بحث بسيط
السجلات المعروضة 1 -- 10 من 323
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Stochastic learning automata-based channel selection in cognitive radio/dynamic spectrum access for WiMAX networks
(
John Wiley & Sons, Ltd.
, 2015 , Article)
This paper proposes a cognitive radio-based dynamic bandwidth allocation scheme for secondary users in a cluster-based WiMAX network. It uses a learning automata-based algorithm to find the optimal transmission channel, ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
Coalitional double auction for spatial spectrum allocation in cognitive radio networks
(
IEEE
, 2014 , Article)
Recently, many dynamic spectrum allocation schemes based on economics are proposed to improve spectrum utilization in cognitive radio networks (CRNs). However, existing mechanisms do not take into account the economic ...
Secure and efficient data transmission for cluster-based wireless sensor networks
(
IEEE
, 2014 , Article)
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission ...
Limited feedback unitary precoding for MIMO full stream transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
Limited feedback precoding (LFP) significantly improves multiple-input-multiple-output (MIMO) spatial multiplexing link reliability with a small amount of feedback from the receiver back to the transmitter. One of the key ...
Prediction-based delay optimization data collection algorithm for underwater acoustic sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The past years have seen a rapid development of autonomous underwater vehicle-aided (AUV-aided) data-gathering schemes in underwater acoustic sensor networks (UASNs). The use of AUVs efficiently reduces energy consumption ...
Design of Protograph-LDPC-Based BICM-ID for Multi-Level-Cell (MLC) NAND Flash Memory
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, the optimization of protograph-low-density parity-check (LDPC)-based bit-interleaved coded modulation with iterative detection and decoding (BICM-ID) with anti-Gray mapping is investigated over multi-level-cell ...
A Survey on Energy Harvesting and Integrated Data Sharing in Wireless Body Area Networks
(
SAGE publications
, 2015 , Article)
Wireless body area networks (WBANs) are important branches of wireless sensor networks (WSNs). They promise unobtrusive ambulatory health monitoring for real-time updates of patients' medical records that have aroused ...