Polytechnic Institute of New York University

Displaying 1-35 of 35 results

  • White Papers // Oct 2013

    Titan: A Carrier-Based Approach for Detecting and Mitigating Mobile Malware

    The ubiquity of mobile devices and their evolution as computing platforms has made them lucrative targets for malware. Malware, such as spyware, Trojans, rootkits and botnets that have traditionally plagued PCs are now increasingly targeting mobile devices and are also referred to as mobile malware. Cybercriminal attacks have used mobile...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2012

    Energy-Efficient Sensing and Communication of Parallel Gaussian Sources

    Energy efficiency is a key requirement in the design of wireless sensor networks. While most theoretical studies only account for the energy requirements of communication, the sensing process, which includes measurements and compression, can also consume comparable energy. In this paper, the problem of sensing and communicating parallel sources is...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2012

    Towards a Representive Testbed: Harnessing Volunteers for Networks Research

    A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Several systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2012

    Two-Way Wireless Video Communication Using Randomized Cooperation, Network Coding and Packet Level FEC

    Two-way real-time video communication in wireless networks requires high bandwidth, low delay and error resiliency. This paper addresses these demands by proposing a system with the integration of Network Coding (NC), user cooperation using Randomized Distributed Space-Time Coding (R-DSTC) and packet level Forward Error Correction (FEC) under a one-way delay...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Optimal Transmission Policies for Energy Harvesting Two-Hop Networks

    In this paper, a two-hop communication system with energy harvesting nodes is considered. Unlike battery powered wireless nodes, both the source and the relay are able to harvest energy from environment during communication, therefore, both data and energy causality over the two hops need to be considered. Assuming both nodes...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Joint Source-Channel Cooperative Transmission Over Relay-Broadcast Networks

    Reliable transmission of a discrete memoryless source over a multiple-relay relay-broadcast network is considered. Motivated by sensor network applications, it is assumed that the relays and the destinations all have access to side information correlated with the underlying source signal. Joint source-channel cooperative transmission is studied in which the relays...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Relay Channel With Orthogonal Components and Structured Interference Known at the Source

    A relay channel with orthogonal components that is affected by an interference signal that is non-causally available only at the source is studied. The interference signal has structure in that it is produced by another transmitter communicating with its own destination. Moreover, the interferer is not willing to adjust its...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2011

    Completion Time in Multi-Access Channel: An Information Theoretic Perspective

    In a multi-access channel, completion time refers to the number of channel uses required for users, each with some given fixed bit pool, to complete the transmission of all their data bits. In this paper, the characterization of the completion time region is based on the concept of constrained rates,...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2011

    On the Sum Capacity of K-User Cascade Gaussian Z-Interference Channel

    A K-user cascade Gaussian Z-interference channel is a subclass of the general K-user Gaussian interference channel, where each user, except the first one, experiences interference only from the previous user. Under simple Han-Kobayashi schemes assuming Gaussian inputs and no time sharing, it is shown that the maximum sum rate is...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2011

    Security Challenges During VLSI Test

    VLSI testing is a practical requirement, but unless proper care is taken, features that enhance testability can reduce system security. Data confidentiality and intellectual property protection can be breached through testing security breaches. In this paper, the authors review testing security problems, focusing on the scan technique. They then present...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2011

    Data Remanence Effects on Memory Based Entropy Collection for RFID Systems

    Random number generation is a fundamental security primitive. This relatively simple requirement is beyond the capacity of passive RFID (Radio Frequency IDentification) tags, however. A recent proposal, Fingerprint Extraction and Random Number Generation in SRAM (FERNS), uses onboard RAM as a randomness source. Unfortunately, practical considerations prevent this approach from...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2011

    Pragmatic Information Rates, Generalizations Of The Kelly Criterion, And Financial Market Efficiency

    This paper is part of an ongoing investigation of "Pragmatic information," defined in Weinberger (2002) as "The amount of information actually used in making a decision." Because a study of information rates led to the Noiseless and Noisy Coding Theorems, two of the most important results of Shannon's theory, the...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jan 2011

    NCOM: Network Coding Based Overlay Multicast in Wireless Networks

    The capacity of wireless networks are increasingly challenged by the traffic stresses generated by data-intensive applications. Multicast is a bandwidth-efficient solution to simultaneously disseminate data to multiple receivers. In this paper, the authors present NCOM, a network coding based overlay multicast design that integrates Network Coding (NC), Opportunistic Routing (OR),...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2010

    Keyboard Acoustic Emanations: An Evaluation of Strong Passwords and Typing Styles

    The sounds resulting from keyboard typing can reveal information about the input data. In this paper, the authors revisit such keyboard acoustic emanations for the purpose of eavesdropping over "Strong" (random) passwords. Prior work that capitalized on dictionary and HMM language models is not applicable in this scenario; rather the...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2010

    Estimating the Performance of Hypothetical Cloud Service Deployments: A Measurement-Based Approach

    To optimize network performance, cloud service providers have a number of options available to them, including co-locating production servers in well-connected Internet eXchange (IX) points, deploying data centers in additional locations, or contracting with external Content Distribution Networks (CDNs). Some of these options can be very costly, and some may...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    ViVUD: Virtual Server Cluster Based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems

    Despite the success to deliver increasingly large number of channels to millions of users, the current multichannel P2P video streaming systems still suffer several fundamental performance problems, such as large start-up delays and poor performance for unpopular channels. To alleviate the impact of channel churn and resource imbalance, the View-Upload...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    Tree-Based HB Protocols for Privacy-Preserving Authentication of RFID Tags

    An RFID reader must authenticate its designated tags in order to prevent tag forgery and counterfeiting. At the same time, due to privacy requirements of many applications, a tag should remain anonymous and untraceable to an adversary during the authentication process. In this paper, the authors propose an "HB-like" protocol...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol

    Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other security services. Luo, et al. proposed a set of protocols for providing Ubiquitous and Robust Access control (called URSA1) in mobile...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2010

    Still and Silent: Motion Detection for Enhanced RFID Security and Privacy Without Changing the Usage Model

    Personal RFID devices-found, e.g., in access cards and contactless credit cards-are vulnerable to unauthorized reading, owner tracking and different types of relay attacks. The authors observe that accessing a personal RFID device fundamentally requires moving it in some manner (e.g., swiping an RFID access card in front of a reader)....

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2010

    Peer-to-Peer Streaming of Layered Video: Efficiency, Fairness and Incentive

    Recent advance in Scalable Video Coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questions need to be answered: layer subscription: how many layers each peer should receive? layer scheduling: how to deliver to peers...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2010

    Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing

    The secure "Pairing" of wireless devices based on auxiliary or Out-Of-Band (OOB) communication, such as audio, visual, or tactile channels, is a well-established research direction. However, prior work shows that this approach to pairing can be prone to human errors of different forms that may directly or indirectly translate into...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2009

    Managing Cohort Movement of Mobile Sensors Via GPS-Free & Compass-Free Node Localization

    A critical problem in mobile ad-hoc wireless sensor networks is each node's awareness of its position relative to the network. This problem is known as localization. In this paper, the authors introduce a variant of this problem, directional localization, where each node must be aware of both its position and...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2009

    Incentivized Peer-Assisted Streaming for On-Demand Services

    As an efficient distribution mechanism, Peer-To-Peer (P2P) technology has become a tremendously attractive solution to offload servers in large-scale video streaming applications. However, in providing on-demand asynchronous streaming services, P2P streaming design faces two major challenges: how to schedule efficient video sharing between peers with asynchronous playback progresses? How to...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    Implementation of Cooperative Communications Using Software Defined Radios

    Cooperative communications leverages the spatial diversity available in a wireless network enabling multiple radio nodes work together to improve the overall system performance. When a destination receiver combines the signal from an originating source with the associated signals from relay nodes, significant improvements in the bit error rate performance can...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags

    Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS), involves the use of onboard RAM as the source of "True"...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes

    Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-to-point and/or broadcast) communication channels among the nodes of a wireless sensor network is a fundamental security task. To this end, a plethora of so-called key pre-distribution schemes...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2009

    Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting

    When users want to establish wireless communication between/among their devices, the channel has to be bootstrapped first. To prevent any malicious control of or eavesdropping over the communication, the channel is desired to be authenticated and confidential. The process of setting up a secure communication channel between two previously unassociated...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2009

    Delay Bounds of Peer-to-Peer Video Streaming

    Peer-To-Peer (P2P) systems exploit the uploading bandwidth of individual peers to distribute content at low server cost. While the P2P bandwidth sharing design is very efficient for bandwidth sensitive applications, it imposes a fundamental performance constraint for delay sensitive applications: the uploading bandwidth of a peer cannot be utilized to...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2009

    Scalable Video Multicast in Hybrid 3G/Ad-Hoc Networks

    Mobile video broadcasting service, or mobile TV, is expected to become a popular application for 3G wireless network operators. Most existing solutions for video BroadCast MultiCast Services (BCMCS) in 3G networks employ a single transmission rate to cover all viewers. The system-wide video quality of the cell is therefore throttled...

    Provided By Polytechnic Institute of New York University

  • White Papers // Apr 2009

    Interference Channel Aided by an Infrastructure Relay

    A Gaussian Interference Channel with an Infrastructure Relay (ICIR) is investigated. The relay has finite-capacity links to both sources and destinations that are orthogonal to each other and to the underlying interference channel. A general achievable rate region is presented by using the relay both to convey additional information from...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2009

    Layered Randomized Cooperative Multicast for Lossy Data: A Superposition Approach

    In this paper, the authors consider randomized distributed cooperation for multicasting a source signal with end-to-end distortion used as a performance metric. In order to provide differentiated quality to users with different channel strengths, they study layered cooperation where layers are transmitted simultaneously using superposition coding. They first formulate the...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2009

    Cooperative Coding Implementation at the Physical Layer

    Cooperative communications leverages the spatial diversity available in a wireless environment when multiple radio nodes work together to improve the overall system performance. When a destination receiver combines the signal from an originating source with the associated signals from relay nodes, significant improvements in the bit error rate performance can...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2008

    Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study

    With the fast penetration of broadband residential accesses, Video-over-IP applications are quickly becoming the new generation "Killer" applications on the Internet. Traditionally, videos are streamed from a server to clients through unicast connections. Due to the unpredictable packet losses, delays and delay jitters inside the "Best-effort" Internet, it is challenging...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2008

    View-Upload Decoupling: A Redesign of Multi-Channel P2P Video Systems

    In current multi-channel live P2P video systems, there are several fundamental performance problems including exceedingly-large channel switching delays, long playback lags, and poor performance for less popular channels. These performance problems primarily stem from two intrinsic characteristics of multi-channel P2P video systems: channel churn and channel-resource imbalance. In this paper,...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2008

    A Demonstration of Video Over a Cooperative PHY Layer Protocol

    Cooperative communication is a promising approach to improve the reliability of a received signal at the physical layer. Cooperating nodes create a virtual MIMO system that provides spatial diversity even though the nodes have a single antenna. Therefore, tremendous improvements in system capacity and delay can be achieved. An implementation...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2008

    A Demonstration of Video Over a Cooperative PHY Layer Protocol

    Cooperative communication is a promising approach to improve the reliability of a received signal at the physical layer. Cooperating nodes create a virtual MIMO system that provides spatial diversity even though the nodes have a single antenna. Therefore, tremendous improvements in system capacity and delay can be achieved. An implementation...

    Provided By Polytechnic Institute of New York University

  • White Papers // Oct 2013

    Titan: A Carrier-Based Approach for Detecting and Mitigating Mobile Malware

    The ubiquity of mobile devices and their evolution as computing platforms has made them lucrative targets for malware. Malware, such as spyware, Trojans, rootkits and botnets that have traditionally plagued PCs are now increasingly targeting mobile devices and are also referred to as mobile malware. Cybercriminal attacks have used mobile...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2010

    Keyboard Acoustic Emanations: An Evaluation of Strong Passwords and Typing Styles

    The sounds resulting from keyboard typing can reveal information about the input data. In this paper, the authors revisit such keyboard acoustic emanations for the purpose of eavesdropping over "Strong" (random) passwords. Prior work that capitalized on dictionary and HMM language models is not applicable in this scenario; rather the...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags

    Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS), involves the use of onboard RAM as the source of "True"...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2009

    Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting

    When users want to establish wireless communication between/among their devices, the channel has to be bootstrapped first. To prevent any malicious control of or eavesdropping over the communication, the channel is desired to be authenticated and confidential. The process of setting up a secure communication channel between two previously unassociated...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2010

    Estimating the Performance of Hypothetical Cloud Service Deployments: A Measurement-Based Approach

    To optimize network performance, cloud service providers have a number of options available to them, including co-locating production servers in well-connected Internet eXchange (IX) points, deploying data centers in additional locations, or contracting with external Content Distribution Networks (CDNs). Some of these options can be very costly, and some may...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2011

    Pragmatic Information Rates, Generalizations Of The Kelly Criterion, And Financial Market Efficiency

    This paper is part of an ongoing investigation of "Pragmatic information," defined in Weinberger (2002) as "The amount of information actually used in making a decision." Because a study of information rates led to the Noiseless and Noisy Coding Theorems, two of the most important results of Shannon's theory, the...

    Provided By Polytechnic Institute of New York University

  • White Papers // Apr 2009

    Interference Channel Aided by an Infrastructure Relay

    A Gaussian Interference Channel with an Infrastructure Relay (ICIR) is investigated. The relay has finite-capacity links to both sources and destinations that are orthogonal to each other and to the underlying interference channel. A general achievable rate region is presented by using the relay both to convey additional information from...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jan 2011

    NCOM: Network Coding Based Overlay Multicast in Wireless Networks

    The capacity of wireless networks are increasingly challenged by the traffic stresses generated by data-intensive applications. Multicast is a bandwidth-efficient solution to simultaneously disseminate data to multiple receivers. In this paper, the authors present NCOM, a network coding based overlay multicast design that integrates Network Coding (NC), Opportunistic Routing (OR),...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2009

    Layered Randomized Cooperative Multicast for Lossy Data: A Superposition Approach

    In this paper, the authors consider randomized distributed cooperation for multicasting a source signal with end-to-end distortion used as a performance metric. In order to provide differentiated quality to users with different channel strengths, they study layered cooperation where layers are transmitted simultaneously using superposition coding. They first formulate the...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2011

    Data Remanence Effects on Memory Based Entropy Collection for RFID Systems

    Random number generation is a fundamental security primitive. This relatively simple requirement is beyond the capacity of passive RFID (Radio Frequency IDentification) tags, however. A recent proposal, Fingerprint Extraction and Random Number Generation in SRAM (FERNS), uses onboard RAM as a randomness source. Unfortunately, practical considerations prevent this approach from...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    Tree-Based HB Protocols for Privacy-Preserving Authentication of RFID Tags

    An RFID reader must authenticate its designated tags in order to prevent tag forgery and counterfeiting. At the same time, due to privacy requirements of many applications, a tag should remain anonymous and untraceable to an adversary during the authentication process. In this paper, the authors propose an "HB-like" protocol...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol

    Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other security services. Luo, et al. proposed a set of protocols for providing Ubiquitous and Robust Access control (called URSA1) in mobile...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2010

    Still and Silent: Motion Detection for Enhanced RFID Security and Privacy Without Changing the Usage Model

    Personal RFID devices-found, e.g., in access cards and contactless credit cards-are vulnerable to unauthorized reading, owner tracking and different types of relay attacks. The authors observe that accessing a personal RFID device fundamentally requires moving it in some manner (e.g., swiping an RFID access card in front of a reader)....

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes

    Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-to-point and/or broadcast) communication channels among the nodes of a wireless sensor network is a fundamental security task. To this end, a plethora of so-called key pre-distribution schemes...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2011

    Security Challenges During VLSI Test

    VLSI testing is a practical requirement, but unless proper care is taken, features that enhance testability can reduce system security. Data confidentiality and intellectual property protection can be breached through testing security breaches. In this paper, the authors review testing security problems, focusing on the scan technique. They then present...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2012

    Towards a Representive Testbed: Harnessing Volunteers for Networks Research

    A steady rise in home systems has been seen over the past few years. As more systems are designed and deployed, an appropriate testbed is required to test these systems. Several systems exist, such as PlanetLab, that currently provide a networking testbed allowing researchers and developers to test and measure...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2010

    Security Through Entertainment: Experiences Using a Memory Game for Secure Device Pairing

    The secure "Pairing" of wireless devices based on auxiliary or Out-Of-Band (OOB) communication, such as audio, visual, or tactile channels, is a well-established research direction. However, prior work shows that this approach to pairing can be prone to human errors of different forms that may directly or indirectly translate into...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2009

    Managing Cohort Movement of Mobile Sensors Via GPS-Free & Compass-Free Node Localization

    A critical problem in mobile ad-hoc wireless sensor networks is each node's awareness of its position relative to the network. This problem is known as localization. In this paper, the authors introduce a variant of this problem, directional localization, where each node must be aware of both its position and...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2010

    Peer-to-Peer Streaming of Layered Video: Efficiency, Fairness and Incentive

    Recent advance in Scalable Video Coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questions need to be answered: layer subscription: how many layers each peer should receive? layer scheduling: how to deliver to peers...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2009

    Scalable Video Multicast in Hybrid 3G/Ad-Hoc Networks

    Mobile video broadcasting service, or mobile TV, is expected to become a popular application for 3G wireless network operators. Most existing solutions for video BroadCast MultiCast Services (BCMCS) in 3G networks employ a single transmission rate to cover all viewers. The system-wide video quality of the cell is therefore throttled...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2009

    Delay Bounds of Peer-to-Peer Video Streaming

    Peer-To-Peer (P2P) systems exploit the uploading bandwidth of individual peers to distribute content at low server cost. While the P2P bandwidth sharing design is very efficient for bandwidth sensitive applications, it imposes a fundamental performance constraint for delay sensitive applications: the uploading bandwidth of a peer cannot be utilized to...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2009

    Incentivized Peer-Assisted Streaming for On-Demand Services

    As an efficient distribution mechanism, Peer-To-Peer (P2P) technology has become a tremendously attractive solution to offload servers in large-scale video streaming applications. However, in providing on-demand asynchronous streaming services, P2P streaming design faces two major challenges: how to schedule efficient video sharing between peers with asynchronous playback progresses? How to...

    Provided By Polytechnic Institute of New York University

  • White Papers // Nov 2008

    Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study

    With the fast penetration of broadband residential accesses, Video-over-IP applications are quickly becoming the new generation "Killer" applications on the Internet. Traditionally, videos are streamed from a server to clients through unicast connections. Due to the unpredictable packet losses, delays and delay jitters inside the "Best-effort" Internet, it is challenging...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jul 2010

    ViVUD: Virtual Server Cluster Based View-Upload Decoupling for Multi-Channel P2P Video Streaming Systems

    Despite the success to deliver increasingly large number of channels to millions of users, the current multichannel P2P video streaming systems still suffer several fundamental performance problems, such as large start-up delays and poor performance for unpopular channels. To alleviate the impact of channel churn and resource imbalance, the View-Upload...

    Provided By Polytechnic Institute of New York University

  • White Papers // Aug 2008

    View-Upload Decoupling: A Redesign of Multi-Channel P2P Video Systems

    In current multi-channel live P2P video systems, there are several fundamental performance problems including exceedingly-large channel switching delays, long playback lags, and poor performance for less popular channels. These performance problems primarily stem from two intrinsic characteristics of multi-channel P2P video systems: channel churn and channel-resource imbalance. In this paper,...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2009

    Cooperative Coding Implementation at the Physical Layer

    Cooperative communications leverages the spatial diversity available in a wireless environment when multiple radio nodes work together to improve the overall system performance. When a destination receiver combines the signal from an originating source with the associated signals from relay nodes, significant improvements in the bit error rate performance can...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2009

    Implementation of Cooperative Communications Using Software Defined Radios

    Cooperative communications leverages the spatial diversity available in a wireless network enabling multiple radio nodes work together to improve the overall system performance. When a destination receiver combines the signal from an originating source with the associated signals from relay nodes, significant improvements in the bit error rate performance can...

    Provided By Polytechnic Institute of New York University

  • White Papers // Jun 2011

    On the Sum Capacity of K-User Cascade Gaussian Z-Interference Channel

    A K-user cascade Gaussian Z-interference channel is a subclass of the general K-user Gaussian interference channel, where each user, except the first one, experiences interference only from the previous user. Under simple Han-Kobayashi schemes assuming Gaussian inputs and no time sharing, it is shown that the maximum sum rate is...

    Provided By Polytechnic Institute of New York University

  • White Papers // Sep 2011

    Completion Time in Multi-Access Channel: An Information Theoretic Perspective

    In a multi-access channel, completion time refers to the number of channel uses required for users, each with some given fixed bit pool, to complete the transmission of all their data bits. In this paper, the characterization of the completion time region is based on the concept of constrained rates,...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Optimal Transmission Policies for Energy Harvesting Two-Hop Networks

    In this paper, a two-hop communication system with energy harvesting nodes is considered. Unlike battery powered wireless nodes, both the source and the relay are able to harvest energy from environment during communication, therefore, both data and energy causality over the two hops need to be considered. Assuming both nodes...

    Provided By Polytechnic Institute of New York University

  • White Papers // Mar 2012

    Two-Way Wireless Video Communication Using Randomized Cooperation, Network Coding and Packet Level FEC

    Two-way real-time video communication in wireless networks requires high bandwidth, low delay and error resiliency. This paper addresses these demands by proposing a system with the integration of Network Coding (NC), user cooperation using Randomized Distributed Space-Time Coding (R-DSTC) and packet level Forward Error Correction (FEC) under a one-way delay...

    Provided By Polytechnic Institute of New York University

  • White Papers // May 2012

    Energy-Efficient Sensing and Communication of Parallel Gaussian Sources

    Energy efficiency is a key requirement in the design of wireless sensor networks. While most theoretical studies only account for the energy requirements of communication, the sensing process, which includes measurements and compression, can also consume comparable energy. In this paper, the problem of sensing and communicating parallel sources is...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Relay Channel With Orthogonal Components and Structured Interference Known at the Source

    A relay channel with orthogonal components that is affected by an interference signal that is non-causally available only at the source is studied. The interference signal has structure in that it is produced by another transmitter communicating with its own destination. Moreover, the interferer is not willing to adjust its...

    Provided By Polytechnic Institute of New York University

  • White Papers // Feb 2012

    Joint Source-Channel Cooperative Transmission Over Relay-Broadcast Networks

    Reliable transmission of a discrete memoryless source over a multiple-relay relay-broadcast network is considered. Motivated by sensor network applications, it is assumed that the relays and the destinations all have access to side information correlated with the underlying source signal. Joint source-channel cooperative transmission is studied in which the relays...

    Provided By Polytechnic Institute of New York University