University of Veszprem

Displaying 1-29 of 29 results

  • White Papers // May 2013

    Towards Smarter Task Applications

    Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior...

    Provided By University of Veszprem

  • White Papers // Apr 2013

    On-Demand Mobile Energy Replenishment in Wireless Sensor Networks

    Recently, adopting mobile energy chargers to replenish the energy supply of sensor nodes in Wireless Sensor Networks has gained increasing attention from the research community. Different from energy harvesting systems, the utilization of mobile energy chargers is able to provide more reliable energy supply than the dynamic energy harvested from...

    Provided By University of Veszprem

  • White Papers // Feb 2013

    HTC Scientific Computing in a Distributed Cloud Environment

    This paper describes the use of a distributed cloud computing system for High-Throughput Computing (HTC) scientific applications. The distributed cloud computing system is composed of a number of separate Infrastructure-as-a-Service (IaaS) clouds that are utilized in a unified infrastructure. The distributed cloud has been in production-quality operation for two years...

    Provided By University of Veszprem

  • White Papers // Jan 2013

    Designing & Implementation of Mobile Operated Toy Car by DTMF

    In this paper, the authors advocate the operation of a toy car that is controlled by a mobile phone that makes a call to the mobile phone attached to the car. In the course of a call, if any button is pressed, a tone corresponding to the button pressed is...

    Provided By University of Veszprem

  • White Papers // Jan 2013

    Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks

    Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it is not scalable for large networks. To take advantage of expanding ring search, a critical question must be answered: what is the best...

    Provided By University of Veszprem

  • White Papers // Dec 2012

    Reliable Wireless Communication Networks for Demand Response Control

    This paper presents methodologies for deriving reliability performance of wireless communication networks to support Demand Response (DR) control. First, the impact of communication impairments on a direct DR control program is investigated. Second, the outage probability of a wireless link is modelled and quantified, considering the multipath fading, shadowing, and...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Finite State Markov Modelling for High Speed Railway Wireless Communication Channel

    How to provide reliable, cost-effective wireless services for High-Speed Railway (HSR) users attracts increasing attention due to the fast deployment of HSRs worldwide. A key issue is to develop reasonably accurate and mathematically tractable models for HSR wireless communication channels. Finite-State Markov Chains (FSMCs) have been extensively investigated to describe...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Metropolitan-Scale Taxicab Mobility Modeling

    Taxicabs, as one of the major transportation platforms in metropolises, are of great interest in vehicular communications and networking research. The mobility of taxicabs, determined by driver behaviors and passenger destinations, has attracted a lot of attention in recent years. Among different mobility models, trace-driven taxicab mobility models preserve many...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Surprise: User-Controlled Granular Privacy and Security for Personal Data in SmarterContext

    The smart internet relies on the exploitation of information obtained from interactions of users with web applications. A critical aspect for its success is the adoption of mechanisms that guarantee the protection of information sensitive to users. This paper presents surprise, the authors' solution to empower users with privacy and...

    Provided By University of Veszprem

  • White Papers // Oct 2012

    Area Spectral Efficiency of Cooperative Network with DF and AF Relaying

    Most performance metrics for cooperative networks focus on the qualification of either spectrum efficiency or link reliability, without considering the spatial effect of radio transmission. Area Spectral Efficiency (ASE) was first introduced to qualify the spatial spectral utilization efficiency of cellular systems. In this paper, the authors generalize the definition...

    Provided By University of Veszprem

  • White Papers // Sep 2012

    Computational Soundness of Coinductive Symbolic Security Under Active Attacks

    In this paper, the authors make some initial steps toward answering this question in the affirmative with respect to an extension of a trace-based security model (proposed by Micciancio and Warinschi in TCC 2004) including asymmetric and symmetric encryption; in particular, they prove that a random computational trace can be...

    Provided By University of Veszprem

  • White Papers // Jul 2012

    Protocol-Level Hidden Server Discovery

    In this paper, the authors proposed a protocol-level hidden server discovery approach to locate the Tor hidden server that hosts the illegal website. They investigated the Tor hidden server protocol and developed a hidden server discovery system, which consists of a Tor client, a Tor rendezvous point, and several Tor...

    Provided By University of Veszprem

  • White Papers // May 2012

    A Partition-Based Data Collection Scheme for Wireless Sensor Networks With a Mobile Sink

    Mobility-assisted data collection in wireless sensor networks brings in new opportunities to improve the energy efficiency of sensor nodes. However, it also introduces new challenges such as large data collection latency. The optimal usage of the limited mobility of mobile elements in the network is of great importance to reduce...

    Provided By University of Veszprem

  • White Papers // May 2012

    RDL: A Novel Approach for Passive Object Localization in WSN Based on RSSI

    The Radio Signal Strength Indicator (RSSI)-based localization algorithm is an effective solution for passive object localization. However, the localization accuracy of the existing methods highly depends on the transceiver distance and deployment density. Generally speaking, to obtain higher accuracy, the authors need a denser sensor node deployment, which results in...

    Provided By University of Veszprem

  • White Papers // May 2012

    Tone Reservation Based Peak Power Reduction in OFDMA Uplink Systems

    Tone Reservation (TR) has been proposed to reduce the Peak-to-Average Power Ratio (PAPR) of Orthogonal Frequency Division Multiple Access (OFDMA) uplink communication systems. However, it introduces Multiple-Access Interference (MAI) at the receiver. To reduce the effects of MAI, TR was proposed which uses all unused subcarriers at the OFDMA transmitter...

    Provided By University of Veszprem

  • White Papers // May 2012

    Adaptive Video Streaming With Inter-Vehicle Relay for Highway VANET Scenario

    Video is a desirable medium to provide traffic information, news, advertisements, etc. to people on-the-road. Due to the high mobility and dynamic topology of VANET, an open question is whether it is feasible to support video streaming services using license-free wireless communications between vehicles and road-side-units. In this paper, using...

    Provided By University of Veszprem

  • White Papers // May 2012

    Sum Rate Maximization in Fading Wireless Networks Using Stochastic Geometry

    Maximizing the sum rate of a wireless network with multiple interfering links is an important and challenging problem in communication systems. This difficult non-convex problem has been approached from both an algorithmic perspective to achieve global optimality (e.g., using d.c. programming) and a relaxation perspective to obtain approximate solutions (e.g.,...

    Provided By University of Veszprem

  • White Papers // May 2012

    Received Signal Strength Calibration for Handset Localization in WLAN

    Terminal localization for indoor Wireless Local Area Networks (WLANs) is critical for the deployment of location based services inside of buildings. A key challenge in localization arises when more than one mobile device is used for collecting Received Signal Strength (RSS) measurements due to the existence of inconsistencies in the...

    Provided By University of Veszprem

  • White Papers // Mar 2012

    On the Performance of Multiuser Scheduling With Post-Examining Under Non-Identical Fading

    The authors investigate the performance of a multiuser downlink access scheme based on a post-selection switch and examine algorithm. The studied scheme sequentially switches over the users that experience independent and non-identically distributed fading conditions, and selects a single user with an acceptable channel quality as compared to a pre-selected...

    Provided By University of Veszprem

  • White Papers // Mar 2012

    Modified Dynamic DF for Type-2 UE Relays

    A Dynamic Decode-&-Forward (DDF) is redesigned to meet the crucial requirements for type-2 User Equipment (UE) relays which are being considered for next-generation cellular standards (e.g., LTE-Advanced). Toward this, the proposed Modified DDF (M-DDF) realizes a fast jump-in relaying and sequential decoding where a sub-frame decoding is employed to yield...

    Provided By University of Veszprem

  • White Papers // Feb 2012

    Web Service Assurance: The Notion and the Issues

    Web service technology provides basic infrastructure for deploying collaborative business processes. Web Service security standards and protocols aim to provide secure communication and conversation between service providers and consumers. Still, for a client calling a Web service it is difficult to ascertain that a particular service instance satisfies - at...

    Provided By University of Veszprem

  • White Papers // Feb 2012

    Relational Semantics for Databases and Predicate Calculus

    The relational data model requires a theory of relations in which tuples are not only many-sorted, but can also have indexes that are not necessarily numerical. In this paper, the authors develop such a theory and define operations on relations that are adequate for database use. The operations are similar...

    Provided By University of Veszprem

  • White Papers // Dec 2011

    Finite-State Markov Modeling for Wireless Cooperative Diversity System

    The Finite-State Markov Chain (FSMC) models can capture the essence of time-varying fading channels by preserving their statistic features. How to build FSMC models for multi-hop and multipath wireless systems remains an open issue. In this paper, the FSMC channel models are developed for Amplify-and-Forward (AF) cooperative systems with Selection...

    Provided By University of Veszprem

  • White Papers // Aug 2010

    Dynamic Resource Allocation in Computing Clouds using Distributed Multiple Criteria Decision Analysis

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, the authors propose a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is...

    Provided By University of Veszprem

  • White Papers // Mar 2010

    Dynamic Resource Allocation in Computing Clouds Through Distributed Multiple Criteria Decision Analysis

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, the authors investigate a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is...

    Provided By University of Veszprem

  • White Papers // May 2009

    Virtualized Recomposition: Cloudy or Clear?

    Virtualization provides a coarse-grained isolation mechanism those results in large systems, with full operating systems and a complete software stack as their foundation. Though much of this foundation is not strictly necessary, the programmatic burden of building systems at a finer-granularity, on a smaller foundation, has previously been shown to...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Energy-Efficient Cooperative Routing in Multi-Hop Wireless Ad Hoc Networks

    The authors study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. They prove that the Minimum Energy Cooperative Path (MECP) routing problem, i.e., using cooperative radio transmission to find the best route with the minimum energy cost from a source node to a destination node,...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Minimum Energy Cooperative Path Routing in Wireless Networks: An Integer Programming Formulation

    The authors study the problem of Minimum Energy Cooperative Path (MECP) routing in wireless networks. The joint problem of cooperative routing in wireless networks that combines route selection and the transmit diversity was recently presented. Several heuristic algorithms were also proposed to approximate the minimum energy cooperative path, while it...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Fault-Tolerant Computation of Distributed Regular Path Queries

    Regular path queries are the building block of almost any mechanism for querying semi-structured data. Despite the fact that the main applications of such data are distributed, there are only few works dealing with distributed evaluation of regular path queries. In this paper the authors present a message-efficient and truly...

    Provided By University of Veszprem

  • White Papers // Sep 2012

    Computational Soundness of Coinductive Symbolic Security Under Active Attacks

    In this paper, the authors make some initial steps toward answering this question in the affirmative with respect to an extension of a trace-based security model (proposed by Micciancio and Warinschi in TCC 2004) including asymmetric and symmetric encryption; in particular, they prove that a random computational trace can be...

    Provided By University of Veszprem

  • White Papers // Dec 2012

    Reliable Wireless Communication Networks for Demand Response Control

    This paper presents methodologies for deriving reliability performance of wireless communication networks to support Demand Response (DR) control. First, the impact of communication impairments on a direct DR control program is investigated. Second, the outage probability of a wireless link is modelled and quantified, considering the multipath fading, shadowing, and...

    Provided By University of Veszprem

  • White Papers // Jul 2012

    Protocol-Level Hidden Server Discovery

    In this paper, the authors proposed a protocol-level hidden server discovery approach to locate the Tor hidden server that hosts the illegal website. They investigated the Tor hidden server protocol and developed a hidden server discovery system, which consists of a Tor client, a Tor rendezvous point, and several Tor...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Finite State Markov Modelling for High Speed Railway Wireless Communication Channel

    How to provide reliable, cost-effective wireless services for High-Speed Railway (HSR) users attracts increasing attention due to the fast deployment of HSRs worldwide. A key issue is to develop reasonably accurate and mathematically tractable models for HSR wireless communication channels. Finite-State Markov Chains (FSMCs) have been extensively investigated to describe...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Metropolitan-Scale Taxicab Mobility Modeling

    Taxicabs, as one of the major transportation platforms in metropolises, are of great interest in vehicular communications and networking research. The mobility of taxicabs, determined by driver behaviors and passenger destinations, has attracted a lot of attention in recent years. Among different mobility models, trace-driven taxicab mobility models preserve many...

    Provided By University of Veszprem

  • White Papers // Jan 2013

    Designing & Implementation of Mobile Operated Toy Car by DTMF

    In this paper, the authors advocate the operation of a toy car that is controlled by a mobile phone that makes a call to the mobile phone attached to the car. In the course of a call, if any button is pressed, a tone corresponding to the button pressed is...

    Provided By University of Veszprem

  • White Papers // Feb 2013

    HTC Scientific Computing in a Distributed Cloud Environment

    This paper describes the use of a distributed cloud computing system for High-Throughput Computing (HTC) scientific applications. The distributed cloud computing system is composed of a number of separate Infrastructure-as-a-Service (IaaS) clouds that are utilized in a unified infrastructure. The distributed cloud has been in production-quality operation for two years...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Energy-Efficient Cooperative Routing in Multi-Hop Wireless Ad Hoc Networks

    The authors study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. They prove that the Minimum Energy Cooperative Path (MECP) routing problem, i.e., using cooperative radio transmission to find the best route with the minimum energy cost from a source node to a destination node,...

    Provided By University of Veszprem

  • White Papers // Jan 2013

    Pessimism Is Mostly the Best for the Expanding Ring Search in Wireless Networks

    Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it is not scalable for large networks. To take advantage of expanding ring search, a critical question must be answered: what is the best...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Minimum Energy Cooperative Path Routing in Wireless Networks: An Integer Programming Formulation

    The authors study the problem of Minimum Energy Cooperative Path (MECP) routing in wireless networks. The joint problem of cooperative routing in wireless networks that combines route selection and the transmit diversity was recently presented. Several heuristic algorithms were also proposed to approximate the minimum energy cooperative path, while it...

    Provided By University of Veszprem

  • White Papers // Dec 2011

    Finite-State Markov Modeling for Wireless Cooperative Diversity System

    The Finite-State Markov Chain (FSMC) models can capture the essence of time-varying fading channels by preserving their statistic features. How to build FSMC models for multi-hop and multipath wireless systems remains an open issue. In this paper, the FSMC channel models are developed for Amplify-and-Forward (AF) cooperative systems with Selection...

    Provided By University of Veszprem

  • White Papers // Aug 2010

    Dynamic Resource Allocation in Computing Clouds using Distributed Multiple Criteria Decision Analysis

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, the authors propose a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is...

    Provided By University of Veszprem

  • White Papers // Oct 2012

    Area Spectral Efficiency of Cooperative Network with DF and AF Relaying

    Most performance metrics for cooperative networks focus on the qualification of either spectrum efficiency or link reliability, without considering the spatial effect of radio transmission. Area Spectral Efficiency (ASE) was first introduced to qualify the spatial spectral utilization efficiency of cellular systems. In this paper, the authors generalize the definition...

    Provided By University of Veszprem

  • White Papers // Apr 2013

    On-Demand Mobile Energy Replenishment in Wireless Sensor Networks

    Recently, adopting mobile energy chargers to replenish the energy supply of sensor nodes in Wireless Sensor Networks has gained increasing attention from the research community. Different from energy harvesting systems, the utilization of mobile energy chargers is able to provide more reliable energy supply than the dynamic energy harvested from...

    Provided By University of Veszprem

  • White Papers // May 2009

    Virtualized Recomposition: Cloudy or Clear?

    Virtualization provides a coarse-grained isolation mechanism those results in large systems, with full operating systems and a complete software stack as their foundation. Though much of this foundation is not strictly necessary, the programmatic burden of building systems at a finer-granularity, on a smaller foundation, has previously been shown to...

    Provided By University of Veszprem

  • White Papers // Mar 2010

    Dynamic Resource Allocation in Computing Clouds Through Distributed Multiple Criteria Decision Analysis

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, the authors investigate a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is...

    Provided By University of Veszprem

  • White Papers // Feb 2012

    Web Service Assurance: The Notion and the Issues

    Web service technology provides basic infrastructure for deploying collaborative business processes. Web Service security standards and protocols aim to provide secure communication and conversation between service providers and consumers. Still, for a client calling a Web service it is difficult to ascertain that a particular service instance satisfies - at...

    Provided By University of Veszprem

  • White Papers // Nov 2012

    Surprise: User-Controlled Granular Privacy and Security for Personal Data in SmarterContext

    The smart internet relies on the exploitation of information obtained from interactions of users with web applications. A critical aspect for its success is the adoption of mechanisms that guarantee the protection of information sensitive to users. This paper presents surprise, the authors' solution to empower users with privacy and...

    Provided By University of Veszprem

  • White Papers // May 2013

    Towards Smarter Task Applications

    Mobile devices offer an unprecedented amount of context about their users. Management of this context is like trying to find the signal in the noise. Those applications that can find the signal open themselves up to new business opportunities. These business opportunities come about as a result of emergent behavior...

    Provided By University of Veszprem

  • White Papers // Oct 2008

    Fault-Tolerant Computation of Distributed Regular Path Queries

    Regular path queries are the building block of almost any mechanism for querying semi-structured data. Despite the fact that the main applications of such data are distributed, there are only few works dealing with distributed evaluation of regular path queries. In this paper the authors present a message-efficient and truly...

    Provided By University of Veszprem

  • White Papers // May 2012

    A Partition-Based Data Collection Scheme for Wireless Sensor Networks With a Mobile Sink

    Mobility-assisted data collection in wireless sensor networks brings in new opportunities to improve the energy efficiency of sensor nodes. However, it also introduces new challenges such as large data collection latency. The optimal usage of the limited mobility of mobile elements in the network is of great importance to reduce...

    Provided By University of Veszprem

  • White Papers // May 2012

    RDL: A Novel Approach for Passive Object Localization in WSN Based on RSSI

    The Radio Signal Strength Indicator (RSSI)-based localization algorithm is an effective solution for passive object localization. However, the localization accuracy of the existing methods highly depends on the transceiver distance and deployment density. Generally speaking, to obtain higher accuracy, the authors need a denser sensor node deployment, which results in...

    Provided By University of Veszprem

  • White Papers // May 2012

    Tone Reservation Based Peak Power Reduction in OFDMA Uplink Systems

    Tone Reservation (TR) has been proposed to reduce the Peak-to-Average Power Ratio (PAPR) of Orthogonal Frequency Division Multiple Access (OFDMA) uplink communication systems. However, it introduces Multiple-Access Interference (MAI) at the receiver. To reduce the effects of MAI, TR was proposed which uses all unused subcarriers at the OFDMA transmitter...

    Provided By University of Veszprem

  • White Papers // May 2012

    Adaptive Video Streaming With Inter-Vehicle Relay for Highway VANET Scenario

    Video is a desirable medium to provide traffic information, news, advertisements, etc. to people on-the-road. Due to the high mobility and dynamic topology of VANET, an open question is whether it is feasible to support video streaming services using license-free wireless communications between vehicles and road-side-units. In this paper, using...

    Provided By University of Veszprem

  • White Papers // May 2012

    Sum Rate Maximization in Fading Wireless Networks Using Stochastic Geometry

    Maximizing the sum rate of a wireless network with multiple interfering links is an important and challenging problem in communication systems. This difficult non-convex problem has been approached from both an algorithmic perspective to achieve global optimality (e.g., using d.c. programming) and a relaxation perspective to obtain approximate solutions (e.g.,...

    Provided By University of Veszprem

  • White Papers // May 2012

    Received Signal Strength Calibration for Handset Localization in WLAN

    Terminal localization for indoor Wireless Local Area Networks (WLANs) is critical for the deployment of location based services inside of buildings. A key challenge in localization arises when more than one mobile device is used for collecting Received Signal Strength (RSS) measurements due to the existence of inconsistencies in the...

    Provided By University of Veszprem

  • White Papers // Mar 2012

    On the Performance of Multiuser Scheduling With Post-Examining Under Non-Identical Fading

    The authors investigate the performance of a multiuser downlink access scheme based on a post-selection switch and examine algorithm. The studied scheme sequentially switches over the users that experience independent and non-identically distributed fading conditions, and selects a single user with an acceptable channel quality as compared to a pre-selected...

    Provided By University of Veszprem

  • White Papers // Mar 2012

    Modified Dynamic DF for Type-2 UE Relays

    A Dynamic Decode-&-Forward (DDF) is redesigned to meet the crucial requirements for type-2 User Equipment (UE) relays which are being considered for next-generation cellular standards (e.g., LTE-Advanced). Toward this, the proposed Modified DDF (M-DDF) realizes a fast jump-in relaying and sequential decoding where a sub-frame decoding is employed to yield...

    Provided By University of Veszprem

  • White Papers // Feb 2012

    Relational Semantics for Databases and Predicate Calculus

    The relational data model requires a theory of relations in which tuples are not only many-sorted, but can also have indexes that are not necessarily numerical. In this paper, the authors develop such a theory and define operations on relations that are adequate for database use. The operations are similar...

    Provided By University of Veszprem