College of Engineering: Recent submissions
Now showing items 3581-3600 of 8755
-
Capacity and delay analysis for data gathering with compressive sensing in wireless sensor networks
(2013 , Article)Compressive sensing (CS) provides a new paradigm for efficient data gathering in wireless sensor networks (WSNs). In this paper, with the assumption that sensor data is sparse we apply the theory of CS to data gathering ... -
Impact of location heterogeneity on random walk mobility models
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference)This paper investigates random walk mobility models with location heterogeneity, where different locations may have different neighboring regions.With the assumption of totally n locations, we consider two cases, i.e., ... -
A measurement study on the topologies of BitTorrent networks
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ... -
Resource allocation with incomplete information for QoE-driven multimedia communications
(2013 , Article)Most existing Quality of Experience (QoE)-driven multimedia resource allocation methods assume that the QoE model of each user is known to the controller before the start of the multimedia playout. However, this assumption ... -
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
Copy limited flooding over opportunistic networks
(2013 , Conference)Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ... -
Protecting private cloud located within public cloud
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Conference)Many studies use cryptographic technologies to protect sensitive data in public cloud. However, these approaches may introduce large overheads. Recently, hybrid cloud started to gain a lot of attentions. A hybrid cloud ... -
Cognitive transmission based on data priority classification in WSNs for Smart Grid
(2012 , Conference)Smart Grid integrates digital processing, sensor technology, automatic control and communication to the traditional power grid to achieve more efficient electricity distribution and management. Applying wireless sensor ... -
All-to-all throughput maximization in wireless relay networks with multiple packet reception
(2012 , Conference)Network Coding (NC) has shown the promise of significant throughput improvement to wireless networks. Meanwhile, Multiple Packet Reception (MPR) has been proved as an efficient way to combat the Multiple Access Interference ... -
Forced spectrum access termination probability analysis under restricted channel handoff
(2012 , Conference)Most existing works on cognitive radio networks assume that cognitive (or secondary) users are capable of switching/jumping to any available channel, regardless of the frequency gap between the target and the current ... -
Incentive scheduler algorithm for cooperation and coverage extension in wireless networks
( Institute of Electrical and Electronics Engineers Inc. , 2013 , Article)In this paper, we focus on wireless coverage extension and nodes' cooperation. We propose a new protocol based on an incentive approach and a scheduling algorithm to reward cooperative nodes. The cost of cooperation can ... -
A novel P2P VoD streaming technique integrating localization and congestion awareness strategies
(2012 , Conference)The concept of the "future Internet" has evolved amongst researchers recently to relieve the tremendous pressure on the current Internet infrastructure to support the heterogeneous networking technologies, mobile devices, ... -
Discovering influential users in micro-blog marketing with influence maximization mechanism
(2012 , Conference)Micro-blog marketing has become a main business model for social networks nowadays. On social networking sites (e.g., Twitter), micro-blog marketing enables the advertisers to put ads to attract customers to buy their ... -
EM-MAC: An energy-aware multi-channel MAC protocol for multi-hop wireless networks
(2012 , Conference)We propose an energy-aware MAC protocol, referred to as EM-MAC, for multi-hop wireless networks with multi-channel access capabilities. EM-MAC relies on iMAC's efficient channel selection mechanism to resolve the medium ... -
Understanding the topologies of BitTorrent networks: A measurement view
(2012 , Conference)BitTorrent (BT) is one of the most popular Peer-to-Peer (P2P) network applications. Most characteristics (except the topology) of BT network have been examined extensively by measurement approaches. In this work, we deploy ... -
Secure service provision in smart grid communications
(2012 , Article)The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ... -
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ... -
Cloud-assisted mobile computing and pervasive services [Guest Editorial]
(2013 , Article)In order to provide rich mobile pervasive services to end users, advancing mobile communication technologies and deployment of smart devices have become key issues in both industry and academia. However, the limited onboard ... -
Message from the IWCMC 2012 chairs
(2012 , Article)Presents the welcome message from the conference proceedings. -
A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques
( Elsevier B.V. , 2021 , Article)Unmanned Aerial Vehicles (UAV) have revolutionized the aircraft industry in this decade. UAVs are now capable of carrying out remote sensing, remote monitoring, courier delivery, and a lot more. A lot of research is happening ...