Computer Science & Engineering: Recent submissions
Now showing items 1061-1080 of 2402
-
Large-scale cognitive cellular systems: Resource management overview
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)This article presents recent advancements in resource management for large-scale DSA systems. Although the problem of spectrum and power allocation is well addressed in the literature, the need for more efficient algorithms ... -
Dynamic power pricing using distributed resource allocation for large-scale DSA systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)In this paper, we propose dynamic power pricing for distributed resource allocation in large-scale Dynamic Spectrum Access (DSA) systems. The dynamic power pricing is considered to influence the users' spectrum assignment ... -
Secure and distributed data discovery and dissemination in wireless sensor networks
( IEEE Computer Society , 2015 , Article)A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ... -
Software-defined networking security: Pros and cons
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ... -
An Efficient Distributed Trust Model for Wireless Sensor Networks
( IEEE Computer Society , 2015 , Article)Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ... -
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
( IEEE Computer Society , 2015 , Article)In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ... -
Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce ... -
A unified approach for calculating the outage performance of two-way af relaying over fading channels
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Amplify-and-forward-based two-way relaying (TWR-AF) promises significant benefits in wireless networks. In this paper, we aim to obtain unified expressions to determine the outage probability of TWR-AF, regardless of ... -
A near-optimal LLR based cooperative spectrum sensing scheme for CRAHNs
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)In Cognitive Radio Ad Hoc Networks (CRAHNs), cooperative spectrum sensing schemes exploit spatial diversity of the Secondary Users (SUs), to reliably detect an unoccupied licensed spectrum. Soft energy combining schemes ... -
Power allocation analysis for dynamic power utility in cognitive radio systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The focus of this paper is to investigate the fundamental limits of power allocation when taking into account a dynamic power pricing scheme. This paper proposes an optimal power allocation analysis for wireless systems ... -
A novel mechanism for restoring actor connected coverage in wireless sensor and actor networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Provisioning network survivability is especially crucial in wireless sensor and actor network (WSAN) because nodes deployed in hostile environments are prone to frequent failures. Failure of an actor significantly impact ... -
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ... -
Security and privacy in emerging networks: Part II [Guest Editorial]
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ... -
Securing cognitive radio networks against primary user emulation attacks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ... -
Energy-aware rate and description allocation optimized video streaming for mobile D2D communications
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)The proliferation problem of video streaming applications and mobile devices has prompted wireless network operators to put more efforts into improving quality of experience (QoE) while saving resources that are needed for ... -
Game theoretic data privacy preservation: Equilibrium and pricing
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Privacy issues arising in the process of collecting, publishing and mining individuals' personal data have attracted much attention in recent years. In this paper, we consider a scenario where a data collector collects ... -
Energy-Efficient Resource Allocation and Provisioning Framework for Cloud Data Centers
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Energy efficiency has recently become a major issue in large data centers due to financial and environmental concerns. This paper proposes an integrated energy-Aware resource provisioning framework for cloud data centers. ... -
Processing geo-dispersed big data in an advanced mapreduce framework
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ... -
Efficient datacenter resource utilization through cloud resource overcommitment
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)We propose an efficient resource allocation framework for overcommitted clouds that makes great energy savings by 1) minimizing PM overloads via resource usage prediction, and 2) reducing the number of active PMs via ... -
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ...