Computer Science & Engineering: Recent submissions
Now showing items 1021-1040 of 2402
-
Impact of execution time on adaptive wireless video scheduling
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Adaptive wireless video scheduling has been widely studied to improve network performance. However, the majority of existing scheduling algorithms assume that they are able to converge instantaneously to adapt to a dynamic ... -
Analyzing cognitive network access efficiency under limited spectrum handoff agility
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Most existing studies on cognitive-radio networks assume that cognitive users (CUs) can switch to any available channel, regardless of the frequency gap between a target channel and the current channel. However, due to ... -
Securing vehicle-to-grid communications in the smart grid
(2013 , Article)Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ... -
Improving macrocell downlink throughput in rayleigh fading channel environment through femtocell user cooperation
(2013 , Article)This paper studies cooperative techniques that rely on femtocell user diversity to improve the downlink communication quality of macrocell users. We analytically derive and evaluate the achievable performance of these ... -
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article Review)The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ... -
Cloud-assisted mobile computing and pervasive services [Guest Editorial]
(2013 , Article)[No abstract available] -
Cooperative spectrum sharing in cognitive radio networks: A distributed matching approach
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)We study the relay-based communication schemes for cooperative spectrum sharing among multiple primary users (PUs) and multiple secondary users (SUs) with incomplete information. Inspired by the matching theory, we model ... -
Design and implementation of distributed dynamic spectrum allocation protocol
( IEEE Computer Society , 2014 , Conference Paper)In this paper, we design, implement, and evaluate a resource allocation protocol for distributed dynamic spectrum access (DSA). This protocol, based on learning techniques, enables users to locate and exploit unused spectrum ... -
Exploiting context severity to achieve opportunistic service differentiation in vehicular ad hoc networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)Wireless Access in Vehicular Environment (WAVE) dictates primitives for intelligent transportation system (ITS) applications and services. The medium access control (MAC) layer in WAVE facilitates service differentiation. ... -
Distributed resource allocation in cloud-based wireless multimedia social networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ... -
Auction-based relay power allocation: Pareto optimality, fairness, and convergence
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)It is well known that a cooperative communication technique can offer significant energy saving improvements. In particular, the efficient relay resource allocation makes energy saving practically appealing. In this work, ... -
Distributed dynamic spectrum access with adaptive power allocation: Energy efficiency and cross-layer awareness
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)This paper proposes energy and cross-layer aware resource allocation techniques that allow dynamic spectrum access users, by means of learning algorithms, to locate and exploit unused spectrum opportunities effectively. ... -
Design and implementation of credit-based resource allocation protocol for DSA systems
( IEEE Computer Society , 2014 , Conference Paper)This paper designs, implements, and evaluates an efficient dynamic spectrum access (DSA) protocol for cognitive radio networks. The proposed protocol relies on the concept of credit value to allocate resources among users ... -
An adaptive route optimization scheme for nested mobile IPv6 NEMO environment
( IEEE Computer Society , 2014 , Conference Paper)We address the route optimization problem for a nested mobile IPv6 NEtwork MObility (NEMO) environment. We propose an adaptive scheme which can optimize the routing process of the data communication, and minimize the ... -
Online multi-resource scheduling for minimum task completion time in cloud servers
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)We design a simple and efficient online scheme for scheduling cloud tasks requesting multiple resources, such as CPU and memory. The proposed scheme reduces the queuing delay of the cloud tasks by accounting for their ... -
Small data dissemination for wireless sensor networks: The security aspect
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data ... -
Green media: The future of wireless multimedia networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)By 2015, with the proliferation of wireless multimedia applications and services (e.g., mobile TV, video on demand, online video repositories, immersive video interaction, peer to peer video streaming, and interactive video ... -
Detecting the greedy spectrum occupancy threat in cognitive radio networks
( IEEE Computer Society , 2014 , Conference Paper)Recently, security of cognitive radio (CR) is becoming a severe issue. There is one kind of threat, which we call greedy spectrum occupancy threat (GSOT) in this paper, has long been ignored in previous work. In GSOT, a ... -
Enabling smart cloud services through remote sensing: An internet of everything enabler
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)The recent emergence and success of cloud-based services has empowered remote sensing and made it very possible. Cloud-assisted remote sensing (CARS) enables distributed sensory data collection, global resource and data ... -
Auditing cloud service level agreement on VM CPU speed
( IEEE Computer Society , 2014 , Conference Paper)In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...