2016 IEEE 37th Sarnoff Symposium最新文献

筛选
英文 中文
Full-duplex communication in cooperative cognitive radio networks: Preliminary results 协同认知无线电网络中的全双工通信:初步结果
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846773
Sangwoo Park, Jinhyun Ahn, Seungwon Lee, I. Song
{"title":"Full-duplex communication in cooperative cognitive radio networks: Preliminary results","authors":"Sangwoo Park, Jinhyun Ahn, Seungwon Lee, I. Song","doi":"10.1109/SARNOF.2016.7846773","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846773","url":null,"abstract":"We address the design of cooperative cognitive radio networks (CCRN) adopting a full-duplex (FD) technique. In order to enable FD communication in the CCRN, simultaneous transmitting and receiving antennas are employed for the secondary users. Some preliminary results from numerical evaluation indicate that the proposed FD multiple-input-multiple-output CCRN framework can provide a considerable performance gain over the conventional CCRN frameworks.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122118265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Market-based path service composition for software defined networks 基于市场的软件定义网络路径服务组合
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846737
Shu Huang, I. Baldin
{"title":"Market-based path service composition for software defined networks","authors":"Shu Huang, I. Baldin","doi":"10.1109/SARNOF.2016.7846737","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846737","url":null,"abstract":"With the emerging network ‘softwarization’, the scope of services that Internet Service Providers (ISPs) can provide now extends from traditional networking services to include higher layer infrastructure, network elements and applications. However, partly due to unclear economic incentives for ISPs, new network services, especially Software-Defined Network (SDN) services are mostly deployed in isolated silos. In this paper we propose a framework for abstracting and managing path services in SDNs so that they can be advertised, composed and purchased via marketplaces. Based on this framework, we present a service composition mechanism that can be used to maximize the provider benefit while satisfying the customer requests for services. The architecture is based on the NSF Future Internet Architecture (FIA) project called ChoiceNet.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122525326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable path provisioning in the presence of multiple correlated failures 在存在多个相关故障的情况下提供可靠的路径
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846727
Mauricio General, J. Pezoa
{"title":"Reliable path provisioning in the presence of multiple correlated failures","authors":"Mauricio General, J. Pezoa","doi":"10.1109/SARNOF.2016.7846727","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846727","url":null,"abstract":"It has been shown that multiple, correlated failures severely impair telecommunications networks inducing more damage than independent failures. In this paper we present a simple path provisioning scheme, which offers maximal reliability to networks affected by multiple, correlated failures. The scheme characterizes correlated failures, which are modeled using the concept of probabilistic shared-risk groups, and assigns risks to each network link. Next, the most reliable path is computed minimizing the end-to-end risk. Results based on metrics such as protection failure rate and bandwidth blocking rate show the efficiency of the provisioning scheme.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122566456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-target device-free passive localization by combining anomaly link selection and weighted-link minimum error localization 结合异常链路选择和加权链路最小误差定位的无源双目标定位
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846766
Shuyan Li, Wei Huang, Donglin Wang, Z. Dong
{"title":"Two-target device-free passive localization by combining anomaly link selection and weighted-link minimum error localization","authors":"Shuyan Li, Wei Huang, Donglin Wang, Z. Dong","doi":"10.1109/SARNOF.2016.7846766","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846766","url":null,"abstract":"Device-free passive localization aims at locating moving objects that do not carry any localization devices. The rationale of this problem is based on the fact that a moving object can result in changes of received signal strength (RSS) of the wireless links. Existing studies only consider localization of a single-target localization or a multi-target group moving together, equivalent to a single-target localization problem. In this paper, we propose a framework for two-target device-free passive localization, where we propose a layout of Transceivers (TRXs) and a novel two-target localization method by combing the anomaly link selection and weighted-link minimum error localization (WMEL). Simulation results demonstrate our proposed layout and localization accuracy.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122850153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P2F2: Privacy-preserving face finder P2F2:隐私保护面部查找器
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846758
Nora Almalki, Reza Curtmola, Xiaoning Ding, N. Gehani, C. Borcea
{"title":"P2F2: Privacy-preserving face finder","authors":"Nora Almalki, Reza Curtmola, Xiaoning Ding, N. Gehani, C. Borcea","doi":"10.1109/SARNOF.2016.7846758","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846758","url":null,"abstract":"Fueled by the explosive growth in the number of pictures taken using smart phones, people are increasingly using cloud photo storage services. Although many innovative apps have been developed to leverage this collection of photos in the cloud, users are concerned with the privacy of their photos. We have developed Privacy-Preserving Face Finder (P2F2), a system that allows cloud-based photo matching, while preserving the privacy of the photos from the cloud provider. P2F2 stores encrypted photos in the cloud and performs photo matching based on feature vectors extracted from the photos. At its core, P2F2 relies on a novel privacy-preserving protocol for computing the Chi-square distance between the feature vectors of two photos. To achieve its goal, P2F2 extracts two privacy-preserving components from a photo's feature vector and stores them at non-colluding cloud providers. Unlike previous privacy-preserving work, P2F2 is designed to work with feature descriptors that are optimized for face recognition. An authorized querier can match a target face photo with a set of encrypted face photos stored in the cloud and receive the k most similar encrypted photos, which can then be decrypted. We have implemented a prototype of P2F2 and evaluated its performance using smart phones and a small-size cloud. Our security analysis and experimental evaluation show that P2F2 successfully achieves the desired security guarantees and is feasible in practical conditions.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131500116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart wireless sensor networks powered by remaining energy cluster head selection protocol 基于剩余能量簇头选择协议的智能无线传感器网络
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846765
Fawaz Alassery, Walid K. M. Ahmed
{"title":"Smart wireless sensor networks powered by remaining energy cluster head selection protocol","authors":"Fawaz Alassery, Walid K. M. Ahmed","doi":"10.1109/SARNOF.2016.7846765","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846765","url":null,"abstract":"In smart Wireless Sensor Networks (WSNs), clustering is one of the most power efficient techniques which minimize the transmission ranges of sensor nodes. Instead of sending packets directly to the BS with high power levels, sensor nodes in the sensing filed can be organized in groups (i.e. clusters), where Cluster Heads (CHs) manage the transmission by aggregating the whole group of packets and retransmit them to the Base Station (BS). Therefore, the clustering technique solve the problem that nodes close to the BS consume a large amount of power due to the need to be active most of the time to retransmit packets to the BS (i.e. sink hole problem). In this paper, we propose a novel Raining Energy Cluster Head Selection (RECHS) protocol which is based on a simple Statistical Discrimination (SD) metric which detects collided packets before decoding as well as the Multi-Dimensional Slotted ALOHA (MDSA) MAC protocol which organizes the access to the communication channel. Hence, both reception and transmission power consumption will be minimized remarkably. In addition, in RECHS protocol, a simple Cluster Head (CH) selection algorithm is proposed which is based on the ratio between the remaining energy of every member (node) in a cluster and the initial (start-up) energy as well as the minimum distance between the CH and the sink node. In this paper, we will show how the proposed CH selection mechanism in RECHS protocol along with the SD technique and the MDSA MAC protocol overcomes some well-known protocols such as LEACH where a CH is selected in a distributed (i.e. random) fashion and the MAC protocol is TDMA. In particular, we will show how the performance of RECHS protocol overcomes LEACH protocol in terms of the percentage of alive nodes, the average number of successfully arrived packets to the BS (i.e. the throughput), and the average residual energy of the network per simulation round.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Trustworthy and protected data collection for event detection using networked sensing systems 使用网络传感系统进行事件检测的可靠和受保护的数据收集
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846745
Md. Zakirul Alam Bhuiyan, Jie Wu
{"title":"Trustworthy and protected data collection for event detection using networked sensing systems","authors":"Md. Zakirul Alam Bhuiyan, Jie Wu","doi":"10.1109/SARNOF.2016.7846745","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846745","url":null,"abstract":"Data collection in wireless networked sensing systems (WNSS) is usually not reliable due to sensor faults and/or security attacks. This makes detection of an event (e.g., structural damage) through data aggregation unreliable. In this paper, we propose a trustworthy and protected data collection (TPDC) framework for event detection in WNSS. This framework facilitates reliable data for aggregation at clusters of WNSS. The key idea of TPDC is to allow a cluster head to check whether or not the transmitted data is trustworthy (i.e., unaltered estimated at the sensor node level) and protected (i.e., received without alteration after the transmission) before aggregating the data at a cluster. For the trustworthy data, we propose an algorithm to make sure that transmitted data is unaltered. For the protected data, we present a truth discovery approach, whose goal is to infer truthful facts from unreliable sensor data. Through simulations, we demonstrate that the collected data in TPDC is trustworthy and protected that can make aggregation for event detection reliable.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134285579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Ultra-wideband signals for high-resolution cognitive positioning techniques in 5G wireless 5G无线高分辨率认知定位技术的超宽带信号
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846720
Akeem A. Adebomehin, S. Walker
{"title":"Ultra-wideband signals for high-resolution cognitive positioning techniques in 5G wireless","authors":"Akeem A. Adebomehin, S. Walker","doi":"10.1109/SARNOF.2016.7846720","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846720","url":null,"abstract":"The 5G network prospect of seamlessly connected global devices with delay-tolerant communication, millisecond latency and gigabits per second data rate suggests the need for high resolution location-aware systems with new methods for positioning services. Traditional geo-positioning methods have been characterized by detection and mitigation of NLOS paths where discrimination between LOS and NLOS components are cast into a hypothesis-testing problem. This explains the focus of most related works on range measurements. It is however believed that Ultra-wideband (UWB) promises better positioning methods for accuracy-critical situations expected in 5G setting. This proposes EULOSTECH; an algorithm for enhanced UWB LOS sufficient positioning technique and mitigation method for cognitive 5G wireless setting. Results obtained from simulation experiments have been impressive and the highlights are presented in this paper. It is believed that the proposed solution has potential for robust and cost efficient localization in 5G setting as well as prospect to decongest licensed spectrums in 5G wireless environment with UWB.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"279 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling and optimization for programmable unified control plane in heterogeneous wireless networks 异构无线网络中可编程统一控制平面的建模与优化
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846761
B. Jalaeian, Venkateswara Dasari, Y. T. Hou
{"title":"Modeling and optimization for programmable unified control plane in heterogeneous wireless networks","authors":"B. Jalaeian, Venkateswara Dasari, Y. T. Hou","doi":"10.1109/SARNOF.2016.7846761","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846761","url":null,"abstract":"Tactical networks are wireless in nature to support mobility and rapid deployment in contested environments. These networks also consist of various heterogeneous networking technologies. Since the tactical networks are specialized purpose built networks and their main motivation is to solve a special purpose functions, the interoperability between different technologies was not initially viewed as essential. As the deployment of wireless networks become ubiquitous both in private and government sectors, the lack of interoperability has become a disadvantage in creating a unified control plane. A unified control plane can abstract the complexity of heterogeneous wireless networks and can provide a centralized control over the network resources. In this paper, we develop necessary mathematical model to realize the unified programmable control plane for heterogeneous wireless networks. We develop a cross-layer optimization framework, which characterizes the interaction between physical, link, and network layer for the unified programmable control plane in a heterogeneous wireless network. By applying the framework on a throughput maximization problem, we will show an application of the model to solve practical issues in a tactical network and gain some theoretical insight on the optimal behavior of the unified programmable control plane for a heterogeneous wireless network.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Downlink power control for latency aware grid energy savings in green cellular networks 绿色蜂窝网络中时延感知电网节能的下行功率控制
2016 IEEE 37th Sarnoff Symposium Pub Date : 2016-09-01 DOI: 10.1109/SARNOF.2016.7846735
V. Chamola, Pratik Narang, B. Sikdar
{"title":"Downlink power control for latency aware grid energy savings in green cellular networks","authors":"V. Chamola, Pratik Narang, B. Sikdar","doi":"10.1109/SARNOF.2016.7846735","DOIUrl":"https://doi.org/10.1109/SARNOF.2016.7846735","url":null,"abstract":"Mobile service providers can achieve cost savings by deploying Base Stations (BSs) which harvest renewable energy as they reduce the energy drawn from the grid and its associated cost. The cost savings can be further enhanced by careful management of the system resources. Furthermore, mobile operators require that such resource management be carefully coupled with managing the quality of service (QoS) to ensure customer satisfaction. This process involves trade-off between energy drawn from the grid and the QoS performance. In contrast to prior research which has addressed the problem of joint management of grid energy savings and the QoS performance using user-association reconfiguration or BS on/off schemes, we present a framework for doing so using BS downlink power control. Our proposed framework is evaluated through simulations using a real BS deployment from London, UK, and we show its superior performance over existing benchmarks. We demonstrate that our framework can lead to around 40% grid energy savings with better network latency performance as compared to the traditionally used scheme.","PeriodicalId":137948,"journal":{"name":"2016 IEEE 37th Sarnoff Symposium","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124284287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信