2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)最新文献

筛选
英文 中文
A Deterministic and a Randomized Algorithm for Approximating Minimum Spanning Tree under the SINR Model SINR模型下最小生成树近似的确定性和随机算法
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.41
Flávio Assis
{"title":"A Deterministic and a Randomized Algorithm for Approximating Minimum Spanning Tree under the SINR Model","authors":"Flávio Assis","doi":"10.1109/WMNC.2015.41","DOIUrl":"https://doi.org/10.1109/WMNC.2015.41","url":null,"abstract":"We describe a deterministic and a randomized distributed algorithm for computing a spanning tree over a wireless network whose weight approximates the weight of a Minimum Spanning Tree (MST). The network is composed of n static nodes embedded in a 2-dimensional Euclidean space which communicate according to the Signal-to-Interference- and-Noise Ratio (SINR) model. Under the assumption that each node knows its position and the granularity g of the network, the deterministic algorithm computes a tree within O(D log g) rounds, where D is the diameter of the graph. When nodes additionally know the local density of the network, the randomized algorithm computes a tree within O(D+log n+log g) rounds. The computed trees have weight that is within an O(log n) factor of the weight of MST. To the best of our knowledge we describe the first deterministic algorithm for this problem under the SINR model.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hungarian Method Based Joint Transmission Mode and Relay Selection in Device-to-Device Communication 基于匈牙利方法的设备间通信联合传输模式和中继选择
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.33
R. Chithra, R. Bestak, S. K. Patra
{"title":"Hungarian Method Based Joint Transmission Mode and Relay Selection in Device-to-Device Communication","authors":"R. Chithra, R. Bestak, S. K. Patra","doi":"10.1109/WMNC.2015.33","DOIUrl":"https://doi.org/10.1109/WMNC.2015.33","url":null,"abstract":"The concept of Device-to-Device (D2D) communication has been introduced for local area connectivity as a means to improve the cellular spectrum utilization and to reduce the energy consumption of user equipments. The performance of D2D communication is practically limited due to large distance and/or poor channel conditions between the D2D transmitter and receiver. To overcome these issues, a relay-assisted D2D communication has been introduced where a device relaying is an additional transmission mode along with the existing cellular and D2D transmission modes. In this paper, a transmission mode assignment algorithm based on the Hungarian algorithm is proposed to improve the overall system throughput. The proposed algorithm tries to solve two problems: a suitable transmission mode selection for each scheduled transmissions and a device selection for relaying communication between user equipments in the relay transmission mode. Simulation results show that our proposed algorithm could improve the system performance in terms of the overall system throughput and D2D data rate.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124148280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Centralized Reputation System for MANETs Based on Observed Path Performance 基于观察路径性能的manet集中式信誉系统
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.42
J. Konorski, K. Rydzewski
{"title":"A Centralized Reputation System for MANETs Based on Observed Path Performance","authors":"J. Konorski, K. Rydzewski","doi":"10.1109/WMNC.2015.42","DOIUrl":"https://doi.org/10.1109/WMNC.2015.42","url":null,"abstract":"A reputation system for MANETs is described that attempts to deduce nodal trustworthiness (forwarding behaviour) from observed end-to-end path performance. The trustworthiness deduction algorithm produces interval estimates and works well if node misbehaviour is not selective with respect to traversing paths. Nodal reputation levels are next calculated in the spirit of generous tit-for-tat so as to best reflect momentary nodal trustworthiness. High-reputed sources are favoured when forwarding transit packets (indirect reciprocity) and high-reputed paths are favoured by the multipath DSR. For a simplified network model and assuming the nodes are able to control their reputation levels with a view of a high source throughput, we find that high reputation may be costly to maintain. We examine an arising reputation game and conditions under which it produces a cooperation-stimulating Nash equilibrium.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Geolocation of Internet Hosts Using Smartphones and Crowdsourcing 互联网主机的地理定位使用智能手机和众包
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.26
Gloria Ciavarrini, Francesco Disperati, L. Lenzini, Valerio Luconi, Alessio Vecchio
{"title":"Geolocation of Internet Hosts Using Smartphones and Crowdsourcing","authors":"Gloria Ciavarrini, Francesco Disperati, L. Lenzini, Valerio Luconi, Alessio Vecchio","doi":"10.1109/WMNC.2015.26","DOIUrl":"https://doi.org/10.1109/WMNC.2015.26","url":null,"abstract":"Knowing the position of an Internet host enables location-aware applications and services, such as restriction of content based on user's position or customized advertising. Active IP geolocation techniques estimate the position of an Internet host using measurements of the end-to-end delay between the target and a number of landmarks (hosts whose positions are known in advance). We present an IP geolocation method that operates in a crowd sourcing perspective and uses mobile devices as landmarks, since their position can be easily computed using the GPS unit. A specific calibration has been included to take into account the particular operating environment which, differently from the past, includes the presence of wireless links.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Regret Matching Strategy Framework for Inter-BAN Interference Mitigation 基于遗憾匹配策略的禁间干扰抑制框架
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.15
V. Marbukh, K. Sayrafian-Pour, Martina Barbi, M. Alasti
{"title":"A Regret Matching Strategy Framework for Inter-BAN Interference Mitigation","authors":"V. Marbukh, K. Sayrafian-Pour, Martina Barbi, M. Alasti","doi":"10.1109/WMNC.2015.15","DOIUrl":"https://doi.org/10.1109/WMNC.2015.15","url":null,"abstract":"A Body Area Network (BAN) is a radio standard for wireless connectivity of wearable and implantable sensors located inside or in close proximity to the human body. Medical and some other applications impose stringent constraints on battery powered BAN reliability, quality of service, and power consumption. However, lack of coordination among multiple colocated BANs in the current BAN standard may cause unacceptable deterioration of BAN reliability and quality of service due to high levels of inter-BAN interference. Assuming Time Division Multiple Access (TDMA), this paper proposes inter-BAN interference mitigation with regret matching based transmission scheduling algorithm. This scheduling algorithm uses pattern of past interference for implicit coordination between different BAN transmissions. Simulation results demonstrate potential benefits of the proposed scheduling algorithm for inter-BAN interference mitigation.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing at the Mobile Edge: Designing Elastic Android Applications for Computation Offloading 移动边缘的计算:为计算卸载设计弹性Android应用程序
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.10
Gabriel Orsini, Dirk Bade, W. Lamersdorf
{"title":"Computing at the Mobile Edge: Designing Elastic Android Applications for Computation Offloading","authors":"Gabriel Orsini, Dirk Bade, W. Lamersdorf","doi":"10.1109/WMNC.2015.10","DOIUrl":"https://doi.org/10.1109/WMNC.2015.10","url":null,"abstract":"Current centralized cloud datacenters provide scalable computation- and storage resources in a virtualized infrastructure and employ a use-based \"pay-as-you-go\" model. But current mobile devices and their resource-hungry applications (e.g., Speech-or face recognition) demand for these resources on the spot, though a mobile device's intrinsic characteristic is its limited availability of resources (e.g., CPU, storage, bandwidth, energy). Thus, mobile cloud computing (MCC) was introduced to overcome these limitations by transparently making accessible the apparently infinite cloud resources to the mobile devices and by allowing mobile applications to (elastically) expand into the cloud. However, MCC often relies on a stable and fast connection to the mobile devices' surrogate in the cloud, which is a rare case in mobile scenarios. Moreover, the increased latency and the limited bandwidth prevent the use of real-time applications like, e.g. Cloud gaming. Instead, mobile edge computing (MEC) or fog computing tries to provide the necessary resources at the logical edge of the network by including infrastructure components to create ad-hoc mobile clouds. However, this approach requires the replication and management of the applications' business logic in an untrusted, unreliable and constantly changing environment. Consequently, this paper presents a novel approach to allow mobile app developers to easily benefit from the features of MEC. In particular, we present a programming model and framework that directly fit the common app developers' mindset to design elastic and scalable edge-based mobile applications.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Probabilistic Data Aggregation Protocol Based on ACO-GA Hybrid Approach in Wireless Sensor Networks 基于ACO-GA混合方法的无线传感器网络概率数据聚合协议
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.20
Yao Lu, I. Comsa, P. Kuonen, B. Hirsbrunner
{"title":"Probabilistic Data Aggregation Protocol Based on ACO-GA Hybrid Approach in Wireless Sensor Networks","authors":"Yao Lu, I. Comsa, P. Kuonen, B. Hirsbrunner","doi":"10.1109/WMNC.2015.20","DOIUrl":"https://doi.org/10.1109/WMNC.2015.20","url":null,"abstract":"In Wireless Sensor Networks (WSNs), data aggregation techniques have the ability of reducing the data redundancy and the communication load. The probabilistic aggregation protocols make the dynamic routing decision, the nodes do not have explicit knowledge of downstream and upstream neighbors, and then it is difficult to obtain high aggregation efficiency. In order to address this problem, this paper proposes a new probabilistic aggregation protocol based on Ant Colony Optimization (ACO)-Genetic Algorithm (GA) hybrid approach. The Multi-Objective Steiner Tree (MOST) is defined as the optimal structure for data aggregation, which can be explored and frequently exploited during the routing process. Moreover, by using the prediction model based on the sliding window for the future arriving packets, the adaptive timing policy can adjust the timer interval to reduce the transmission delay and to enhance the aggregation probability. Finally, simulation results validate the feasibility and the high efficiency of the novel protocol when compared against other existing approaches.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving V2I Edge Communication by Performance Maps 通过性能图改进V2I边缘通信
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.39
T. Paulin, Stefan Rührup, P. Fuxjäger, A. Paier
{"title":"Improving V2I Edge Communication by Performance Maps","authors":"T. Paulin, Stefan Rührup, P. Fuxjäger, A. Paier","doi":"10.1109/WMNC.2015.39","DOIUrl":"https://doi.org/10.1109/WMNC.2015.39","url":null,"abstract":"Vehicle-to-infrastructure (V2I) communication is important for the collection of probe vehicle data and traffic information. When using IEEE 802.11 as access technology (ITS-G5 or WAVE), the communication between moving vehicles and fixed infrastructure, such as roadside stations, is most efficient when the passing vehicle reaches a window of opportunity that is characterized by high frame success rates. If the approaching vehicle does not know this window, it might receive a message from a roadside station announcing its presence while at the same time it needs several transmission attempts to transfer data to this roadside station. In this paper we propose a method to overcome this problem: As standard ITS beacon messages contain the geographic locations of the sending vehicles, the roadside station can use this information to create a performance map, which is basically a data structure that shows at which distance a certain frame success ratio can be expected. By disseminating this information (piggybacked to its own beacons), the roadside station can inform approaching vehicles to start transmissions only at those positions, where the expected success rate is high.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Logical Interface for Soft Handover -- An Effective Scheme of Handovers in Proxy Mobile IPv6 软切换逻辑接口——代理移动IPv6中一种有效的切换方案
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.44
M. Hoeft, P. Kamiński, J. Wozniak
{"title":"Logical Interface for Soft Handover -- An Effective Scheme of Handovers in Proxy Mobile IPv6","authors":"M. Hoeft, P. Kamiński, J. Wozniak","doi":"10.1109/WMNC.2015.44","DOIUrl":"https://doi.org/10.1109/WMNC.2015.44","url":null,"abstract":"Multimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces is one of techniques considered as a practical solution of soft handovers at data-link layer. However, there is still a lack of efficient approaches that integrate both data-link layer and network layer mobility management mechanisms. The authors propose a new scheme for soft handovers in the Proxy Mobile IPv6 domain using the Logical Interface. Evaluation of the new mechanism in WLAN and LAN networks was conducted to verify its efficiency.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LTE Uplink Interference-Aware Scheduling Using High Interference and Overload Indicators 基于高干扰和过载指标的LTE上行链路干扰感知调度
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC) Pub Date : 2015-10-01 DOI: 10.1109/WMNC.2015.32
T. A. Darweesh, K. Elsayed
{"title":"LTE Uplink Interference-Aware Scheduling Using High Interference and Overload Indicators","authors":"T. A. Darweesh, K. Elsayed","doi":"10.1109/WMNC.2015.32","DOIUrl":"https://doi.org/10.1109/WMNC.2015.32","url":null,"abstract":"LTE uses single carrier-frequency division multiple access (SC-FDMA) scheme for the uplink transmission which limits the flexibility of the allocation process as the sub carriers assigned to a single user have to be contiguous. We propose an LTE uplink interference-aware search-tree based scheduling scheme using the high interference indicator (HII) and the overload indicator (OI) messages that are exchanged over the X2-interface. HII indicates the potential uplink inter-cell interference (ICI) to other cells while OI indicates the detection of low, medium or high uplink ICI from other cells. The exchanged HII and OI messages are used to scale down the proportional-fair (PF) scheduling metric before being processed by the search-tree scheduler to make interfered physical resource blocks (PRBs) less favorable to cell-edge (CE) UEs. Unlike previous work which handles these problems separately, the proposed integrated RRM framework jointly takes into account 1) interference information exchanged between neighbor eNBs, 2) constraints on max power per UE and equal power on different PRBs, and 3) constraints on the contiguity in PRBs allocation due to SC-FDMA mechanism. It is also fully integrated with the LTE uplink open and closed-loop fractional power control for proper power allocation. The proposed interference-aware scheduler reduces the effect of the generated ICI mainly on CE users and also manages to provide fair resource sharing between CE and cell-center (CC) users. Simulation results show that the proposed framework improves CE users' throughput by around 5% compared to soft frequency reuse (SFR). It also reduces the probability of not being served to 1% -- compared to 10% in SFR.","PeriodicalId":240086,"journal":{"name":"2015 8th IFIP Wireless and Mobile Networking Conference (WMNC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122987880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信