    Cognitive radio is a key technology needed to better utilize the available spectrum more efficiently. In this paper, the authors consider the throughput optimization problem via spectrum allocation in the Cognitive Radio based Wireless Mesh Networks (CR-based WMNs). Unlike prior research, they consider both the lower layer noncontinuous OFDM features...

    Provided By Nanjing University

  • White Papers // Sep 2011

    A History Record-Based Service Optimization Method for QoS-Aware Service Composition

    The performance of a service's QoS may evolve relatively frequently with its internal changes or the changes of dynamic Internet environment, especially when some "Intentional" deceptions are taken into consideration. Therefore, the service providers could not always deliver their services according to their "Promised" quality. In view of this challenge,...

    Provided By Nanjing University

  • White Papers // Jun 2011

    Application of NoSQL Database in Web Crawling

    Web crawling is one of the most important applications of the Internet; the selection of database storage directly affects the performance of search engines. In the past few decades, the traditional relational databases almost monopolize all areas of the database applications. However, with the continuous development of web applications, they...

    Provided By Nanjing University

  • White Papers // Jan 2012

    DOTA: A Double Truthful Auction for Spectrum Allocation in Dynamic Spectrum Access

    Spectrum auctions have been proposed as an effective approach to fairly and efficiently trade the scarce spectrum resource among wireless users. The most significant challenge of the auction design to provide economic robustness, particularly truthfulness, under the local-dependent interference constraints. However, existing designs either do not consider spectrum reuse or...

    Provided By Nanjing University

  • White Papers // Jun 2010

    APEX: A Personalization Framework to Improve Quality of Experience for DVD-Like Functions in P2P VoD Applications

    The requirement for supporting DVD-like functions raises new challenges to the design of P2P VoD systems. The uncertainty of frequent user DVD-like interactivity makes it difficult to ensure user perceived Quality of Experience (QoE) for real-time streaming services over distributed self-organized P2P overlay networks. Most existing solutions are based on...

    Provided By Nanjing University

  • White Papers // Sep 2008

    Supporting VCR-Like Operations in Derivative Tree-Based P2P Streaming Systems

    Supporting user interactivity in peer-to-peer streaming systems is challenging. VCR-like operations, such as random seek, pause, fast forward and rewind, require timely P2P overlay topology adjustment and appropriate bandwidth resource re-allocation. If not handled properly, the dynamics caused by user interactivity may severely deteriorate users' perceived video quality, e.g., longer...

    Provided By Nanjing University

  • White Papers // Apr 2012

    Efficient Median Estimation for RFID Systems

    Radio Frequency IDentification (RFID) tags are used in a lot of applications such as production line and inventory management. Sensors are also a widely adopted wireless technology. This large-scale deployment of both RFID technology and sensor technology has opened the door to innovative ways to integrate RFID and sensor technology....

    Provided By Nanjing University

  • White Papers // Mar 2011

    Spatial Ordering Derivation for One-Dimensional Wireless Sensor Networks

    Sensors can be deployed along a road or bridge to form a one-dimensional wireless sensor network where nodes have a spatial ordering. This spatial characteristic indicates relative locations for nodes and facilitates functions like object tracking and monitoring in the network. The authors target at deriving this ordering without attaching...

    Provided By Nanjing University

  • White Papers // Oct 2012

    Collaborative Mobile Charging for Sensor Networks

    The limited battery capacity of sensor nodes has become the biggest impediment to Wireless Sensor Network (WSN) applications. Two recent breakthroughs in the areas of wireless energy transfer and rechargeable lithium batteries promise the use of mobile vehicles, with high volume batteries, as mobile chargers that transfer energy to sensor...

    Provided By Nanjing University

  • White Papers // Sep 2012

    On Minimum Delay Duty-Cycling Protocol in Sustainable Sensor Network

    To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, the authors are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper,...

    Provided By Nanjing University

  • White Papers // Jul 2012

    Virtual Network Embedding With Substrate Support for Parallelization

    Network virtualization has been the focus of intense research interest and is a promising approach to overcome the ossification of the Internet. A major challenge with network virtualization is virtual network embedding, which deals with the efficient embedding of virtual networks with resource constraints into a substrate network. Many research...

    Provided By Nanjing University

  • White Papers // Mar 2012

    An Anti-Cheating Bidding Approach for Resource Allocation in Cloud Computing Environments

    Cloud computing is a large-scale distributed computing paradigm, which uses a usage-based pricing model to deliver various services and resources on demand to participants globally distributed over the Internet. Cloud computing systems incorporate different types of participants with varied private valuations for resources and multi-priority tasks which should be considered...

    Provided By Nanjing University

  • White Papers // May 2012

    A Layer-Based Routing Protocol for Heterogeneous Wireless Sensor Networks

    Due to requirements in different applications, sensors with various capacities are deployed. Data routing in such Heterogeneous Wireless Sensor Networks (HWSNs) poses challenges. First, the heterogeneous features create asymmetric links in the communication graphs which are not dealt with by conventional routing algorithms using undirected graphs. Second, it is important...

    Provided By Nanjing University

  • White Papers // May 2012

    Quality-Delay Tradeoff for Video Streaming Over Mobile Ad Hoc Networks

    In this paper, the authors study the quality-delay tradeoff for video streaming over mobile ad hoc network by utilizing a class of scheduling schemes. They show that node spatial mobility indeed impacts on the performance of wireless video transmission under the assumption that all the nodes can identically and uniformly...

    Provided By Nanjing University

  • White Papers // May 2012

    Optimal Power Allocation for OFDM-Based Cooperative Relay Cognitive Radio Networks

    Cognitive Radio (CR) network with cooperative relay is potentially a promising technique to solve current spectrum inefficiency and spectrum scarcity problem. In this paper, the authors study the power allocation in Cognitive Radio (CR) networks with cooperative relay. The interference to the licensed primary system and the power budget of...

    Provided By Nanjing University

  • White Papers // May 2012

    Neighbor Discovery in Peer-to-Peer Wireless Networks With Multi-Channel MPR Capability

    The authors study the time duration of neighbor discovery in peer-to-peer wireless networks with multi-channel multi-packet reception capability. Radios with this capability, at any time slot, can either transmit messages in one channel or receive messages from all channels. This capability is provided by emerging CDMA/OFDMA techniques. Neighbor discovery in...

    Provided By Nanjing University

  • White Papers // Mar 2012

    A Particle Swarm Optimization Algorithm for Resource Allocation in Femtocell Networks

    Femtocell network is an efficient configuration to improve coverage and Quality of Service (QoS) in cellular networks. However, due to dense deployment, users in a femtocell may be interfered by the base stations nearby, resulting in a deteriorated throughput of the femtocell. In this paper, the authors investigate the resource...

    Provided By Nanjing University

  • White Papers // Jan 2012

    Resource Allocation for Heterogeneous Multiuser OFDM-Based Cognitive Radio Networks with Imperfect Spectrum Sensing

    In this paper, the authors study the resource allocation in OFDM-based Cognitive Radio (CR) networks, under the consideration of many practical limitations such as imperfect spectrum sensing, limited transmission power, different traffic demands of secondary users, etc. They formulated this general problem as a mixed integer programming task. Considering that...

    Provided By Nanjing University

  • White Papers // Oct 2011

    Characterizing System-Level Vulnerability for Instruction Caches Against Soft Errors

    With continuous scaling down of the semiconductor technology, the soft errors induced by energetic particles have become an increasing challenge in designing current and next-generation reliable microprocessors. Due to their large share of the transistor budget and die area, cache memories suffer from an increasing vulnerability against soft errors. Previous...

    Provided By Nanjing University

  • White Papers // May 2009

    Semi-Supervised Learning by Disagreement

    In many real-world tasks there are abundant unlabeled examples but the number of labeled training examples is limited, because labeling the examples requires human efforts and expertise. So, semi-supervised learning which tries to exploit unlabeled examples to improve learning performance has become a hot topic. Disagreement-based semi-supervised learning is an...

    Provided By Nanjing University

  • White Papers // Mar 2009

    Multi-Instance Learning Based Web Mining

    In multi-instance learning, the training set comprises labeled bags that are composed of unlabeled instances, and the task is to predict the labels of unseen bags. In this paper, a web mining problem, i.e. web index recommendation, is investigated from a multi-instance view. In detail, each web index page is...

    Provided By Nanjing University

  • White Papers // Jan 2006

    Solving Multi-Instance Problems with Classifier Ensemble Based on Constructive Clustering

    In multi-instance learning, the training set is composed of labeled bags each consists of many unlabeled instances, that is, an object is represented by a set of feature vectors instead of only one feature vector. Most current multi-instance learning algorithms work through adapting single-instance learning algorithms to the multi-instance representation,...

    Provided By Nanjing University

  • White Papers // Jan 2007

    Semi-Supervised Dimensionality Reduction

    Dimensionality reduction is among the keys in mining high-dimensional data. This paper studies semi-supervised dimensionality reduction. In this setting, besides abundant unlabeled examples, domain knowledge in the form of pairwise constraints is available, which specifies whether a pair of instances belong to the same class (must-link constraints) or different classes...

    Provided By Nanjing University