Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments
|
|
- Samson Holt
- 6 years ago
- Views:
Transcription
1 Performance Tuning of Failure Detectors in Wireless Ad-Hoc Networks: Modelling and Experiments Laboratoire ID-IMAG (UMR 5132), Projet Apache. MIRRA Project: Industrial collaboration INRIA - France Télécom R&D September 2, 2005 orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 1 / 24Pr
2 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 2 / 24Pr
3 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 3 / 24Pr
4 Wireless environment Environment Wireless Devices Laptop computers, Personal digital assistants (PDAs), Mobile phones,... Wireless Ad-Hoc Network WIFI, Bluetooth,... Principle Devices share services and collaborate to maintain the community. General distributed system problem Dynamical control of the architecture. State of the system observation and distributed decision process. orine Marchand & Jean-Marc Vincent EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 4 / 24Pr
5 Wireless environment Environment Wireless Devices Laptop computers, Personal digital assistants (PDAs), Mobile phones,... Wireless Ad-Hoc Network WIFI, Bluetooth,... Principle Devices share services and collaborate to maintain the community. General distributed system problem Dynamical control of the architecture. State of the system observation and distributed decision process. orine Marchand & Jean-Marc Vincent EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 4 / 24Pr
6 Operating systems on a wireless network Dynamic Architecture Heterogeneity of devices Behavior of wireless devices connections / disconnections Behavior of wireless network Unreliability of communications Variability of latencies Solution to maintain the consistency of the community Design and adapt distributed algorithms; to make some distributed decisions. (consensus, election, atomic broadcast, group membership,...) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 5 / 24Pr
7 The Consensus Problem The impossibility of Fisher, Lynch & Paterson [Fischer-Lynch-Paterson 85] Some approaches to circumvent this impossibility result: Probabilistic algorithms [Canetti-Rabin 93] Self-Stabilizing algorithms [Tixeuil 00] An approach with partial synchrony [Dwork-Lynch-Stockmeyer 88]... The selected approach : Consensus + unreliable failure detectors [Chandra-Toueg 96] Interest: Dynamicity analysis of the environment is concentrated only inside failure detectors. Objective: Guarantee a quality of service for failure detectors. {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 6 / 24Pr
8 The Consensus Problem The impossibility of Fisher, Lynch & Paterson [Fischer-Lynch-Paterson 85] Some approaches to circumvent this impossibility result: Probabilistic algorithms [Canetti-Rabin 93] Self-Stabilizing algorithms [Tixeuil 00] An approach with partial synchrony [Dwork-Lynch-Stockmeyer 88]... The selected approach : Consensus + unreliable failure detectors [Chandra-Toueg 96] Interest: Dynamicity analysis of the environment is concentrated only inside failure detectors. Objective: Guarantee a quality of service for failure detectors. {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 6 / 24Pr
9 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 7 / 24Pr
10 Unreliable Failure Detectors Principle: For each remote device, build an estimation of the global state. Local view of the global system. List of suspected devices Properties Accuracy: a correct process should not be suspected Completeness: an incorrect process should be suspected Quality of service Quality of information and reactivity false suspicion rate = function(reactivity) Implementation - false suspicion type 1: correct process suspected - false suspicion type 2: crashed process not suspected Risk analysis {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 8 / 24Pr
11 Unreliable Failure Detectors Principle: For each remote device, build an estimation of the global state. Local view of the global system. List of suspected devices Properties Accuracy: a correct process should not be suspected Completeness: an incorrect process should be suspected Quality of service Quality of information and reactivity Implementation false suspicion rate = function(reactivity) Timeout - false suspicion type 1: correct process suspected - false suspicion type 2: crashed process not suspected Risk analysis No Suspicion Heartbeat Receipt Suspicion {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 8 / 24Pr
12 Failure Detectors Implementation Need of information on remote devices Export local data Collect and analyse data coming from remote devices Info publication Consultation Informations Export Broadcast of information by anticipation (Heartbeat mecanism) Network Interface Export module Middleware Interface MW control ( policy & parameters ) Suspicion request Information List to query List of suspects Consensus interface MW control ( policy & parameters ) Network interface Import module Middleware Interface Suspicion request Informations Import Collect information Estimate the state of remote devices Information {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), 9 / 24Pr
13 Failure Detectors Parameters The running principle: Implemented mecanism: heartbeat. FD Export Process FD sending delay Sender Device FD Import Process FD receipt delay θ θ θ θ θ Receiver Device Parameters Heartbeat sending period. Estimate function of suspicions (timeout). [Bertier-Marin-Sens 03] Goal Estimate the timeout values according to the expected quality of service. EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
14 Failure Detectors Parameters The running principle: Implemented mecanism: heartbeat. FD Export Process FD sending delay Sender Device FD Import Process FD receipt delay θ θ θ θ θ Receiver Device Parameters Heartbeat sending period. Estimate function of suspicions (timeout). [Bertier-Marin-Sens 03] Goal Estimate the timeout values according to the expected quality of service. EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
15 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
16 Statistical Description FD Export Process Network FD sending delay HB Interval (given) Network sending delay Sender Device Network FD Import Process Network receipt delay HB interval (measured) FD receipt delay Receiver Device Variability of HB arrivals λ 0 = emission beat rate X i = Heartbeat inter-arrivals. λ = 1 HB period (assumption : few losses λ = λ 0.(1 loss probability) orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
17 Statistical Description False Detection Probability θ = suspicion threshold (timeout) φ I (θ) = asymptotic false suspicion rate 1 φ I (θ) = λ lim n n nx (X i θ) + If the inter-arrivals {X i } of beats are independent and identically distributed, then : i=1 φ I (θ) = λe π [X θ] + where π is the distribution of X i. (renewal process) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR 5132), / 24Pr
18 Independent assumption Model Variable Sending Delay Hypothesis : {X i } : renewal process (iid) Model suspicion rate no information on variance Exponential φ I (θ) = e λθ low variation coefficient Erlang(k,kλ) φ I (θ) = e kλθ P k (λθ) high variation coefficient Pareto(α) φ I (θ) = 1 (1+ α 2 θ )α 2 Suspicion probability related to reactivity Erlang model: Pareto model: {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
19 Independent assumption Model Variable Sending Delay Hypothesis : {X i } : renewal process (iid) Model suspicion rate no information on variance Exponential φ I (θ) = e λθ low variation coefficient Erlang(k,kλ) φ I (θ) = e kλθ P k (λθ) high variation coefficient Pareto(α) φ I (θ) = 1 (1+ α 2 θ )α 2 Suspicion probability related to reactivity Erlang model: False suspicion rate k=1 (exponential model) Pareto model: k= σ= 3 1e 04 k=3 k=5 k=4 1e θ σ=1.1 σ= θ {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
20 Contention on receiver (1) Variability of Heartbeat Arrivals Depends on the type of receiver (Laptop or PDA) + Correlation between inter-beats arrival periods Network FD Import Process variability of delivery Receiver Device HB contention on the receiver Heart beats Network Buffer Service Failure detector input process : {A n} n N service model : {S n} n N Delivery to upper layer GI/M/1 queue hypothesis : deterministic arrivals {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
21 Contention on receiver (2) Output process of a D/M/1 queue Suspicion rate computation Inter-output period : A = 1 λ ; β unique solution of β = L A(µ(1 β)) = e Aµ(1 β) f Z (x) = ( µ Rate of false suspicion : θ > A φ I (θ) = 2 β e µ(1 β)a ((1 β)e µ(1 β)x + e µx ) if x < A; µ 2 β e µx (e µ(1 β)a + (1 β)e µa ) if x A. 1 A(2 β)µ e µθ (e µ(1 β)a + (1 β)e µa ) θ A False suspicion probability, D/M/1 model {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
22 Contention on receiver (2) Output process of a D/M/1 queue Suspicion rate computation Inter-output period : A = 1 λ ; β unique solution of β = L A(µ(1 β)) = e Aµ(1 β) f Z (x) = ( µ Rate of false suspicion : θ > A φ I (θ) = 2 β e µ(1 β)a ((1 β)e µ(1 β)x + e µx ) if x < A; µ 2 β e µx (e µ(1 β)a + (1 β)e µa ) if x A. 1 A(2 β)µ e µθ (e µ(1 β)a + (1 β)e µa ) θ A False suspicion probability, D/M/1 model 10 False probability suspicion False probability suspicion µ=2 1 1e 05 µ= e e 15 1e 04 1e 20 1e 05 1e 25 1e 06 1e 30 A=1 A=1 1e 07 1e 35 θ θ {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
23 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
24 Experimental environment Experimental Design: Devices (same OS, Java): Architecture 1 : 4 devices (2 Laptops + 2 PDAs) Architecture 2 : 6 devices (2 Laptops + 3 PDAs + 1 sensor Interconnection : b ad-hoc network Experimental duration: 15 min ( about 10,000 measurements) HB parameter Settings: Architecture 1 Architecture 2 Architecture 2 Highly loaded Ideal Setting Perturbed Environment HB emission period 100 ms 500 ms 500 ms Timeout none none none Reception process analysis Density of the delivery process timeout tuning {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
25 Experimental environment Experimental Design: Devices (same OS, Java): Architecture 1 : 4 devices (2 Laptops + 2 PDAs) Architecture 2 : 6 devices (2 Laptops + 3 PDAs + 1 sensor Interconnection : b ad-hoc network Experimental duration: 15 min ( about 10,000 measurements) HB parameter Settings: Architecture 1 Architecture 2 Architecture 2 Highly loaded Ideal Setting Perturbed Environment HB emission period 100 ms 500 ms 500 ms Timeout none none none Reception process analysis Density of the delivery process timeout tuning {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
26 Highly loaded system Distribution of the update times: 0.01 sender: PDA1 - receiver: PDA sender: PDA1 - receiver: laptop Probability Probability Times between 2 heartbeat receipts sender: laptop1 - receiver: PDA Times between 2 heartbeat receipts Probability Probability Times between 2 heartbeat receipts 0.08 sender: laptop1 - receiver: laptop Times between 2 heartbeat receipts If timeout value = 200 ms Quality of service highly depends on the type of the receiver orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
27 Highly loaded system Distribution of the update times: 0.01 sender: PDA1 - receiver: PDA sender: PDA1 - receiver: laptop Probability Probability Times between 2 heartbeat receipts sender: laptop1 - receiver: PDA Times between 2 heartbeat receipts Probability Probability Times between 2 heartbeat receipts 0.08 sender: laptop1 - receiver: laptop Times between 2 heartbeat receipts If timeout value = 200 ms Quality of service highly depends on the type of the receiver orine Marchand & Jean-Marc Vincent {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
28 Ideal Setting Experimentation Heartbeat Reception Analysis: 0.14 sender: laptop1 receiver: laptop2 sender: laptop1 receiver: pda2 sender: pda1 receiver: laptop sender: pda1 receiver: pda2 Probability Elapsed times between 2 receipts Timeout value: If the timeout value = 2 (HB period time) Then, the suspicion rate is around 10 3 if the receiver is a laptop 10 2 if the receiver is a PDA {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
29 Ideal Setting Experimentation Heartbeat Reception Analysis: 0.14 sender: laptop1 receiver: laptop2 sender: laptop1 receiver: pda2 sender: pda1 receiver: laptop sender: pda1 receiver: pda2 Probability Elapsed times between 2 receipts Timeout value: If the timeout value = 2 (HB period time) Then, the suspicion rate is around 10 3 if the receiver is a laptop 10 2 if the receiver is a PDA {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
30 Experimentation in perturbed environment Perturbation control : An external device is used to generate an external load (ping with 200kbytes/s) Heartbeat Reception Analysis: sender: Laptop1 receiver: Laptop2 sender: Laptop1 receiver: PDA2 sender: PDA1 receiver: Laptop2 sender: PDA1 receiver: PDA2 Probability Elapsed Times between 2 heartbeat receipts Results: Long non receiving period for PDA Some very small delays between HB receipts (after a long waiting time) Correlation between succesive waiting times of two HB (bursty receptions) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
31 Experimentation in perturbed environment Perturbation control : An external device is used to generate an external load (ping with 200kbytes/s) Heartbeat Reception Analysis: sender: Laptop1 receiver: Laptop2 sender: Laptop1 receiver: PDA2 sender: PDA1 receiver: Laptop2 sender: PDA1 receiver: PDA2 Probability Elapsed Times between 2 heartbeat receipts Results: Long non receiving period for PDA Some very small delays between HB receipts (after a long waiting time) Correlation between succesive waiting times of two HB (bursty receptions) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
32 Outline 1 Wireless environment Wireless environment Distributed systems on a wireless network The Consensus Problem 2 Quality of Service of Failure Detectors Theoretical Concept Failure Detectors Implementation Quality of Service 3 Stochastic Models Statistical Description Independent assumption Model Contention on receiver 4 Experimentation Experimental environment Saturation Ideal Setting Experimentation Experimentation in perturbed environment 5 Conclusion and future works {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
33 Conclusion Modelling Models for systems in stationary regime Contention on receivers Analytical formula Architecture Identification of FD QoS Experimental protocol Implementation in a distributed Middleware (Sidrah) {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
34 Future works Modelling Non-stationary analysis : auto-regressive models Environment evolution model Application model : network sniffing Architecture Scaling the system : routing (dynamic graph model) Multilevel observation environment Dynamic control : contention prevention {Corine.Marchand,Jean-Marc.Vincent}@imag.fr EPEW - September 2005 ( Laboratoire September ID-IMAG 2, 2005 (UMR ), / 24Pr
An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction
Regular Paper Journal of Computing Science and Engineering, Vol. 8, No., March 204, pp. 7-24 An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction Zhiyong Yang*,
More informationThe ϕ Accrual Failure Detector
The ϕ Accrual Failure Detector Naohiro Hayashibara, Xavier Défago (contact), Rami Yared and Takuya Katayama School of Information Science Japan Advanced Institute of Science and Technology (JAIST) 1-1
More informationAN ADAPTIVE FAILURE DETECTION APPROACH FOR REAL-TIME DISTRIBUTED CONTROL SYSTEMS OVER SHARED ETHERNET
AN ADAPTIVE FAILURE DETECTION APPROACH FOR REAL-TIME DISTRIBUTED CONTROL SYSTEMS OVER SHARED ETHERNET Alírio dos Santos Sá and Raimundo José de Araújo Macêdo Pos-Graduation Program on Mechatronics 1 -
More informationHow user throughput depends on the traffic demand in large cellular networks
How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial
More informationMining for Statistical Models of Availability in Large-Scale Distributed Systems: An Empirical Study of
Mining for Statistical Models of Availability in Large-Scale Distributed Systems: An Empirical Study of SETI@home Bahman Javadi 1, Derrick Kondo 1, Jean-Marc Vincent 1,2, David P. Anderson 3 1 Laboratoire
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationEE 791 EEG-5 Measures of EEG Dynamic Properties
EE 791 EEG-5 Measures of EEG Dynamic Properties Computer analysis of EEG EEG scientists must be especially wary of mathematics in search of applications after all the number of ways to transform data is
More informationExperimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks
Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John Heidemann Presented by Alexander Lash CS525M Introduction
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationWireless communications: from simple stochastic geometry models to practice III Capacity
Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationBandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation
Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New
More informationSome results on optimal estimation and control for lossy NCS. Luca Schenato
Some results on optimal estimation and control for lossy NCS Luca Schenato Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures: adaptive space telescope Wireless Sensor Networks
More informationLecture 8: Frequency Reuse Concepts
EE 499: Wireless & Mobile ommunications (082) Lecture 8: Frequency Reuse oncepts Dr. Wajih. bu-l-saud Trunking and Grade of Service (GoS) Trunking is the concept that allows large number of users to use
More informationPanda: Neighbor Discovery on a Power Harvesting Budget. Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman
Panda: Neighbor Discovery on a Power Harvesting Budget Robert Margolies, Guy Grebla, Tingjun Chen, Dan Rubenstein, Gil Zussman The Internet of Tags Small energetically self-reliant tags Enabling technologies
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationReal Time User-Centric Energy Efficient Scheduling In Embedded Systems
Real Time User-Centric Energy Efficient Scheduling In Embedded Systems N.SREEVALLI, PG Student in Embedded System, ECE Under the Guidance of Mr.D.SRIHARI NAIDU, SIDDARTHA EDUCATIONAL ACADEMY GROUP OF INSTITUTIONS,
More information2 Polling. Politecnico di Milano Facoltà di Ingegneria dell Informazione
Politecnico di Milano Facoltà di Ingegneria dell Informazione Polling Multiple Access in Wireless Networks: Models and echnologies Prof. Antonio Capone Assumptions and notation o In the following we drop
More informationClosing the loop around Sensor Networks
Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley Chess Review May 11, 2005 Berkeley, CA Conceptual Issues Given a certain wireless sensor
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationCircuit Switching: Traffic Engineering References Chapter 1, Telecommunication System Engineering, Roger L. Freeman, Wiley. J.1
Circuit Switching: Traffic Engineering References Chapter 1, Telecommunication System Engineering, Roger L. Freeman, Wiley. J.1 Introduction Example: mesh connection (full mesh) for an eight-subscriber
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationRetransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks
Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian Electrical and
More informationRECOMMENDATION ITU-R P The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands
Rec. ITU-R P.1816 1 RECOMMENDATION ITU-R P.1816 The prediction of the time and the spatial profile for broadband land mobile services using UHF and SHF bands (Question ITU-R 211/3) (2007) Scope The purpose
More informationTRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS
TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS Juan Carlos García, Mari-Carmen Bañuls, Pablo Galdámez and Rubén Quintero Instituto Tecnológico de Informática, Universidad
More informationRanging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system
Ranging detection algorithm for indoor UWB channels and research activities relating to a UWB-RFID localization system Dr Choi Look LAW Founding Director Positioning and Wireless Technology Centre School
More informationUnderstanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks
Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2
More informationLocalization in Wireless Sensor Networks
Localization in Wireless Sensor Networks Part 2: Localization techniques Department of Informatics University of Oslo Cyber Physical Systems, 11.10.2011 Localization problem in WSN In a localization problem
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationRandomized Channel Access Reduces Network Local Delay
Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement
More informationEstimating the Transmission Probability in Wireless Networks with Configuration Models
Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)
More informationOn Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011
On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background
More informationNETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct.
NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. 2011 Outline 2 Introduction Energy Saving at the Network Level The
More informationDepartment of Statistics and Operations Research Undergraduate Programmes
Department of Statistics and Operations Research Undergraduate Programmes OPERATIONS RESEARCH YEAR LEVEL 2 INTRODUCTION TO LINEAR PROGRAMMING SSOA021 Linear Programming Model: Formulation of an LP model;
More informationImproved Directional Perturbation Algorithm for Collaborative Beamforming
American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationResearch Article Implementing Statistical Multiplexing in DVB-H
Hindawi Publishing Corporation International Journal of Digital Multimedia Broadcasting Volume 29, Article ID 261231, 15 pages doi:1.1155/29/261231 Research Article Implementing Statistical Multiplexing
More informationService Appointment Scheduling with Walk-In, Short-term, and Traditional Scheduling
Service Appointment Scheduling with Walk-In, Short-term, and Traditional Scheduling 1 Decision Sciences Institute Annual Meeting New Orleans November 16, 2009 Dr. Linda R. LaGanga Director of Quality Systems
More informationROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724
ROUTING PROTOCOLS Dr. Ahmed Khattab EECE Department Cairo University Fall 2012 ELC 659/ELC724 Dr. Ahmed Khattab Fall 2012 2 Routing Network-wide process the determine the end to end paths that packets
More informationMeasurement Driven Deployment of a Two-Tier Urban Mesh Access Network
Measurement Driven Deployment of a Two-Tier Urban Mesh Access Network J. Camp, J. Robinson, C. Steger, E. Knightly Rice Networks Group MobiSys 2006 6/20/06 Two-Tier Mesh Architecture Limited Gateway Nodes
More informationCapacity and Interference modeling of CSMA/CA networks using SSI point processes
Capacity and Interference modeling of CSMA/CA networks using SSI point processes Anthony Busson and Guillaume Chelius University Paris-Sud 11 Centre Scientifique d Orsay 9145 Orsay Cedex, France anthony.busson@u-psud.fr
More informationIntroduction to Phase Noise
hapter Introduction to Phase Noise brief introduction into the subject of phase noise is given here. We first describe the conversion of the phase fluctuations into the noise sideband of the carrier. We
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationApplications of Monte Carlo Methods in Charged Particles Optics
Sydney 13-17 February 2012 p. 1/3 Applications of Monte Carlo Methods in Charged Particles Optics Alla Shymanska alla.shymanska@aut.ac.nz School of Computing and Mathematical Sciences Auckland University
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationRevisiting Neighbor Discovery with Interferences Consideration
Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor
More information2.6.1: Program Outcomes
2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,
More informationResource Allocation Challenges in Future Wireless Networks
Resource Allocation Challenges in Future Wireless Networks Mohamad Assaad Dept of Telecommunications, Supelec - France Mar. 2014 Outline 1 General Introduction 2 Fully Decentralized Allocation 3 Future
More informationPhase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks
Phase Transition of Message Propagation Speed in Delay Tolerant Vehicular Networks A. Agarwal, D. Starobinski, and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston,
More informationExact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay
Exact statistics of ARQ packet delivery delay over Markov channels with finite round-trip delay Michele Rossi, Leonardo Badia, Michele Zorzi Dipartimento di Ingegneria, Università di Ferrara via Saragat,
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More information4.5. Latency in milliseconds Number of Shutdowns
Latency Effects of System Level Power Management Algorithms Λ Dinesh Ramanathan Sandy Irani Rajesh Gupta Department of Information and Computer Science University of California Irvine, CA 92697 fdinesh,irani,rguptag@ics.uci.edu
More informationImproving Reinforcement Learning Algorithms for Dynamic Spectrum Allocation in Cognitive Sensor Networks
Improving Reinforcement Learning Algorithms for Dynamic Spectrum Allocation in Cognitive Sensor Networks Wireless Communications and Networking Conference Leonardo Faganello, Rafael Kunst, Cristiano Both,
More informationPerformance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks
Proceedings of the World Congress on Engineering 2 Vol II WCE 2, July 6-8, 2, London, U.K. Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks Yun Won Chung Abstract Energy
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationConvergence of Desynchronization Primitives in Wireless Sensor Networks: A Stochastic Modeling Approach
1 Convergence of Desynchronization Primitives in ireless Sensor Networks: A Stochastic Modeling Approach Dujdow Buranapanichkit, Nikos Deligiannis, Member, IEEE, and Yiannis Andreopoulos, Senior Member,
More informationPower Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks
Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Dapeng Wu Rohit Negi Abstract Providing Quality of Service(QoS) guarantees is important in the third generation (3G)
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)
More informationNoncoherent Communications with Large Antenna Arrays
Noncoherent Communications with Large Antenna Arrays Mainak Chowdhury Joint work with: Alexandros Manolakos, Andrea Goldsmith, Felipe Gomez-Cuba and Elza Erkip Stanford University September 29, 2016 Wireless
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationDownlink Scheduler Optimization in High-Speed Downlink Packet Access Networks
Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationChapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks
Chapter Number Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Thakshila Wimalajeewa 1, Sudharman K. Jayaweera 1 and Carlos Mosquera 2 1 Dept. of Electrical and Computer
More informationCS649 Sensor Networks IP Lecture 9: Synchronization
CS649 Sensor Networks IP Lecture 9: Synchronization I-Jeng Wang http://hinrg.cs.jhu.edu/wsn06/ Spring 2006 CS 649 1 Outline Description of the problem: axes, shortcomings Reference-Broadcast Synchronization
More informationFourier Analysis and Change Detection. Dynamic Network Analysis
Fourier Analysis and Change Detection Prof. L. Richard Carley carley@ece.cmu.edu 1 Dynamic Network Analysis Key focus Networks change over time Summary statistics typically average all data Useless for
More informationExploring Pedestrian Bluetooth and WiFi Detection at Public Transportation Terminals
Exploring Pedestrian Bluetooth and WiFi Detection at Public Transportation Terminals Neveen Shlayan 1, Abdullah Kurkcu 2, and Kaan Ozbay 3 November 1, 2016 1 Assistant Professor, Department of Electrical
More informationOpportunistic cooperation in wireless ad hoc networks with interference correlation
Noname manuscript No. (will be inserted by the editor) Opportunistic cooperation in wireless ad hoc networks with interference correlation Yong Zhou Weihua Zhuang Received: date / Accepted: date Abstract
More informationLEARNING BASED HYPERBOLIC POSITION BOUNDING IN WIRELESS NETWORKS
LEARNING BASED HYPERBOLIC POSITION BOUNDING IN WIRELESS NETWORKS by Eldai El Sayr A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree
More informationAntennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO
Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and
More informationECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 3 Today: (2) Trunking Reading: Today: 4.2.2. Thu: Rap 3.7.2 (pdf on Canvas). 1 Trunking Trunking refers to sharing few channels
More informationChannel. Muhammad Ali Jinnah University, Islamabad Campus, Pakistan. Multi-Path Fading. Dr. Noor M Khan EE, MAJU
Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9
More informationWireless Internet Routing. IEEE s
Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:
More informationSingle channel noise reduction
Single channel noise reduction Basics and processing used for ETSI STF 94 ETSI Workshop on Speech and Noise in Wideband Communication Claude Marro France Telecom ETSI 007. All rights reserved Outline Scope
More informationCORRELATION BASED CLASSIFICATION OF COMPLEX PRI MODULATION TYPES
CORRELATION BASED CLASSIFICATION OF COMPLEX PRI MODULATION TYPES Fotios Katsilieris, Sabine Apfeld, Alexander Charlish Sensor Data and Information Fusion Fraunhofer Institute for Communication, Information
More informationMulti-Path Fading Channel
Instructor: Prof. Dr. Noor M. Khan Department of Electronic Engineering, Muhammad Ali Jinnah University, Islamabad Campus, Islamabad, PAKISTAN Ph: +9 (51) 111-878787, Ext. 19 (Office), 186 (Lab) Fax: +9
More informationSIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL
SIGNAL DETECTION IN NON-GAUSSIAN NOISE BY A KURTOSIS-BASED PROBABILITY DENSITY FUNCTION MODEL A. Tesei, and C.S. Regazzoni Department of Biophysical and Electronic Engineering (DIBE), University of Genoa
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationMAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN
MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN Gayatri Sakya Department of Electronics and Communication Engineering JSS Academy of Technical Education,
More informationThe fundamentals of detection theory
Advanced Signal Processing: The fundamentals of detection theory Side 1 of 18 Index of contents: Advanced Signal Processing: The fundamentals of detection theory... 3 1 Problem Statements... 3 2 Detection
More informationPropagation Channels. Chapter Path Loss
Chapter 9 Propagation Channels The transmit and receive antennas in the systems we have analyzed in earlier chapters have been in free space with no other objects present. In a practical communication
More informationProbabilistic Coverage in Wireless Sensor Networks
Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS
ADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS Daniel Alonso-Román and Baltasar Beferull-Lozano Department of Information and Communication Technologies University of Agder,
More informationOptimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer
Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-
More informationOpportunistic Scheduling: Generalizations to. Include Multiple Constraints, Multiple Interfaces,
Opportunistic Scheduling: Generalizations to Include Multiple Constraints, Multiple Interfaces, and Short Term Fairness Sunil Suresh Kulkarni, Catherine Rosenberg School of Electrical and Computer Engineering
More informationOutline for this presentation. Introduction I -- background. Introduction I Background
Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study Sixing Yin, Dawei Chen, Qian Zhang, Mingyan Liu, Shufang Li Outline for this presentation! Introduction! Methodology! Statistic and
More informationNext Generation of Adaptive Traffic Signal Control
Next Generation of Adaptive Traffic Signal Control Pitu Mirchandani ATLAS Research Laboratory Arizona State University NSF Workshop Rutgers, New Brunswick, NJ June 7, 2010 Acknowledgements: FHWA, ADOT,
More informationA. Siffer, P-A Fouque, A. Termier and C. Largouet April 26, 2017
A. Siffer, P-A Fouque, A. Termier and C. Largouet April 26, 2017 Context Providing better thresholds Finding anomalies in streams Application to intrusion detection A more general framework 1 Massive
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationRECENTLY, with the rapid proliferation of portable devices
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 62, NO. 9, NOVEMBER 2013 4629 On Exploiting Contact Patterns for Data Forwarding in Duty-Cycle Opportunistic Mobile Networks Huan Zhou, Jiming Chen, Senior
More informationSUPPLEMENT TO THE PAPER TESTING EQUALITY OF SPECTRAL DENSITIES USING RANDOMIZATION TECHNIQUES
SUPPLEMENT TO THE PAPER TESTING EQUALITY OF SPECTRAL DENSITIES USING RANDOMIZATION TECHNIQUES CARSTEN JENTSCH AND MARKUS PAULY Abstract. In this supplementary material we provide additional supporting
More informationLow-Cost Localization of Mobile Robots Through Probabilistic Sensor Fusion
Low-Cost Localization of Mobile Robots Through Probabilistic Sensor Fusion Brian Chung December, Abstract Efforts to achieve mobile robotic localization have relied on probabilistic techniques such as
More informationSensitivity study for the optimization of the viewing chord arrangement of the ITER poloidal polarimeter
P8-29 6th International Toki Conference, December 5-8, 26 Sensitivity study for the optimization of the viewing chord arrangement of the ITER poloidal polarimeter T. Yamaguchi, Y. Kawano and Y. Kusama
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationPERFORMANCE ANALYSIS OF THE SLEEP/WAKEUP PROTOCOL IN A WIRELESS SENSOR NETWORK. Received October 2010; revised March 2011
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 5(B), May 2012 pp. 3833 3844 PERFORMANCE ANALYSIS OF THE SLEEP/WAKEUP PROTOCOL
More informationQ-Learning Algorithms for Constrained Markov Decision Processes with Randomized Monotone Policies: Application to MIMO Transmission Control
Q-Learning Algorithms for Constrained Markov Decision Processes with Randomized Monotone Policies: Application to MIMO Transmission Control Dejan V. Djonin, Vikram Krishnamurthy, Fellow, IEEE Abstract
More information