Search
Now showing items 131-140 of 205
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
Analyzing cognitive network access efficiency under limited spectrum handoff agility
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
Most existing studies on cognitive-radio networks assume that cognitive users (CUs) can switch to any available channel, regardless of the frequency gap between a target channel and the current channel. However, due to ...
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ...
Distributed resource allocation in cloud-based wireless multimedia social networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ...
A unified approach for calculating the outage performance of two-way af relaying over fading channels
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Amplify-and-forward-based two-way relaying (TWR-AF) promises significant benefits in wireless networks. In this paper, we aim to obtain unified expressions to determine the outage probability of TWR-AF, regardless of ...
Accountable and privacy-enhanced access control in wireless sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
In general, owners and users of wireless sensor networks (WSNs) are different entities. A user may want to hide his/her data access privacy from anyone else including the network owner and, at the same time, users who ...
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference Paper)
BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ...
Improving macrocell downlink throughput in rayleigh fading channel environment through femtocell user cooperation
(2013 , Article)
This paper studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically derive and evaluate the achievable performance of these ...
A promising non-orthogonal multiple access based networking architecture: Motivation, conception, and evolution
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Since it can offer higher spectral efficiency by granting the served data to share the same spectrum resource synchronously, NOMA is considered as a bright multiple access technique for future wireless networks. Accommodating ...
A multi-parameter based vertical handover decision scheme for M2M communications in HetMANET
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The Machine-to-Machine (M2M) communication has the potential to connect millions of devices in the near future. Since they agree on this potential, several standard organizations need to focus on improved general architecture ...