University of Science and Technology Houari Boumediene

Displaying 1-31 of 31 results

  • White Papers // Jan 2015

    Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks

    In many Cognitive Radio (CR) applications, there are multiple types of message queues. Existing queuing analysis works in underlay CR networks failed to discuss packets heterogeneity. Therefore high priority packets with impatient waiting time that have preemptive transmission opportunities over low class are investigated. The authors model the system behavior...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Oct 2013

    The Implications from Benchmarking Three Big Data Systems

    Along with today's data explosion and application diversification, a variety of hardware platforms for big data are emerging, attracting interests from both industry and academia. The existing hardware platforms represent a wide range of implementation approaches, and different hardware platforms have different strengths. In this paper, the authors conduct comprehensive...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Apr 2013

    Competition Between Wireless Service Providers: Pricing, Equilibrium and Efficiency

    As the communication network is in transition towards a commercial one controlled by Service Providers (SP), the present paper considers a pricing game in a communication market covered by several Wireless Access Points sharing the same spectrum and analyzes two business models: monopoly (APs controlled by one SP) and oligopoly...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Apr 2013

    Phase-Priority Based Directory Coherence for Multicore Processor

    As the number of cores in a single chip increases, a typical implementation of coherence protocol adds significant hardware and complexity overhead. Besides, the performance of CMP system depends on the data access latency, which is highly affected by coherence protocol and on-chip interconnect. In this paper, the authors propose...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    Cloud Computing Research Challenges

    In recent times cloud computing has appeared as a new model for hosting and conveying services over the Internet. This model is striking to business vendors as it eradicates the requirement for users to plan in advance, and it permits the organization to start from low level and then add...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    TCLOUD: Challenges and Best Practices for Cloud Computing

    Cloud computing has achieved an unbelievable adoption response rate but still its infancy stage is not over. It is an emerging paradigm and amazingly gaining popularity. The size of the market shared of the applications provided by cloud computing is still not much behind the expectations. It provides the organizations...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    Two Simple Attacks on a Blind Signature Scheme

    A blind signature scheme allows a user to obtain a signature on a given message without revealing any information about the message to the signer. The idea of blind sig-nature was first introduced by Chaum at CRYPTO 1982. Blind signatures can be used in many applications, such as e-voting. Recently,...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2012

    Dynamic RMSA in Elastic Optical Networks With an Adaptive Genetic Algorithm

    The authors develop an adaptive and efficient Genetic Algorithm (GA) to solve the dynamic Routing, Modulation and Spectrum Assignments (RMSA) for elastic O-OFDM networks. The algorithm offers an efficient way of serving the dynamic light-path requests based on the current network status at each service provision time. The GA is...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2012

    A Resource Allocation Algorithm for SVC Multicast Over Wireless Relay Networks Based on Cascaded Coverage Problem

    The resource allocation problem to support scalable-video multicast for wireless relay networks is complex due to the existence of the relay station. In this paper, the authors consider the resource allocation for SVC multicast over two-hop wireless relay networks to maximize the total system utility of all users where the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Sep 2012

    Spatial Outlier Detection for Mobility Profile Mining

    With the rigorous growth of cellular network many mobility datasets are available publically, which attracted researchers to study human mobility fall under spatio-temporal phenomenon. Mobility profile mining is main task in spatio-temporal trend analysis which can be extracted from the location information available in the dataset. The location information is...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2012

    A Proxy Signature-Based Re-Authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks

    In Wireless Mesh Networks (WMNs), re-authentication guarantees the secure association between a roaming Mesh Host (MH) and a target Mesh Access Point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the Quality of Service...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Capacity Offload Game Over Unlicensed Spectrum

    With the blasting increase of wireless data traffic, incumbent Wireless Service Providers (WSPs) face critical challenges in provisioning spectrum resource. Given the permission of unlicensed access to TV white spaces, WSPs can alleviate their burden by exploiting the concept of "capacity offload" to transfer part of their traffic load to...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Adaptive Scalable Layer Selection for Video Streaming Over Wireless Networks

    In this paper, the authors propose an adaptive scalable layer selection policy for video streaming over wireless networks by jointly considering the wireless channel conditions and scalable video coding. Their goal is to design a scheme which could provide both long-term smooth and high play-back quality for each user, while...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Receiver Rate Adaptation for MIMO System

    This paper presents a novel design of Linear Random Space Time Coding (LRSTC) scheme. This scheme is able to achieve the dual benefits for MIMO receiver rate adaptation: rateless coding and modulation and approximately universal tradeoff between diversity gain and multiplexing gain. In this scheme, an LRSTC symbol is the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Downlink Analysis of Multi-Channel Hybrid Access Two-Tier Networks

    For two-tier networks consisting of macrocells and femtocells, the channel access mechanism can be configured to be open access, closed access, or hybrid access. Hybrid access arises as a compromise between open and closed access mechanisms, in which a fraction of available spectrum resource is shared to nonsubscribers while the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Genetic Algorithms for Designing Energy-Efficient Optical Transport Networks With Mixed Regenerator Placement

    The authors design Genetic Algorithms (GA) to solve the Mixed Regenerator Placement (MRP) problem of light-paths with different lengths in optical transport networks, and investigate their performance with numerical simulations. By incorporating a theoretical model that can estimate BER changes hop-by-hop along light-paths, the GA encodes the placements of 1R/2R/3R...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Transmit Beamforming for MIMO Multicast Channels

    In this paper, the authors study the optimum Transmit (Tx) beamforming for a MIMO multicast channel where the multi-antenna base station (BS) sends common messages to K multi-antenna users, which is motivated by the modern cellular network where the support of multimedia multicast service is required. This research problem has...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Design Green Hybrid Fiber-Coaxial Networks: A Traffic-Aware and Cooperative Approach

    The authors propose a traffic-aware and cooperative approach to achieve energy-saving in Hybrid Fiber-Coaxial (HFC) networks that support DOCSIS 3.0 standard. The approach incorporates a two-step operation that consists of two algorithms, one for the Cable Modem (CM) side and the other for the Cable Modem Termination System (CMTS) side....

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Security of a Biometric Identity-Based Encryption Scheme

    Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w' can be decrypted using a secret key corresponding to the identity w which is close to w as measured by some metric. Recently, Yang et al. proposed a constant-size...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    On the Security of an Enhanced Short Signature Scheme

    Currently, short signature is receiving significant attention since it is particularly useful in low-bandwidth communication environments. However, most of the short signature schemes are only based on one intractable assumption. Recently, Su presented an identity-based short signature scheme based on knapsack and bilinear pairing. He claimed that the signature scheme...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Optimal Relay Power Allocation for Amplify-and-Forward OFDM Relay Networks With Deliberate Clipping

    Deliberate clipping is a simple solution to high peak-to-average power ratio problem of OFDM signal. In amplify-and-forward OFDM relay networks, due to the limited resource, deliberate clipping is also suggested. However, clipping is a nonlinear process and may cause significant performance degradation. Based on Bussgang Linearization Theory, the authors provide...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Small World P2P Overlay for Video Sharing Service

    Measurement studies of YouTube show that there are some distinctive properties regarding to video sharing service, e.g., small clip size, suggestion links between related clips. This observation motivates them to explore the possibility to use peer-assisted approach to offload content providers. Specifically, the authors want to leverage the suggestion links...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Price-Based Uplink Resource Allocation for Hybrid-Spectrum Femtocell Networks

    Femtocell networks embedded in the macrocell greatly benefit capacity gain from high SINR and dedicated BS to home subscribers. However, the lack of schemes to effectively control the interference and fully utilize radio resources creates challenges to practically facilitate the additive unlicensed spectrum in femtocells. To tackle these challenges, this...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jan 2012

    Breaking a Proxy Signature Scheme From Lattices

    A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer. Proxy signature schemes have found numerous practical applications such as grid computing, mobile agent systems and cloud applications. Recently, Jiang et al. proposed the first lattice-based proxy signature scheme and claimed that their...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2011

    A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in harsh environments. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2011

    Analysis of Admission Control in P2P-Based Media Delivery Network Based on POMDP

    In this paper, the authors study admission control problems of P2P-based Media De-livery Network (P2P-based MDN). They propose a specific Partially Observable Markov Decision Process (POMDP) model for P2P-based MDN. Based on this model, the observation-based randomized policy for admission control is provided, which optimizes system's performance by applying policy-gradient...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2011

    Optimal Delay Control for Layered Media Multicast Using Network Coding

    In this paper, the authors show that the integration of layered media multicast with network coding can significantly improve the throughput of media distribution over the networks where there are a large number of receivers with heterogeneous reception capacities. However, because of stringent bandwidth and delay requirements arising in the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Dec 2010

    Modified Fuzzy ARTMAP and Supervised Fuzzy ART: Comparative Study With Multispectral Classification

    In this paper a modification of the algorithm of the fuzzy ART network, aiming at returning it supervised is carried out. It consists of the search for the comparison, training and vigilance parameters giving the minimum quadratic distances between the output of the training base and those obtained by the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Aug 2010

    Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams

    Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges to be addressed, and security is clearly one of the most important challenges. In this paper, the authors will address the design of secure linear...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Dec 2009

    Improved Packet Loss Recovery Using Interleaving for CELP-Type Speech Coders in Packet Networks

    In VoIP applications, packet loss is a major source of speech impairment. In this paper, a packet loss concealment scheme based interleaving is presented to improve speech quality deterioration caused by packet losses for Code-Excited Linear Prediction (CELP) based coders. The authors applied the proposed scheme to the ITU-T G729...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2009

    A High Speed Network Intrusion Detection System Based on FPGA Circuits

    This paper describes the implementation of a high speed hardware network intrusion detection system. The system is powerful as well as flexible due to the use of hardware configurable circuits such as FPGA (Field Programmable Gate Array). The developed circuit architecture uses a pipeline technique based on communicating finite state...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jan 2012

    Breaking a Proxy Signature Scheme From Lattices

    A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer. Proxy signature schemes have found numerous practical applications such as grid computing, mobile agent systems and cloud applications. Recently, Jiang et al. proposed the first lattice-based proxy signature scheme and claimed that their...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2011

    A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are often deployed in harsh environments. Thus adversaries can capture some nodes, replicate them and deploy those replicas back into the strategic positions in the network to launch a variety of attacks. These are referred to as node replication attacks. Some methods of defending against node...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    Two Simple Attacks on a Blind Signature Scheme

    A blind signature scheme allows a user to obtain a signature on a given message without revealing any information about the message to the signer. The idea of blind sig-nature was first introduced by Chaum at CRYPTO 1982. Blind signatures can be used in many applications, such as e-voting. Recently,...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Oct 2013

    The Implications from Benchmarking Three Big Data Systems

    Along with today's data explosion and application diversification, a variety of hardware platforms for big data are emerging, attracting interests from both industry and academia. The existing hardware platforms represent a wide range of implementation approaches, and different hardware platforms have different strengths. In this paper, the authors conduct comprehensive...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Apr 2013

    Phase-Priority Based Directory Coherence for Multicore Processor

    As the number of cores in a single chip increases, a typical implementation of coherence protocol adds significant hardware and complexity overhead. Besides, the performance of CMP system depends on the data access latency, which is highly affected by coherence protocol and on-chip interconnect. In this paper, the authors propose...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jan 2015

    Queueing Analysis for Preemptive Transmission in Underlay Cognitive Radio Networks

    In many Cognitive Radio (CR) applications, there are multiple types of message queues. Existing queuing analysis works in underlay CR networks failed to discuss packets heterogeneity. Therefore high priority packets with impatient waiting time that have preemptive transmission opportunities over low class are investigated. The authors model the system behavior...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2012

    Dynamic RMSA in Elastic Optical Networks With an Adaptive Genetic Algorithm

    The authors develop an adaptive and efficient Genetic Algorithm (GA) to solve the dynamic Routing, Modulation and Spectrum Assignments (RMSA) for elastic O-OFDM networks. The algorithm offers an efficient way of serving the dynamic light-path requests based on the current network status at each service provision time. The GA is...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    Cloud Computing Research Challenges

    In recent times cloud computing has appeared as a new model for hosting and conveying services over the Internet. This model is striking to business vendors as it eradicates the requirement for users to plan in advance, and it permits the organization to start from low level and then add...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2013

    TCLOUD: Challenges and Best Practices for Cloud Computing

    Cloud computing has achieved an unbelievable adoption response rate but still its infancy stage is not over. It is an emerging paradigm and amazingly gaining popularity. The size of the market shared of the applications provided by cloud computing is still not much behind the expectations. It provides the organizations...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Apr 2013

    Competition Between Wireless Service Providers: Pricing, Equilibrium and Efficiency

    As the communication network is in transition towards a commercial one controlled by Service Providers (SP), the present paper considers a pricing game in a communication market covered by several Wireless Access Points sharing the same spectrum and analyzes two business models: monopoly (APs controlled by one SP) and oligopoly...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Sep 2012

    Spatial Outlier Detection for Mobility Profile Mining

    With the rigorous growth of cellular network many mobility datasets are available publically, which attracted researchers to study human mobility fall under spatio-temporal phenomenon. Mobility profile mining is main task in spatio-temporal trend analysis which can be extracted from the location information available in the dataset. The location information is...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Aug 2010

    Optimal Linear Network Coding Design for Secure Unicast with Multiple Streams

    Linear network coding is a promising technology that can maximize the throughput capacity of communication network. Despite this salient feature, there are still many challenges to be addressed, and security is clearly one of the most important challenges. In this paper, the authors will address the design of secure linear...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2011

    Optimal Delay Control for Layered Media Multicast Using Network Coding

    In this paper, the authors show that the integration of layered media multicast with network coding can significantly improve the throughput of media distribution over the networks where there are a large number of receivers with heterogeneous reception capacities. However, because of stringent bandwidth and delay requirements arising in the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Dec 2010

    Modified Fuzzy ARTMAP and Supervised Fuzzy ART: Comparative Study With Multispectral Classification

    In this paper a modification of the algorithm of the fuzzy ART network, aiming at returning it supervised is carried out. It consists of the search for the comparison, training and vigilance parameters giving the minimum quadratic distances between the output of the training base and those obtained by the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2009

    A High Speed Network Intrusion Detection System Based on FPGA Circuits

    This paper describes the implementation of a high speed hardware network intrusion detection system. The system is powerful as well as flexible due to the use of hardware configurable circuits such as FPGA (Field Programmable Gate Array). The developed circuit architecture uses a pipeline technique based on communicating finite state...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Dec 2009

    Improved Packet Loss Recovery Using Interleaving for CELP-Type Speech Coders in Packet Networks

    In VoIP applications, packet loss is a major source of speech impairment. In this paper, a packet loss concealment scheme based interleaving is presented to improve speech quality deterioration caused by packet losses for Code-Excited Linear Prediction (CELP) based coders. The authors applied the proposed scheme to the ITU-T G729...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Capacity Offload Game Over Unlicensed Spectrum

    With the blasting increase of wireless data traffic, incumbent Wireless Service Providers (WSPs) face critical challenges in provisioning spectrum resource. Given the permission of unlicensed access to TV white spaces, WSPs can alleviate their burden by exploiting the concept of "capacity offload" to transfer part of their traffic load to...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Adaptive Scalable Layer Selection for Video Streaming Over Wireless Networks

    In this paper, the authors propose an adaptive scalable layer selection policy for video streaming over wireless networks by jointly considering the wireless channel conditions and scalable video coding. Their goal is to design a scheme which could provide both long-term smooth and high play-back quality for each user, while...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Receiver Rate Adaptation for MIMO System

    This paper presents a novel design of Linear Random Space Time Coding (LRSTC) scheme. This scheme is able to achieve the dual benefits for MIMO receiver rate adaptation: rateless coding and modulation and approximately universal tradeoff between diversity gain and multiplexing gain. In this scheme, an LRSTC symbol is the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Downlink Analysis of Multi-Channel Hybrid Access Two-Tier Networks

    For two-tier networks consisting of macrocells and femtocells, the channel access mechanism can be configured to be open access, closed access, or hybrid access. Hybrid access arises as a compromise between open and closed access mechanisms, in which a fraction of available spectrum resource is shared to nonsubscribers while the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Genetic Algorithms for Designing Energy-Efficient Optical Transport Networks With Mixed Regenerator Placement

    The authors design Genetic Algorithms (GA) to solve the Mixed Regenerator Placement (MRP) problem of light-paths with different lengths in optical transport networks, and investigate their performance with numerical simulations. By incorporating a theoretical model that can estimate BER changes hop-by-hop along light-paths, the GA encodes the placements of 1R/2R/3R...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Transmit Beamforming for MIMO Multicast Channels

    In this paper, the authors study the optimum Transmit (Tx) beamforming for a MIMO multicast channel where the multi-antenna base station (BS) sends common messages to K multi-antenna users, which is motivated by the modern cellular network where the support of multimedia multicast service is required. This research problem has...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // May 2012

    Design Green Hybrid Fiber-Coaxial Networks: A Traffic-Aware and Cooperative Approach

    The authors propose a traffic-aware and cooperative approach to achieve energy-saving in Hybrid Fiber-Coaxial (HFC) networks that support DOCSIS 3.0 standard. The approach incorporates a two-step operation that consists of two algorithms, one for the Cable Modem (CM) side and the other for the Cable Modem Termination System (CMTS) side....

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Optimal Relay Power Allocation for Amplify-and-Forward OFDM Relay Networks With Deliberate Clipping

    Deliberate clipping is a simple solution to high peak-to-average power ratio problem of OFDM signal. In amplify-and-forward OFDM relay networks, due to the limited resource, deliberate clipping is also suggested. However, clipping is a nonlinear process and may cause significant performance degradation. Based on Bussgang Linearization Theory, the authors provide...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Small World P2P Overlay for Video Sharing Service

    Measurement studies of YouTube show that there are some distinctive properties regarding to video sharing service, e.g., small clip size, suggestion links between related clips. This observation motivates them to explore the possibility to use peer-assisted approach to offload content providers. Specifically, the authors want to leverage the suggestion links...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Price-Based Uplink Resource Allocation for Hybrid-Spectrum Femtocell Networks

    Femtocell networks embedded in the macrocell greatly benefit capacity gain from high SINR and dedicated BS to home subscribers. However, the lack of schemes to effectively control the interference and fully utilize radio resources creates challenges to practically facilitate the additive unlicensed spectrum in femtocells. To tackle these challenges, this...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    On the Security of an Enhanced Short Signature Scheme

    Currently, short signature is receiving significant attention since it is particularly useful in low-bandwidth communication environments. However, most of the short signature schemes are only based on one intractable assumption. Recently, Su presented an identity-based short signature scheme based on knapsack and bilinear pairing. He claimed that the signature scheme...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Mar 2012

    Security of a Biometric Identity-Based Encryption Scheme

    Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w' can be decrypted using a secret key corresponding to the identity w which is close to w as measured by some metric. Recently, Yang et al. proposed a constant-size...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2012

    A Proxy Signature-Based Re-Authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks

    In Wireless Mesh Networks (WMNs), re-authentication guarantees the secure association between a roaming Mesh Host (MH) and a target Mesh Access Point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the Quality of Service...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Nov 2012

    A Resource Allocation Algorithm for SVC Multicast Over Wireless Relay Networks Based on Cascaded Coverage Problem

    The resource allocation problem to support scalable-video multicast for wireless relay networks is complex due to the existence of the relay station. In this paper, the authors consider the resource allocation for SVC multicast over two-hop wireless relay networks to maximize the total system utility of all users where the...

    Provided By University of Science and Technology Houari Boumediene

  • White Papers // Jul 2011

    Analysis of Admission Control in P2P-Based Media Delivery Network Based on POMDP

    In this paper, the authors study admission control problems of P2P-based Media De-livery Network (P2P-based MDN). They propose a specific Partially Observable Markov Decision Process (POMDP) model for P2P-based MDN. Based on this model, the observation-based randomized policy for admission control is provided, which optimizes system's performance by applying policy-gradient...

    Provided By University of Science and Technology Houari Boumediene