University of Science and Technology of China

Displaying 1-20 of 20 results

  • White Papers // Apr 2012

    Stochastic Analysis of Mean Interference for RTS/CTS Mechanism

    The RTS/CTS handshake mechanism in WLAN is studied using stochastic geometry. The effect of RTS/CTS is treated as a thinning procedure for a spatially distributed point process that models the potential transceivers in a WLAN, and the resulting concurrent transmission processes are described. Exact formulas for the intensity of the...

    Provided By University of Science and Technology of China

  • White Papers // Feb 2012

    Service Composition in Service-Oriented Wireless Sensor Networks With Persistent Queries

    Service-oriented Wireless Sensor Network (WSN) has been recently proposed as an architecture to rapidly develop applications in WSNs. In WSNs, a query task may require a set of services and may be carried out repetitively with a given frequency during its lifetime. A service composition solution shall be provided for...

    Provided By University of Science and Technology of China

  • White Papers // Dec 2011

    A Novel Method for Petri Net Modeling

    Message Sequence Chart (MSC) is a graphical trace language for describing the communication behaviour of distributed systems. In order to build a Petri Net model of a complex system, this paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of translating the MSC model...

    Provided By University of Science and Technology of China

  • White Papers // Dec 2011

    Joint Rate Selection and Wireless Network Coding for Time Critical Applications

    In this paper, the authors dynamically select the transmission rate and design wireless network coding to improve the quality of services such as delay for time critical applications. With low transmission rate, and hence longer transmission range, more packets may be encoded together, which increases the coding opportunity. However, low...

    Provided By University of Science and Technology of China

  • White Papers // Nov 2011

    QoS and Terminal Power-Aware Resource Allocation for Real-Time Traffic in e-MBMS System

    This paper studies the issue of resource allocation of real-time traffic based on Quality of Service (QoS) and terminal power consumption in enhanced Multimedia Broadcast/Multicast Service (e-MBMS) system, and a two-layer QoS and terminal power-aware resource allocation scheme is also proposed. Aiming to minimize the number of received sub-frames for...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Can Cloud Computing Be Used for Planning? An Initial Study

    Cloud computing is emerging as a prominent computing model. It provides a low-cost, highly accessible alternative to other traditional high-performance computing platforms. It also has many other benefits such as high availability, scalability, elasticity, and free of maintenance. Given these attractive features, it is very desirable if automated planning can...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Improving Energy Efficiency Through Multimode Transmission in the Downlink MIMO Systems

    Adaptively adjusting system parameters including bandwidth, transmit power and mode to maximize the "Bits Per-Joule" Energy Efficiency (BPJ-EE) in the downlink MIMO systems with imperfect Channel State Information at the Transmitter (CSIT) is considered in this paper. By mode the authors refer to choice of transmission schemes i.e. Singular Value...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Improving Network Energy Efficiency Through Cooperative Idling in the Multi-Cell Systems

    Network Energy Efficiency (NEE) is considered as the metric to address the energy efficiency problem in the cooperative multi-cell systems in this paper. At first, three typical schemes with different levels of cooperation, i.e., interference aware game theory, inter-cell interference cancellation, and multicell joint processing, are discussed. For both unconstrained...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks

    Generally vehicles in VANETs should periodically broad-cast safety messages. Since, safety messages contain traffic related information and are sensitive to location privacy, it is essential to ensure anonymity, authenticity and traceability in broadcast. These conflicting requirements make it difficult to design a secure communication scheme for VANETs. In this paper,...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2010

    Minimum-Energy Multicasting in Asynchronous Duty-Cycled Wireless Ad Hoc Networks

    In Asynchronous Duty-Cycled Wireless Ad Hoc NETworks(ADC-WANETs), the nodes switch between active and dormant states, and each node can determine its active/dormant schedule independently. This complicates the Minimum-Energy Multicasting (MEM) problem, which was primarily studied in always-active WANETs. In this paper, the authors study the MEM problem in ADC-WANETs both...

    Provided By University of Science and Technology of China

  • White Papers // Aug 2010

    Wireless Data Multicasting With Switched Beamforming Antennas

    Using beamforming antennas to improve wireless multicast transmissions has received considerable attention recently. The paper proposes to partition all single-lobe beams into groups and to form composite multi-lobe beam patterns to transmit multicast traffic. Depending on how the power is split among the individual beams constituting a composite beam pattern,...

    Provided By University of Science and Technology of China

  • White Papers // Aug 2010

    CT-Rank: A Time-Aware Ranking Algorithm for Web Search

    Time plays important roles in Web search, because most Web pages contain time information and a lot of Web queries are time-related. However, traditional search engines such as Google have little consideration on the time information in Web pages. In particular, they do not take into account the time information...

    Provided By University of Science and Technology of China

  • White Papers // Jul 2010

    Towards Wireless Security Without Computational Assumptions

    Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic...

    Provided By University of Science and Technology of China

  • White Papers // Apr 2010

    Data Dissemination in Wireless Sensor Networks With Network Coding

    In Wireless Sensor Networks (WSNs), it is often necessary to update the software running on sensors, which requires reliable dissemination of large data objects to each sensor with energy efficiency. During data dissemination, due to sleep scheduling designed for energy efficiency, some sensors may not receive some packets at some...

    Provided By University of Science and Technology of China

  • White Papers // Oct 2009

    Enhancing Network Transmission Capacity by Efficiently Allocating Node Capability

    A network's transmission capacity is the maximal rate of traffic inflow that the network can handle without causing congestion. Here the authors study how to enhance this quantity by redistributing the capability of individual nodes while preserving the total sum of node capability. They propose a practical and effective node-capability...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2009

    Energy-Efficient Decentralized Event Detection in Large-Scale Wireless Sensor Networks

    This paper addresses the problem of decentralized event detection in large-scale Wireless Sensor Networks (WSNs). Comparing with centralized or hierarchical solutions, decentralized algorithms are superior in scalability and robustness. However, traditional decentralized optimization tools, such as consensus optimization, requires intensive information exchange of high-dimensional decision vectors and multipliers. This paper...

    Provided By University of Science and Technology of China

  • White Papers // Jul 2009

    Global Clock, Physical Time Order and Pending Period Analysis in Multiprocessor Systems

    In multiprocessor systems, various problems were treated with Lamport's logical clock and the resultant logical time orders between operations. However, one often needs to face the high complexities caused by the lack of logical time order information in practice. In this paper, the so-called physical time order is proposed based...

    Provided By University of Science and Technology of China

  • White Papers // Jun 2009

    Effective Software-Based Solution for Processing Mass Downstream Data in Interactive Push VOD System

    Interactive push VOD system is a new kind of system that incorporates push technology and interactive technique. It can push movies to users at high speeds at off-peak hours for optimal network usage so as to save bandwidth. This paper presents effective software-based solution for processing mass downstream data at...

    Provided By University of Science and Technology of China

  • White Papers // Apr 2009

    Early Abandon to Accelerate Exact Dynamic Time Warping

    Dynamic time warping is one of the important distance measures in similarity search of time series; however, the exact calculation of dynamic time warping has become a bottleneck. The authors propose an approach, named early abandon dynamic time warping, to accelerate the calculation. The method checks if values of the...

    Provided By University of Science and Technology of China

  • White Papers // Mar 2009

    Trust Management in the P2P Grid

    Peer-To-Peer (P2P) Grid Computing has gained its popularity in many large scale distributed applications. Within such an environment, trust management is a complex and difficult task since the Grid harnesses a large variety of geographically distributed resources in Virtual Organizations (VOs) across multiple domains. This paper proposes a reputation framework...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2010

    Minimum-Energy Multicasting in Asynchronous Duty-Cycled Wireless Ad Hoc Networks

    In Asynchronous Duty-Cycled Wireless Ad Hoc NETworks(ADC-WANETs), the nodes switch between active and dormant states, and each node can determine its active/dormant schedule independently. This complicates the Minimum-Energy Multicasting (MEM) problem, which was primarily studied in always-active WANETs. In this paper, the authors study the MEM problem in ADC-WANETs both...

    Provided By University of Science and Technology of China

  • White Papers // Jul 2009

    Global Clock, Physical Time Order and Pending Period Analysis in Multiprocessor Systems

    In multiprocessor systems, various problems were treated with Lamport's logical clock and the resultant logical time orders between operations. However, one often needs to face the high complexities caused by the lack of logical time order information in practice. In this paper, the so-called physical time order is proposed based...

    Provided By University of Science and Technology of China

  • White Papers // Apr 2009

    Early Abandon to Accelerate Exact Dynamic Time Warping

    Dynamic time warping is one of the important distance measures in similarity search of time series; however, the exact calculation of dynamic time warping has become a bottleneck. The authors propose an approach, named early abandon dynamic time warping, to accelerate the calculation. The method checks if values of the...

    Provided By University of Science and Technology of China

  • White Papers // Jun 2009

    Effective Software-Based Solution for Processing Mass Downstream Data in Interactive Push VOD System

    Interactive push VOD system is a new kind of system that incorporates push technology and interactive technique. It can push movies to users at high speeds at off-peak hours for optimal network usage so as to save bandwidth. This paper presents effective software-based solution for processing mass downstream data at...

    Provided By University of Science and Technology of China

  • White Papers // Oct 2009

    Enhancing Network Transmission Capacity by Efficiently Allocating Node Capability

    A network's transmission capacity is the maximal rate of traffic inflow that the network can handle without causing congestion. Here the authors study how to enhance this quantity by redistributing the capability of individual nodes while preserving the total sum of node capability. They propose a practical and effective node-capability...

    Provided By University of Science and Technology of China

  • White Papers // Jul 2010

    Towards Wireless Security Without Computational Assumptions

    Wireless security has been an active research area since the last decade. A lot of studies of wireless security use cryptographic tools, but traditional cryptographic tools are normally based on computational assumptions, which may turn out to be invalid in the future. Consequently, it is very desirable to build cryptographic...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Can Cloud Computing Be Used for Planning? An Initial Study

    Cloud computing is emerging as a prominent computing model. It provides a low-cost, highly accessible alternative to other traditional high-performance computing platforms. It also has many other benefits such as high availability, scalability, elasticity, and free of maintenance. Given these attractive features, it is very desirable if automated planning can...

    Provided By University of Science and Technology of China

  • White Papers // Apr 2010

    Data Dissemination in Wireless Sensor Networks With Network Coding

    In Wireless Sensor Networks (WSNs), it is often necessary to update the software running on sensors, which requires reliable dissemination of large data objects to each sensor with energy efficiency. During data dissemination, due to sleep scheduling designed for energy efficiency, some sensors may not receive some packets at some...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Improving Energy Efficiency Through Multimode Transmission in the Downlink MIMO Systems

    Adaptively adjusting system parameters including bandwidth, transmit power and mode to maximize the "Bits Per-Joule" Energy Efficiency (BPJ-EE) in the downlink MIMO systems with imperfect Channel State Information at the Transmitter (CSIT) is considered in this paper. By mode the authors refer to choice of transmission schemes i.e. Singular Value...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    Improving Network Energy Efficiency Through Cooperative Idling in the Multi-Cell Systems

    Network Energy Efficiency (NEE) is considered as the metric to address the energy efficiency problem in the cooperative multi-cell systems in this paper. At first, three typical schemes with different levels of cooperation, i.e., interference aware game theory, inter-cell interference cancellation, and multicell joint processing, are discussed. For both unconstrained...

    Provided By University of Science and Technology of China

  • White Papers // Aug 2010

    Wireless Data Multicasting With Switched Beamforming Antennas

    Using beamforming antennas to improve wireless multicast transmissions has received considerable attention recently. The paper proposes to partition all single-lobe beams into groups and to form composite multi-lobe beam patterns to transmit multicast traffic. Depending on how the power is split among the individual beams constituting a composite beam pattern,...

    Provided By University of Science and Technology of China

  • White Papers // Dec 2011

    A Novel Method for Petri Net Modeling

    Message Sequence Chart (MSC) is a graphical trace language for describing the communication behaviour of distributed systems. In order to build a Petri Net model of a complex system, this paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of translating the MSC model...

    Provided By University of Science and Technology of China

  • White Papers // Nov 2011

    QoS and Terminal Power-Aware Resource Allocation for Real-Time Traffic in e-MBMS System

    This paper studies the issue of resource allocation of real-time traffic based on Quality of Service (QoS) and terminal power consumption in enhanced Multimedia Broadcast/Multicast Service (e-MBMS) system, and a two-layer QoS and terminal power-aware resource allocation scheme is also proposed. Aiming to minimize the number of received sub-frames for...

    Provided By University of Science and Technology of China

  • White Papers // Mar 2009

    Trust Management in the P2P Grid

    Peer-To-Peer (P2P) Grid Computing has gained its popularity in many large scale distributed applications. Within such an environment, trust management is a complex and difficult task since the Grid harnesses a large variety of geographically distributed resources in Virtual Organizations (VOs) across multiple domains. This paper proposes a reputation framework...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2011

    ATCS: A Novel Anonymous and Traceable Communication Scheme for Vehicular Ad Hoc Networks

    Generally vehicles in VANETs should periodically broad-cast safety messages. Since, safety messages contain traffic related information and are sensitive to location privacy, it is essential to ensure anonymity, authenticity and traceability in broadcast. These conflicting requirements make it difficult to design a secure communication scheme for VANETs. In this paper,...

    Provided By University of Science and Technology of China

  • White Papers // Feb 2012

    Service Composition in Service-Oriented Wireless Sensor Networks With Persistent Queries

    Service-oriented Wireless Sensor Network (WSN) has been recently proposed as an architecture to rapidly develop applications in WSNs. In WSNs, a query task may require a set of services and may be carried out repetitively with a given frequency during its lifetime. A service composition solution shall be provided for...

    Provided By University of Science and Technology of China

  • White Papers // Dec 2011

    Joint Rate Selection and Wireless Network Coding for Time Critical Applications

    In this paper, the authors dynamically select the transmission rate and design wireless network coding to improve the quality of services such as delay for time critical applications. With low transmission rate, and hence longer transmission range, more packets may be encoded together, which increases the coding opportunity. However, low...

    Provided By University of Science and Technology of China

  • White Papers // Sep 2009

    Energy-Efficient Decentralized Event Detection in Large-Scale Wireless Sensor Networks

    This paper addresses the problem of decentralized event detection in large-scale Wireless Sensor Networks (WSNs). Comparing with centralized or hierarchical solutions, decentralized algorithms are superior in scalability and robustness. However, traditional decentralized optimization tools, such as consensus optimization, requires intensive information exchange of high-dimensional decision vectors and multipliers. This paper...

    Provided By University of Science and Technology of China

  • White Papers // Aug 2010

    CT-Rank: A Time-Aware Ranking Algorithm for Web Search

    Time plays important roles in Web search, because most Web pages contain time information and a lot of Web queries are time-related. However, traditional search engines such as Google have little consideration on the time information in Web pages. In particular, they do not take into account the time information...

    Provided By University of Science and Technology of China

  • White Papers // Apr 2012

    Stochastic Analysis of Mean Interference for RTS/CTS Mechanism

    The RTS/CTS handshake mechanism in WLAN is studied using stochastic geometry. The effect of RTS/CTS is treated as a thinning procedure for a spatially distributed point process that models the potential transceivers in a WLAN, and the resulting concurrent transmission processes are described. Exact formulas for the intensity of the...

    Provided By University of Science and Technology of China