Search
Now showing items 1-10 of 44
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
Online assignment and placement of cloud task requests with heterogeneous requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Managing cloud resources in a way that reduces the consumed energy while also meeting clients demands is a challenging task. In this paper, we propose an energy-aware resource allocation framework that: i) places the ...
Interference Aware Inverse EEDBR protocol for Underwater WSNs
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The unique characteristics of Underwater Wireless Sensor Networks (UWSNs) attracted the research community to explore different aspects of these networks. Routing is one of the most important and challenging function in ...
Malicious-proof and fair credit-based resource allocation techniques for DSA systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Quality of sustainability optimization design for mobile ad hoc networks in disaster areas
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
During a disaster, communication systems are partially (or completely) interrupted with very limited resources due to infrastructures destruction and hence the lack of essential services. Meanwhile, the demand for communication ...
Efficient rule engine for smart building systems
(
IEEE Computer Society
, 2015 , Article)
In smart building systems, the automatic control of devices relies on matching the sensed environment information to customized rules. With the development of wireless sensor and actuator networks (WSANs), low-cost and ...
Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The Internet of Vehicle (IoV) network refers to networking technologies that could support highly economical and effective communication channels for interactions between vehicles. The success of IoV relies on efficient ...