{"title":"Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks","authors":"M. Alam, Sudeep Bhattarai, Liang Hong, S. Shetty","doi":"10.1109/CCNC.2016.7444858","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444858","url":null,"abstract":"Transmit beamforming is one of the promising ways of accessing spectrum in an underlay cognitive radio network (CRN). In this paper, a robust cooperative transmit beamforming scheme is proposed for a mobile (or stationary) secondary receiver in a CRN where steering vector available at the distributed transmitters is error prone. The solution to the beamforming problem is based on stochastic optimization theory. Specifically, the proposed beamforming scheme achieves the following three objectives: i) probability of large-than-a-threshold for received power in the direction of the secondary receiver is maximized; ii) probabilities of less-than-a-threshold for received interference power in the direction of primary receivers are bounded; and iii) transmit power along the directions of the moving secondary receiver is forced to be uniform so as to ensure the same quality of service. Our simulation results demonstrate that the proposed robust cooperative beamformer can achieve noticeable bit-error-rate reductions for primary users as compared to the non-robust approach, where inaccuracy in the estimation of the steering vector is not considered, while ensuring almost the same quality of communication for the secondary user.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Channel Switching for high-definition peer-to-peer 802.11-based video streaming","authors":"Erin Sullivan, T. Johnson, Ben Lee","doi":"10.1109/CCNC.2016.7444865","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444865","url":null,"abstract":"Peer-to-peer streaming of HD video over ad-hoc 802.11 wireless networks is a popular application, but the received video quality, and therefore the user's Quality of Experience (QoE), depends heavily on the condition of the wireless channel used. This paper presents Active Scanning-based Dynamic Channel Switching (ASDCS), which ensures wireless video streaming takes place over the channel whose condition is most likely to provide good received video quality. ASDCS selects an initial channel before video streaming begins, assesses the performance of the current channel during streaming, and dynamically searches for a better channel if the current one is insufficient. Our simulation results show that ASDCS outperforms existing static queue-threshold and SINR-based methods.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable topology-based flow entry management in data center","authors":"Chi-Hsiang Hung, Chao-Wei Huang, Li-Chun Wang, Chien Chen","doi":"10.1109/CCNC.2016.7444736","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444736","url":null,"abstract":"Compared with current distributed networks, Software defined networking is an innovative technology to manage networks by a centralized controller with global visibility. OpenFlow is one kind of SDN protocols. It provides flow-level controllability of network traffic to simplify the management of the administrators of data center. Flow control rules used by OpenFlow in switch flow table are called flow entries. Modern commodity switches use TCAM to implement flow table because of its high matching speed. However, the general TCAM size of switch only accommodates up to thousands of flow entries due to its high cost-to-density ratio and high power consumption. It indicates that the maximal number of flow that can be controlled is restricted to the TCAM size of switch. That leads to several scalability issues, especially in a data center. In this paper, we propose a topology based flow entry management (TFEM) technique, which is a scalable and memory-efficient solution by exploiting the hierarchical topology characteristic to aggregate the uses of flow entries for most of the small flows in a data center. With the proposed downlink and uplink separated flow tables structure, our results show that TFEM can reduce the average number of flow entries by 50%~78% for fat-tree topology against the traditional SDN without any switch hardware modification.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the performance of wireless source-location using TDOA measurements under poor geometry","authors":"T. Zhang, Chun Zhang, Sheng Zhang, Zhihua Wang","doi":"10.1109/CCNC.2016.7444918","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444918","url":null,"abstract":"Booming wireless connectivity has boosted the interest of source-location in various types of network. The existing performance evaluations of source-location algorithms infrequently focus on the geometry issue, which also has considerable impact on the accuracy of source-location. This paper presents analysis and illustrations of the geometry issue for the time-difference-of-arrival (TDOA) method. Several common source-location algorithms are reviewed, followed by the simulation tests of positioning performance under variants of geometry and different measurement errors. Results indicate that positioning algorithms also work under the examined cases of poor geometry, and an RMSE of below 0.3m can be achieved, which implies that the deviation of time-difference measurement error should be no greater than 33 ps.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124802502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service differentiation strategy based on MACB factor for M2M Communications in LTE-A Networks","authors":"N. Zangar, Sami Gharbi, M. Abdennebi","doi":"10.1109/CCNC.2016.7444864","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444864","url":null,"abstract":"One of the promising technologies which is being regarded in the future 5G standard long Term Evolution (LTE) Release 13 is Machine-to-Machine or M2M communications. It represents a key component of Internet of Things (IoT) and smart spaces. One of the most difficult challenges to support M2M communications is their huge number compared to available radio resources. Hence, to deal with random access channel (RACH) overload and to better control the access in LTE-A Networks, the 3GPP proposed the Access Class Barring (ACB) factor concept. In this paper, we proposed an algorithm to improve this method based on adaptive multiple ACB factors, according to M2M traffic category with respect to their access delay budget and drop rate (QoS parameters). Simulations were done for testing the effectiveness of our MACB scheme and show that using multiples ACB factors and dynamically adjusting them to the congestion level in addition to traffic type category increases the access probability and reduces overload. The obtained results were then compared to the basic ACB method and show that the access probability increases especially for high priority traffic.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126102351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AirDraw: Leveraging smart watch motion sensors for mobile human computer interactions","authors":"Danial Moazen, Seyed Sajjadi, A. Nahapetian","doi":"10.1109/CCNC.2016.7444820","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444820","url":null,"abstract":"Wearable computing is one of the fastest growing technology markets today, with smart watches poised to take over at least of half the wearable device market. Approaches to text entry on smart watches and other wrist worn systems, independent of the small screen, is of importance to the further growth of wearable systems. The consistent user interaction and hands-free, heads-up operation of smart watches paves the way for gesture recognition methods for text entry. This paper proposes a new text input method for smart watches, which utilizes motion sensor data and machine learning approaches to detect letters written in the air by a user. This method is less computationally intensive, less expensive, and unaffected by lighting factors, when compared to computer vision approaches. The AirDraw system prototype developed to test this approach is presented, along with experimental results with close to 71% accuracy in letter recognition.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128365801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luis Guillermo Martinez Ballesteros, Selim Ickin, M. Fiedler, J. Markendahl, Konrad Tollmar, K. Wac
{"title":"Energy saving approaches for video streaming on smartphone based on QoE modeling","authors":"Luis Guillermo Martinez Ballesteros, Selim Ickin, M. Fiedler, J. Markendahl, Konrad Tollmar, K. Wac","doi":"10.1109/CCNC.2016.7444739","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444739","url":null,"abstract":"In this paper, we study the influence of video stalling on QoE. We provide QoE models that are obtained in realistic scenarios on the smartphone, and provide energy-saving approaches for smartphone by leveraging the proposed QoE models in relation to energy. Results show that approximately 5J is saved in a 3 minutes video clip with an acceptable Mean Opinion Score (MOS) level when the video frames are skipped. If the video frames are not skipped, then it is suggested to avoid freezes during a video stream as the freezes highly increase the energy waste on the smartphones.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130828881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis and improvement of congestion control in the CoAP Internet-of-Things protocol","authors":"R. Bhalerao, S. Subramanian, J. Pasquale","doi":"10.1109/CCNC.2016.7444906","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444906","url":null,"abstract":"An Internet of Things (IoT) environment typically consists of lossy and low powered networks (LLN) of interconnected sensors. An IoT messaging protocol that is gaining in popularity and importance is the Constrained Application Protocol (CoAP). CoAP runs at the application layer, handling reliability and congestion control over the unreliable UDP layer. Due to low bandwidth and high scale of communication, congestion can occur among sensors in an LLN, or when communicating to a border router, or when clients from the Internet access the resources in an LLN. While CoAP was originally specified with a primitive congestion control mechanism, to address its various limitations a new congestion control protocol named CoAP Congestion Control Advanced (CoCoA) is being developed. We present an analysis and evaluation of CoCoA, and based on our findings we propose and implement CoCoA 4-state-Strong, an adaptation of CoCoA that uses a 4-state estimator for variable backoffs to significantly improve throughput, even in highly lossy networks, while maintaining a higher goodput.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"OA-DVFA: A Distributed Virtual Forces-based Algorithm to monitor an area with unknown obstacles","authors":"I. Khoufi, P. Minet, A. Laouiti","doi":"10.1109/CCNC.2016.7444933","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444933","url":null,"abstract":"Deployment of sensor nodes to fully cover an area has caught the interest of many researchers. However, some simplifying assumptions are adopted such as knowledge of obstacles, centralized algorithm... To cope with these drawbacks, we propose OA-DVFA (Obstacles Avoidance Distributed Virtual Forces Algorithm) a self-deployment algorithm to ensure full area coverage and network connectivity. This fully distributed algorithm is based on virtual forces to move sensor nodes. In this paper, we show how to avoid the problem of node oscillations and to detect the end of the deployment in a distributed way. We evaluate the impact of the number, shape and position of obstacles on the coverage rate, the distance traveled by all nodes and the number of active nodes. Simulation results show the very good behavior of OA-DVFA.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Downlink resource reuse for Device-to-Device communication underlaying cellular networks using a generalized Knapsack framework","authors":"Foad Hajiaghajani, M. Rasti","doi":"10.1109/CCNC.2016.7444751","DOIUrl":"https://doi.org/10.1109/CCNC.2016.7444751","url":null,"abstract":"In this paper, we investigate the resource allocation problem to improve the performance of Device-to-Device (D2D) communications underlaying downlink cellular networks. We aim to optimize the sum-rate of D2D communications while fulfilling Quality of Service (QoS) requirements of prioritized cellular network. To achieve this, we formulate the problem as a Knapsack utility maximization problem for each cellular resource and generalize a recursive algorithm based on dynamic programming as a solution. In order to improve the spectrum utilization we exploit multiuser diversity in which, a cellular frequency resource is allowed to be shared by multiple D2D users (DUs) and a DU is allowed to reuse more than one frequency resource. The simulation results demonstrate that the proposed scheme leads to near-optimal performance on D2D sum-rate.","PeriodicalId":399247,"journal":{"name":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}