当前期刊: arXiv - CS - Networking and Internet Architecture Go to current issue    加入关注   
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Methods and Techniques for Dynamic Deployability of Software-Defined Security Services
    arXiv.cs.NI Pub Date : 2020-04-04
    Roberto Doriguzzi-Corin

    With the recent trend of "network softwarisation", enabled by emerging technologies such as Software-Defined Networking (SDN) and Network Function Virtualisation (NFV), system administrators of data centres and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts. This radical change has facilitated the provisioning

    更新日期:2020-04-08
  • 5G Radio Access Network Architecture for Terrestrial Broadcast Services
    arXiv.cs.NI Pub Date : 2020-04-07
    Mikko Säily; Carlos Barjau Estevan; Jordi Joan Gimenez; Fasil Tesema; Wei Guo; David Gomez-Barquero; De Mi

    The 3rd Generation Partnership Project (3GPP) has defined based on the Long Term Evolution (LTE) enhanced Multicast Broadcast Multimedia Service (eMBMS) a set of new features to support the distribution of Terrestrial Broadcast services in Release 14. On the other hand, a new 5th Generation (5G) system architecture and radio access technology, 5G New Radio (NR), are being standardised from Release

    更新日期:2020-04-08
  • First Experiments with a 5G-Connected Drone
    arXiv.cs.NI Pub Date : 2020-04-07
    Raheeb Muzaffar; Christian Raffelsberger; Aymen Fakhreddine; José López Luque; Driton Emini; Christian Bettstetter

    We perform experiments on the wireless communication between a drone flying at different heights and a commercial 5G base station. An Android-based tool deployed on a 5G test platform is used to record radio link parameters in the up- and downlink. In the downlink, measurements show a throughput of 600 Mbit/s on average with peaks above 700 Mbit/s. The uplink has a much lower throughput, comparable

    更新日期:2020-04-08
  • DiagNet: towards a generic, Internet-scale root cause analysis solution
    arXiv.cs.NI Pub Date : 2020-04-07
    Loïck BonniotWIDE; Christoph NeumannWIDE; François TaïaniWIDE

    Diagnosing problems in Internet-scale services remains particularly difficult and costly for both content providers and ISPs. Because the Internet is decentralized, the cause of such problems might lie anywhere between an end-user's device and the service datacenters. Further, the set of possible problems and causes is not known in advance, making it impossible in practice to train a classifier with

    更新日期:2020-04-08
  • CellOS: Zero-touch Softwarized Open Cellular Networks
    arXiv.cs.NI Pub Date : 2020-04-07
    Leonardo Bonati; Salvatore D'Oro; Lorenzo Bertizzolo; Emrecan Demirors; Zhangyu Guan; Stefano Basagni; Tommaso Melodia

    Operational cellular networks rely on closed and inflexible infrastructure tightly controlled by a handful of vendors. As a consequence, configuration requires vendor support and lengthy manual operations, which prevent Telco Operators (TOs) from unlocking the full network potential and from being able to perform fine grained performance optimization, especially on a per-user basis. To address this

    更新日期:2020-04-08
  • Link-Layer Rate of NOMA with Finite Blocklength for Low-Latency Communications
    arXiv.cs.NI Pub Date : 2020-04-07
    Muhammad Amjad; Leila Musavian; Sonia Aïssa

    Non-orthogonal multiple access (NOMA) in conjunction with finite blocklength (short packet) communications is regarded as an enabler for ultra-reliable and low-latency communications (URLLC). In this paper, we investigate the link-layer rate, i.e., the effective capacity, of a two-user NOMA in finite blocklength regime. The delay performance of the NOMA users is analyzed by taking into consideration

    更新日期:2020-04-08
  • Shortest Path Distance in Manhattan Poisson Line Cox Process
    arXiv.cs.NI Pub Date : 2018-11-28
    Vishnu Vardhan Chetlur; Harpreet S. Dhillon; Carl P. Dettmann

    While the Euclidean distance characteristics of the Poisson line Cox process (PLCP) have been investigated in the literature, the analytical characterization of the path distances is still an open problem. In this paper, we characterize the length of the shortest path between the typical point and its nearest neighbor in the sense of path distance in a stationary Manhattan Poisson line Cox process

    更新日期:2020-04-08
  • Repeatedly Energy-Efficient and Fair Service Coverage: UAV Slicing
    arXiv.cs.NI Pub Date : 2019-12-08
    Peng Yang; Xing Xi; Tony Q S Quek; Jingxuan Chen; Xianbin Cao; Dapeng Wu

    Unmanned aerial vehicle (UAV) networks are convinced as a significant part of 5G and emerging 6G wireless networks. UAV slicing is a promising proposal of converging different services onto a common UAV network without deploying individual network solution for each type of service. This paper is concerned with UAV slicing for providing energy-efficient and fair service coverage for enhanced mobile

    更新日期:2020-04-08
  • RACE: Reinforced Cooperative Autonomous Vehicle Collision AvoidancE
    arXiv.cs.NI Pub Date : 2020-04-02
    Yali Yuan; Robert Tasik; Sripriya Srikant Adhatarao; Yachao Yuan; Zheli Liu; Xiaoming Fu

    With the rapid development of autonomous driving, collision avoidance has attracted attention from both academia and industry. Many collision avoidance strategies have emerged in recent years, but the dynamic and complex nature of driving environment poses a challenge to develop robust collision avoidance algorithms. Therefore, in this paper, we propose a decentralized framework named RACE: Reinforced

    更新日期:2020-04-06
  • Data-Driven Path Selection for Real-Time Video Streaming at the Network Edge
    arXiv.cs.NI Pub Date : 2020-04-02
    Sabur Baidya; Peyman Tehrani; Marco Levorato

    In this paper, we present a framework for the dynamic selection of the wireless channels used to deliver information-rich data streams to edge servers. The approach we propose is data-driven, where a predictor, whose output informs the decision making of the channel selector, is built from available data on the transformation imposed by the network on previously transmitted packets. The proposed technique

    更新日期:2020-04-06
  • On the Path to High Precise IP Geolocation: A Self-Optimizing Model
    arXiv.cs.NI Pub Date : 2020-04-03
    Peter Hillmann; Lars Stiemert; Gabi Dreo; Oliver Rose

    IP Geolocation is a key enabler for the Future Internet to provide geographical location information for application services. For example, this data is used by Content Delivery Networks to assign users to mirror servers, which are close by, hence providing enhanced traffic management. It is still a challenging task to obtain precise and stable location information, whereas proper results are only

    更新日期:2020-04-06
  • Campus Wi-Fi Coverage Mapping and Analysis
    arXiv.cs.NI Pub Date : 2020-04-03
    Farhana Binte Kamrul Easha; Robert Abbas; Matthew Daley

    Wireless Local Area Networks (WLANs), known as Wi-Fi, have become an essential service in university environments that helps staff, students and guests to access connectivity to the Internet from their mobile devices. Apart from the Internet being a learning resource, students also submit their assignments online using web portals. Most campuses will have poor coverage areas for mobile networks and

    更新日期:2020-04-06
  • Intelligent Reflecting Surface (IRS)-Enabled Covert Communications in Wireless Networks
    arXiv.cs.NI Pub Date : 2019-11-03
    Xiao Lu; Ekram Hossain; Tania Shafique; Shaohan Feng; Hai Jiang; Dusit Niyato

    With growing security threats to the evolving wireless systems, protecting user privacy becomes progressively challenging. Even if the transmitted information is encrypted and the potential wiretap channel is physically limited (e.g. through information-theoretic security approaches), the raw data itself, such as transmitter position and transmission pattern, could expose confidential information.

    更新日期:2020-04-06
  • Network Orchestration in Mobile Networks via a Synergy of Model-driven and AI-based Techniques
    arXiv.cs.NI Pub Date : 2020-04-01
    Yantong Wang; Vasilis Friderikos

    As data traffic volume continues to increase, caching of popular content at strategic network locations closer to the end user can enhance not only user experience but ease the utilization of highly congested links in the network. A key challenge in the area of proactive caching is finding the optimal locations to host the popular content items under various optimization criteria. These problems are

    更新日期:2020-04-03
  • A Primer on Bandwidth Parts in 5G New Radio
    arXiv.cs.NI Pub Date : 2020-04-02
    Xingqin Lin; Dongsheng Yu; Henning Wiemann

    The fifth generation (5G) wireless access technology, known as New Radio (NR), features flexibility to support a variety of usage scenarios. One of the basic concepts in 5G NR is bandwidth part (BWP), which is, at a high level, a set of contiguous resource blocks configured inside a channel bandwidth. BWP spans across many 5G NR specifications developed by the 3rd Generation Partnership Project. Understanding

    更新日期:2020-04-03
  • Cocktail: Cost-efficient and Data Skew-aware Online In-Network Distributed Machine Learning for Intelligent 5G and Beyond
    arXiv.cs.NI Pub Date : 2020-04-02
    Lingjun Pu; Xu Chen; Ruilin Yun; Xinjing Yuan; Pan Zhou; Jingdong Xu

    To facilitate the emerging applications in the 5G networks and beyond, mobile network operators will provide many powerful control functionalities such as RAN slicing and resource scheduling. These control functionalities generally comprise a series of prediction tasks such as channel state information prediction, cellular traffic prediction and user mobility prediction which will be enabled by machine

    更新日期:2020-04-03
  • Efficient Online Classification and Tracking on Resource-constrained IoT Devices
    arXiv.cs.NI Pub Date : 2020-04-02
    Muhammad Aftab; Sid Chi-Kin Chau; Prashant Shenoy

    Timely processing has been increasingly required on smart IoT devices, which leads to directly implementing information processing tasks on an IoT device for bandwidth savings and privacy assurance. Particularly, monitoring and tracking the observed signals in continuous form are common tasks for a variety of near real-time processing IoT devices, such as in smart homes, body-area and environmental

    更新日期:2020-04-03
  • Adversarial Reinforcement Learning-based Robust Access Point Coordination Against Uncoordinated Interference
    arXiv.cs.NI Pub Date : 2020-04-02
    Yuto Kihira; Yusuke Koda; Koji Yamamoto; Takayuki Nishio; Masahiro Morikura

    This paper proposes a robust adversarial reinforcement learning (RARL)-based multi-access point (AP) coordination method that is robust even against unexpected decentralized operations of uncoordinated APs. Multi-AP coordination is a promising technique towards IEEE 802.11be, and there are studies that use RL for multi-AP coordination. Indeed, a simple RL-based multi-AP coordination method diminishes

    更新日期:2020-04-03
  • IoT-Flock: An Open-source Framework for IoT Traffic Generation
    arXiv.cs.NI Pub Date : 2020-04-02
    Syed Ghazanfar; Faisal Hussain; Atiq Ur Rehman; Ubaid U. Fayyaz; Farrukh Shahzad; Ghalib A. Shah

    Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used

    更新日期:2020-04-03
  • Caching as an Image Characterization Problem using Deep Convolutional Neural Networks
    arXiv.cs.NI Pub Date : 2019-07-16
    Yantong Wang; Vasilis Friderikos

    Caching of popular content closer to the mobile user can significantly increase overall user experience as well as network efficiency by decongesting backbone network segments in the case of congestion episodes. In order to find the optimal caching locations, many conventional approaches rely on solving a complex optimization problem that suffers from the curse of dimensionality, which may fail to

    更新日期:2020-04-03
  • Optimal Number of Cluster Heads in Wireless Sensors Networks Based on LEACH
    arXiv.cs.NI Pub Date : 2020-03-10
    Ghassan Samara; Munir Al-okour

    The Wireless Sensor Network (WSN) has been one of the leading research fields of wireless networks, particularly in recent year. Sensors are randomly positioned in the region, every node senses the surroundings and sends the data collected to the cluster head (CH), which aggregates and transmits obtained information to the Base Station (BS). A non-rechargeable battery is included on each WSN node.

    更新日期:2020-04-01
  • Representing Realistic Human Driver Behaviors using a Finite Size Gaussian Process Kernel Bank
    arXiv.cs.NI Pub Date : 2020-03-30
    Hossein Nourkhiz Mahjoub; Arash Raftari; Rodolfo Valiente; Yaser P. Fallah; Syed K. Mahmud

    The performance of cooperative vehicular applications is tightly dependent on the reliability of the underneath Vehicle-to-Everything (V2X) communication technology. V2X standards, such as Dedicated Short-Range Communications (DSRC) and Cellular-V2X (C-V2X), which are passing their research phase before being mandated in the US, are supposed to serve as reliable circulatory systems for the time-critical

    更新日期:2020-04-01
  • Indoor Distance Estimation using LSTMs over WLAN Network
    arXiv.cs.NI Pub Date : 2020-03-31
    Pranav Sankhe; Saqib Azim; Sachin Goyal; Tanya Choudhary; Kumar Appaiah; Sukumar Srikant

    The Global Navigation Satellite Systems (GNSS) like GPS suffer from accuracy degradation and are almost unavailable in indoor environments. Indoor positioning systems (IPS) based on WiFi signals have been gaining popularity. However, owing to the strong spatial and temporal variations of wireless communication channels in the indoor environment, the achieved accuracy of existing IPS is around several

    更新日期:2020-04-01
  • Topological optimization of hybrid quantum key distribution networks
    arXiv.cs.NI Pub Date : 2020-03-31
    Ya-Xing Wang; Qiong Li; Hao-Kun Mao; Qi Han

    With the rapid development of quantum key distribution (QKD) technology, more various types of QKD protocols are being proposed. Considering the variety of QKD protocols, the exclusivity of quantum channels, the limitation of key generation capability, and the necessity of credibility control, it is a crucial task to explore the cost-effective construction of hybrid QKD networks. In this paper, a hybrid

    更新日期:2020-04-01
  • Software-Defined Radio Implementation of Age-of-Information-Oriented Random Access
    arXiv.cs.NI Pub Date : 2020-03-31
    Zixiao Han; Jiaxin Liang; Yifan Gu; He Chen

    More and more emerging Internet of Things (IoT) applications involve status updates, where various IoT devices monitor certain physical processes and report their latest statuses to the relevant information fusion nodes. A new performance measure, termed the age of information (AoI), has recently been proposed to quantify the information freshness in time-critical IoT applications. Due to a large number

    更新日期:2020-04-01
  • Internet-based Adaptive Distributed Simulation of Mobile Ad-hoc Networks
    arXiv.cs.NI Pub Date : 2019-08-30
    Gabriele D'Angelo; Stefano Ferretti; Gary S. H. Tan

    In this paper we focus on Internet-based simulation, a form of distributed simulation in which a set of execution units that are physically located around the globe work together to run a simulation model. This setup is very challenging because of the latency/variability of communications. Thus, clever mechanisms must be adopted in the distributed simulation, such as the adaptive partitioning of the

    更新日期:2020-04-01
  • Prism: Scaling Bitcoin by 10,000x
    arXiv.cs.NI Pub Date : 2019-09-25
    Lei Yang; Vivek Bagaria; Gerui Wang; Mohammad Alizadeh; David Tse; Giulia Fanti; Pramod Viswanath

    Bitcoin is the first fully decentralized permissionless blockchain protocol and achieves a high level of security: the ledger it maintains has guaranteed liveness and consistency properties as long as the adversary has less compute power than the honest nodes. However, its throughput is only 7 transactions per second and the confirmation latency can be up to hours. Prism is a new blockchain protocol

    更新日期:2020-04-01
  • A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good
    arXiv.cs.NI Pub Date : 2019-10-08
    Mirko Zichichi; Stefano Ferretti; Gabriele D'Angelo

    This paper presents a system architecture to promote the development of smart transportation systems. Thanks to the use of distributed ledgers and related technologies, it is possible to create, store and share data generated by users through their sensors, while moving. In particular, IOTA and IPFS are used to store and certify data (and their related metadata) coming from sensors or by the users

    更新日期:2020-04-01
  • Fast Session Resumption in DTLS for Mobile Communications
    arXiv.cs.NI Pub Date : 2019-10-08
    Gyordan Caminati; Sara Kiade; Gabriele D'Angelo; Stefano Ferretti; Vittorio Ghini

    DTLS is a protocol that provides security guarantees to Internet communications. It can operate on top of both TCP and UDP transport protocols. Thus, it is particularly suited for peer-to-peer and distributed multimedia applications. The same holds if the endpoints are mobile devices. In this scenario, mechanisms are needed to surmount possible network disconnections, often arising due to the mobility

    更新日期:2020-04-01
  • A Truthful Auction for Graph Job Allocation in Vehicular Cloud-assisted Networks
    arXiv.cs.NI Pub Date : 2020-03-27
    Zhibin Gao; Minghui LiWang; Seyyedali Hosseinalipour; Huaiyu Dai; Xianbin Wang

    Vehicular cloud computing has emerged as a promising solution to fulfill users' demands on processing computation-intensive applications in modern driving environments. Such applications are commonly represented by graphs consisting of components and edges. However, encouraging vehicles to share resources poses significant challenges owing to users' selfishness. In this paper, an auction-based graph

    更新日期:2020-03-31
  • Joint Computation Offloading, SFC Placement, and Resource Allocation for Multi-Site MEC Systems
    arXiv.cs.NI Pub Date : 2020-03-28
    Phuong-Duy Nguyen; Long Bao Le

    Network function Virtualization (NFV) and Mobile Edge Computing (MEC) are promising 5G technologies to support resource-demanding mobile applications. In NFV, one must process the service function chain (SFC) in which a set of network functions must be executed in a specific order. Moreover, the MEC technology enables computation offloading of service requests from mobile users to remote servers to

    更新日期:2020-03-31
  • Energy-Aware Offloading in Time-Sensitive Networks with Mobile Edge Computing
    arXiv.cs.NI Pub Date : 2020-03-28
    Mingxiong Zhao; Jun-Jie Yu; Wen-Tao Li; Di Liu; Shaowen Yao; Wei Feng; Changyang She; Tony Q. S. Quek

    Mobile Edge Computing (MEC) enables rich services in close proximity to the end users to provide high quality of experience (QoE) and contributes to energy conservation compared with local computing, but results in increased communication latency. In this paper, we investigate how to jointly optimize task offloading and resource allocation to minimize the energy consumption in an orthogonal frequency

    更新日期:2020-03-31
  • From QoS Distributions to QoE Distributions: a System's Perspective
    arXiv.cs.NI Pub Date : 2020-03-28
    Tobias Hossfeld; Poul E. Heegaard; Martin Varela; Lea Skorin-Kapov; Markus Fiedler

    In the context of QoE management, network and service providers commonly rely on models that map system QoS conditions (e.g., system response time, paket loss, etc.) to estimated end user QoE values. Observable QoS conditions in the system may be assumed to follow a certain distribution, meaning that different end users will experience different conditions. On the other hand, drawing from the results

    更新日期:2020-03-31
  • Real Entropy Can Also Predict Daily Voice Traffic for Wireless Network Users
    arXiv.cs.NI Pub Date : 2020-03-28
    Sihai Zhang; Junyao Guo; Tian Lan; Rui Sun; Jinkang Zhu

    Voice traffic prediction is significant for network deployment optimization thus to improve the network efficiency. The real entropy based theorectical bound and corresponding prediction models have demonstrated their success in mobility prediction. In this paper, the real entropy based predictability analysis and prediction models are introduced into voice traffic prediction. For this adoption, the

    更新日期:2020-03-31
  • A Cooperative Learning Framework for Resource Management in MEC: An ADMM Perspective
    arXiv.cs.NI Pub Date : 2020-03-28
    Xiaoxiong Zhong; Xinghan Wang; Li Li; Yuanyuan Yang; Yang Qin; Tingting Yang; Bin Zhang; Weizhe Zhang

    We consider the problem of intelligent and efficient resource management framework in mobile edge computing (MEC), which can reduce delay and energy consumption, featuring distributed optimization and efficient congestion avoidance mechanism. In this paper, we present a Cooperative Learning framework for resource management in MEC from an Alternating Direction Method of Multipliers (ADMM) perspective

    更新日期:2020-03-31
  • EdgeSlice: Slicing Wireless Edge Computing Network with Decentralized Deep Reinforcement Learning
    arXiv.cs.NI Pub Date : 2020-03-28
    Qiang Liu; Tao Han; Ephraim Moges

    5G and edge computing will serve various emerging use cases that have diverse requirements of multiple resources, e.g., radio, transportation, and computing. Network slicing is a promising technology for creating virtual networks that can be customized according to the requirements of different use cases. Provisioning network slices requires end-to-end resource orchestration which is challenging. In

    更新日期:2020-03-31
  • IoT Blockchain Solution for Air Quality Monitoring in SmartCities
    arXiv.cs.NI Pub Date : 2020-03-29
    Shajulin Benedict; Rumaize P.; Jaspreet Kaur

    IoT cloud enabled societal applications have dramatically increased in the recent past due to the thrust for innovations, notably through startup initiatives, in various sectors such as agriculture, healthcare, industry, and so forth. The existing IoT cloud solutions have led practitioners or researchers to a haphazard clutter of serious security hazards and performance inefficiencies. This paper proposes

    更新日期:2020-03-31
  • An Analytical Framework for mmWave-Enabled V2X Caching
    arXiv.cs.NI Pub Date : 2020-03-29
    Saeede Fattahi-Bafghi; Zolfa Zeinalpour-Yazdi; Arash Asadi

    Autonomous vehicles will rely heavily on vehicle-to-everything (V2X) communications to obtain a large amount of information required for navigation and road safety purposes. This can be achieved through: (i) leveraging millimeter-wave (mmWave) frequencies to achieve multi- Gbps data rates, and (ii) exploiting the temporal and spatial correlation of vehicular contents to offload a portion of the traffic

    更新日期:2020-03-31
  • Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges
    arXiv.cs.NI Pub Date : 2020-03-30
    Yalin Liu; Hong-Ning Dai; Qubeijian Wang; Mahendra K. Shukla; Muhammad Imran

    The recent advances in information and communication technology (ICT) have further extended Internet of Things (IoT) from the sole "things" aspect to the omnipotent role of "intelligent connection of things". Meanwhile, the concept of internet of everything (IoE) is presented as such an omnipotent extension of IoT. However, the IoE realization meets critical challenges including the restricted network

    更新日期:2020-03-31
  • Decentralized Learning for Channel Allocation in IoT Networks over Unlicensed Bandwidth as a Contextual Multi-player Multi-armed Bandit Game
    arXiv.cs.NI Pub Date : 2020-03-30
    Wenbo Wang; Amir Leshem; Dusit Niyato; Zhu Han

    We study a decentralized channel allocation problem in an ad-hoc Internet of Things (IoT) network underlaying on a spectrum licensed to an existing wireless network. In the considered IoT network, the impoverished computation capability and the limited antenna number on the IoT devices make them difficult to acquire the Channel State Information (CSI) for the multi-channels over the shared spectrum

    更新日期:2020-03-31
  • Analysis of an Extension Dynamic Name Service -- A discussion on DNS compliance with RFC 6891
    arXiv.cs.NI Pub Date : 2020-03-30
    Ivica Stipovic

    Domain Name Service (DNS) resolution is a mechanism that resolves the symbolic names of networked devices to their corresponding Internet Protocol (IP) address. With the emergence of the document that describes an extension to a DNS service definition, it was becoming apparent that DNS implementations will need to comply with some modified DNS behaviour. One such modification is that DNS continues

    更新日期:2020-03-31
  • Performance Benchmarking of State-of-the-Art Software Switches for NFV
    arXiv.cs.NI Pub Date : 2020-03-30
    Tianzhu Zhang; Leonardo Linguaglossa; Paolo Giaccone; Luigi Iannone; James Roberts

    With the ultimate goal of replacing proprietary hardware appliances with Virtual Network Functions (VNFs) implemented in software, Network Function Virtualization (NFV) has been gaining popularity in the past few years. Software switches route traffic between VNFs and physical Network Interface Cards (NICs). It is of paramount importance to compare the performance of different switch designs and architectures

    更新日期:2020-03-31
  • Combined Cooling, Heating, and Power System in Blockchain-Enabled Energy Management
    arXiv.cs.NI Pub Date : 2020-03-20
    Jianxiong Guo; Xingjian Ding; Weili Wu

    The combined cooling, heating and power (CCHP) system is a typical distributed, electricity-gas integrated energy scheme in a community. First, it generates electricity by use of gas, and then exploits the waste heat to supply community with heat and cooling. In this paper, we consider a smart city consisting of a number of communities (CCHPs) and an agent of power grid (APG), where CCHPs can sell

    更新日期:2020-03-31
  • Avoiding collisions at any (low) cost: ADS-B like position broadcast for UAVs
    arXiv.cs.NI Pub Date : 2020-03-30
    Franco Minucci; Evgenii Vinogradov; Sofie Pollin

    Unmanned Aerial Vehicles (UAVs), a.k.a. drones, are increasingly used for different tasks. With more drones in the sky, the risk of accidents rises, sparkling the need for conflict management solutions. Aircraft use a system called Automatic Dependent System-Broadcast (ADS-B) to continuously broadcast their position and speed but this system is not suitable for small drones because of its cost, complexity

    更新日期:2020-03-31
  • Maintaining Information Freshness in Power-Efficient Status Update Systems
    arXiv.cs.NI Pub Date : 2020-03-30
    Parisa Rafiee; Peng Zou; Omur Ozel; Suresh Subramaniam

    This paper is motivated by emerging edge computing systems which consist of sensor nodes that acquire and process information and then transmit status updates to an edge receiver for possible further processing. As power is a scarce resource at the sensor nodes, the system is modeled as a tandem computation-transmission queue with power-efficient computing. Jobs arrive at the computation server with

    更新日期:2020-03-31
  • 5G Security and Privacy: A Research Roadmap
    arXiv.cs.NI Pub Date : 2020-03-30
    Elisa Bertino; Syed Rafiul Hussain; Omar Chowdhury

    Cellular networks represent a critical infrastructure and their security is thus crucial. 5G - the latest generation of cellular networks - combines different technologies to increase capacity, reduce latency, and save energy. Due to its complexity and scale, however, ensuring its security is extremely challenging. In this white paper, we outline recent approaches supporting systematic analyses of

    更新日期:2020-03-31
  • Conceptualizing A Configuration Service for Complex Automation Systems
    arXiv.cs.NI Pub Date : 2020-03-30
    Javad Ghofrani; Paul Patoola; Daniel Richter; Dirk Reichelt

    Arrowhead Framework (AHF) is being developed to enable large-scale IoT based automation by providing an interoperability layer for local clouds. This framework aims to create an abstract model for distributed, heterogeneous, and non-linear systems. Managing the variability in such environments plays a key role in handling complex automation tasks such as in smart production systems. However, there

    更新日期:2020-03-31
  • A Prospect Theoretic Approach for Trust Management in IoT Networks under Manipulation Attacks
    arXiv.cs.NI Pub Date : 2018-09-21
    Mehrdad Salimitari; Shameek Bhattacharjee; Mainak Chatterjee; Yaser P. Fallah

    As Internet of Things (IoT) and Cyber-Physical systems become more ubiquitous and an integral part of our daily lives, it is important that we are able to trust the data aggregate from such systems. However, the interpretation of trustworthiness is contextual and varies according to the risk tolerance attitude of the concerned application and varying levels of uncertainty associated with the evidence

    更新日期:2020-03-31
  • Boomerang: Redundancy Improves Latency and Throughput in Payment-Channel Networks
    arXiv.cs.NI Pub Date : 2019-10-04
    Vivek Bagaria; Joachim Neu; David Tse

    In multi-path routing schemes for payment-channel networks, Alice transfers funds to Bob by splitting them into partial payments and routing them along multiple paths. Undisclosed channel balances and mismatched transaction fees cause delays and failures on some payment paths. For atomic transfer schemes, these straggling paths stall the whole transfer. We show that the latency of transfers reduces

    更新日期:2020-03-31
  • Quality of Control Assessment for Tactile Internet based Cyber-Physical Systems
    arXiv.cs.NI Pub Date : 2019-10-19
    Kurian Polachan; Joydeep Pal; Chandramani Singh; Prabhakar T V

    We evolve a methodology and define a metric to evaluate Tactile Internet based Cyber-Physical Systems or Tactile Cyber-Physical Systems (TCPS). Towards this goal, we adopt the step response analysis, a well-known control-theoretic method. The adoption includes replacing the human operator (or master) with a controller with known characteristics and analyzing its response to slave side step disturbances

    更新日期:2020-03-31
  • Intelligent Resource Slicing for eMBB and URLLC Coexistence in 5G and Beyond: A Deep Reinforcement Learning Based Approach
    arXiv.cs.NI Pub Date : 2020-03-17
    Madyan Alsenwi; Nguyen H. Tran; Mehdi Bennis; Shashi Raj Pandey; Anupam Kumar Bairagi; Choong Seon Hong

    In this paper, we study the resource slicing problem in a dynamic multiplexing scenario of two distinct 5G services, namely Ultra-Reliable Low Latency Communications (URLLC) and enhanced Mobile BroadBand (eMBB). While eMBB services focus on high data rates, URLLC is very strict in terms of latency and reliability. In view of this, the resource slicing problem is formulated as an optimization problem

    更新日期:2020-03-31
  • A Survey on Edge Intelligence
    arXiv.cs.NI Pub Date : 2020-03-26
    Dianlei Xu; Tong Li; Yong Li; Xiang Su; Sasu Tarkoma; Pan Hui

    Edge intelligence refers to a set of connected systems and devices for data collection, caching, processing, and analysis in locations close to where data is captured based on artificial intelligence. The aim of edge intelligence is to enhance the quality and speed of data processing and protect the privacy and security of the data. Although recently emerged, spanning the period from 2011 to now, this

    更新日期:2020-03-30
  • Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution
    arXiv.cs.NI Pub Date : 2020-03-27
    Masahito Hayashi; Ning Cai

    When there exists a malicious attacker in the network, we need to be careful of eavesdropping and contamination. This problem is crucial for network communication when the network is realized by a partially trusted relay of quantum key distribution. We discuss the asymptotic rate in a linear network with the secrecy and robustness conditions when the above type of attacker exists. Also, under the same

    更新日期:2020-03-30
  • Mechanism Design for Wireless Powered Spatial Crowdsourcing Networks
    arXiv.cs.NI Pub Date : 2020-03-27
    Yutao Jiao; Ping Wang; Dusit Niyato; Bin Lin; Dong In Kim

    Wireless power transfer (WPT) is a promising technology to prolong the lifetime of the sensors and communication devices, i.e., workers, in completing crowdsourcing tasks by providing continuous and cost-effective energy supplies. In this paper, we propose a wireless powered spatial crowdsourcing framework which consists of two mutually dependent phases: task allocation phase and data crowdsourcing

    更新日期:2020-03-30
  • Trajectory Optimization of Flying Energy Sources using Q-Learning to Recharge Hotspot UAVs
    arXiv.cs.NI Pub Date : 2020-03-27
    Sayed Amir Hoseini; Jahan Hassan; Ayub Bokani; Salil S. Kanhere

    Despite the increasing popularity of commercial usage of UAVs or drone-delivered services, their dependence on the limited-capacity on-board batteries hinders their flight-time and mission continuity. As such, developing in-situ power transfer solutions for topping-up UAV batteries have the potential to extend their mission duration. In this paper, we study a scenario where UAVs are deployed as base

    更新日期:2020-03-30
  • Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning
    arXiv.cs.NI Pub Date : 2020-03-27
    Sai Kireet Patri; Elena Grigoreva; Wolfgang Kellerer; Carmen Mas Machuca

    To keep up with constantly growing user demands for services with higher quality and bandwidth requirements, telecommunication operators are forced to upgrade their networks. This upgrade, or migration of the network to a new technology, is a complex strategic network planning problem that involves techno-economic evaluations over multiple periods of time. The state-of-the-art approaches consider migrations

    更新日期:2020-03-30
  • Assessing the Security of OPC UA Deployments
    arXiv.cs.NI Pub Date : 2020-03-27
    Linus Roepert; Markus Dahlmanns; Ina Berenice Fink; Jan Pennekamp; Martin Henze

    To address the increasing security demands of industrial deployments, OPC UA is one of the first industrial protocols explicitly designed with security in mind. However, deploying it securely requires a thorough configuration of a wide range of options. Thus, assessing the security of OPC UA deployments and their configuration is necessary to ensure secure operation, most importantly confidentiality

    更新日期:2020-03-30
  • Towards Cognitive Routing based on Deep Reinforcement Learning
    arXiv.cs.NI Pub Date : 2020-03-19
    Jiawei Wu; Jianxue Li; Yang Xiao; Jun Liu

    Routing is one of the key functions for stable operation of network infrastructure. Nowadays, the rapid growth of network traffic volume and changing of service requirements call for more intelligent routing methods than before. Towards this end, we propose a definition of cognitive routing and an implementation approach based on Deep Reinforcement Learning (DRL). To facilitate the research of DRL-based

    更新日期:2020-03-30
  • Fakernet -- small and fast FPGA-based TCP and UDP communication
    arXiv.cs.NI Pub Date : 2020-03-27
    H. T. Johansson; A. Furufors; P. Klenze

    A common theme of data acquisition systems is the transport of data from digitising front-end modules to stable storage and online analysis. A good choice today is to base this on the ubiquitous, commercially and cheaply available Ethernet technology. A firmware building block to turn already the FPGA of front-end electronics into a TCP data source and UDP control interface using a data-flow architecture

    更新日期:2020-03-30
  • Edge Federation: Towards an Integrated Service Provisioning Model
    arXiv.cs.NI Pub Date : 2019-02-25
    Xiaofeng Cao; Guoming Tang; Deke Guo; Yan Li; Weiming Zhang

    Edge computing is a promising computing paradigm for pushing the cloud service to the network edge. To this end, edge infrastructure providers (EIPs) need to bring computation and storage resources to the network edge and allow edge service providers (ESPs) to provision latency-critical services to users. Currently, EIPs prefer to establish a series of private edge-computing environments to serve specific

    更新日期:2020-03-30
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
聚焦肿瘤,探索癌症
欢迎探索2019年最具下载量的材料科学论文
宅家赢大奖
向世界展示您的会议墙报和演示文稿
全球疫情及响应:BMC Medicine专题征稿
新版X-MOL期刊搜索和高级搜索功能介绍
化学材料学全球高引用
ACS材料视界
x-mol收录
自然科研论文编辑服务
南方科技大学
南方科技大学
舒伟
中国科学院长春应化所于聪-4-8
复旦大学
课题组网站
X-MOL
香港大学化学系刘俊治
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug