首页 > 最新文献

2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks最新文献

英文 中文
Physical layer security: Coalitional games for distributed cooperation 物理层安全性:分布式合作的联盟博弈
W. Saad, Zhu Han, T. Başar, M. Debbah, A. Hjørungnes
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question “what are the link-level secrecy capacity gains from cooperation?”, this paper attempts to answer the question of “how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?”. For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case.
无线网络节点间的协作是一种很有前途的技术,可以在多个窃听者存在的情况下提高无线传输的物理层安全性和保密能力。而现有的物理层安全文献回答了“从合作中获得的链路级保密能力是什么?”,本文试图回答“如何在一个实际的去中心化无线网络中,在信息交换存在保密容量成本的情况下,实现这些收益?”为此,我们将物理层安全合作问题建模为具有不可转移效用的联盟博弈,并提出了一种分布式联盟形成算法。通过该算法,无线用户可以自主协作和自组织成不相连的独立联盟,同时考虑到信息交换过程中的安全成本,使其保密能力最大化。我们分析了由此产生的联盟结构,讨论了它们的性质,并研究了用户如何自适应网络拓扑以适应环境变化,如移动性。仿真结果表明,该算法允许用户进行合作和自组织,同时相对于非合作情况,每个用户的平均保密能力提高了25.32%。
{"title":"Physical layer security: Coalitional games for distributed cooperation","authors":"W. Saad, Zhu Han, T. Başar, M. Debbah, A. Hjørungnes","doi":"10.1109/WIOPT.2009.5291619","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291619","url":null,"abstract":"Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question “what are the link-level secrecy capacity gains from cooperation?”, this paper attempts to answer the question of “how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?”. For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"61 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Low complexity cross-layer design for dense interference networks 密集干扰网络的低复杂度跨层设计
Sara Akbarzadeh, L. Cottatellucci, C. Bonnet
We considered a dense interference network with a large number (K → ∞) of transmitter-receiver pairs. Each transmitter is endowed with a finite buffer and accepts packets from an arrival process. Each transmitter-receiver link is a fading vector channel with N diversity paths whose statistics are described by a Markov chain. We investigate distributed algorithms for joint admission control, rate and power allocation aiming at maximizing the individual throughput defined as the average information rate successfully received. The decisions are based on the statistical knowledge of the channel and buffer states of the other communication pairs and on the exact knowledge of their own channel and buffer states. In the case of a finite number of communication pairs this problem is computationally extremely intensive with an exponential complexity in the number of users. Assuming that K,N → ∞ with constant ratio the algorithm complexity becomes substantially independent of the number of active communications and grows with the groups of users having distinct asymptotic channel statistics. The cross-layer design is investigated for different kind of decoders at the receiver. The benefits of a cross layer approach compared to a resource allocation ignoring the states of the queues are assessed. The performance loss due to the use of policies designed for asymptotic conditions and applied to networks with a finite number of active communications is studied.
我们考虑了一个具有大量(K→∞)收发对的密集干扰网络。每个发送器都有一个有限的缓冲区,并接受来自到达过程的数据包。每个收发链路是一个有N个分集路径的衰落矢量信道,其统计量用马尔可夫链来描述。我们研究了联合准入控制,速率和功率分配的分布式算法,旨在最大化个体吞吐量,定义为成功接收的平均信息速率。这些决策是基于其他通信对的信道和缓冲状态的统计知识,以及它们自己的信道和缓冲状态的确切知识。在有限数量的通信对的情况下,这个问题的计算非常密集,用户数量呈指数级复杂性。假设K,N→∞且比率恒定,则算法复杂度与主动通信数基本无关,并随着具有不同渐近信道统计量的用户群而增长。研究了接收端不同类型解码器的跨层设计。与忽略队列状态的资源分配相比,评估了跨层方法的优势。研究了基于渐近条件设计的策略在有限主动通信网络中的性能损失。
{"title":"Low complexity cross-layer design for dense interference networks","authors":"Sara Akbarzadeh, L. Cottatellucci, C. Bonnet","doi":"10.1109/WIOPT.2009.5291590","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291590","url":null,"abstract":"We considered a dense interference network with a large number (K → ∞) of transmitter-receiver pairs. Each transmitter is endowed with a finite buffer and accepts packets from an arrival process. Each transmitter-receiver link is a fading vector channel with N diversity paths whose statistics are described by a Markov chain. We investigate distributed algorithms for joint admission control, rate and power allocation aiming at maximizing the individual throughput defined as the average information rate successfully received. The decisions are based on the statistical knowledge of the channel and buffer states of the other communication pairs and on the exact knowledge of their own channel and buffer states. In the case of a finite number of communication pairs this problem is computationally extremely intensive with an exponential complexity in the number of users. Assuming that K,N → ∞ with constant ratio the algorithm complexity becomes substantially independent of the number of active communications and grows with the groups of users having distinct asymptotic channel statistics. The cross-layer design is investigated for different kind of decoders at the receiver. The benefits of a cross layer approach compared to a resource allocation ignoring the states of the queues are assessed. The performance loss due to the use of policies designed for asymptotic conditions and applied to networks with a finite number of active communications is studied.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"163 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129281679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Emergence of algorithmically hard phases in transportation networks 交通网络中算法困难阶段的出现
C. Yeung, K. Y. Wong
We study a model of transportation networks with nonlinear elements which represent local shortage of resources. Frustration arises from competition among the nodes to become satisfied. When the initial resources are uniform, algorithmically hard regimes emerge when the average availability of resources increases. These regimes are characterized by discrete fractions of satisfied nodes, resembling the Devil's staircase. Behavior similar to those in the vertex cover or close packing problems are found. When initial resources are bimodally distributed, such algorithmically hard regimes also emerge when the fraction of rich nodes increases.
研究了一种考虑局部资源短缺的非线性交通网络模型。挫折来自于节点之间为获得满足而进行的竞争。当初始资源是统一的,当资源的平均可用性增加时,就会出现算法上的硬机制。这些制度的特点是满足节点的离散部分,类似于魔鬼的楼梯。发现了类似于顶点覆盖或紧密填充问题的行为。当初始资源是双峰分布时,当富节点的比例增加时,也会出现这种算法上的困难局面。
{"title":"Emergence of algorithmically hard phases in transportation networks","authors":"C. Yeung, K. Y. Wong","doi":"10.1109/WIOPT.2009.5291593","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291593","url":null,"abstract":"We study a model of transportation networks with nonlinear elements which represent local shortage of resources. Frustration arises from competition among the nodes to become satisfied. When the initial resources are uniform, algorithmically hard regimes emerge when the average availability of resources increases. These regimes are characterized by discrete fractions of satisfied nodes, resembling the Devil's staircase. Behavior similar to those in the vertex cover or close packing problems are found. When initial resources are bimodally distributed, such algorithmically hard regimes also emerge when the fraction of rich nodes increases.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying RFID tag categories in linear time 在线性时间内识别RFID标签类别
M. Kodialam, W. Lau, T. Nandagopal
Given a large set of RFID tags, we are interested in determining the categories of tags that are present in the shortest time possible. Since there can be more than one tag present in a particular category, pure randomized strategies that rely on resolving individual tags are very inefficient. Instead, we rely on a pseudo-random strategy that utilizes a uniform hash function to accurately identify all t categories present among a given set of ψ tags with high probability. We propose two algorithms: (a) a single frame algorithm that determines the optimal frame size, and (b) a probabilistic version where the frame size is fixed, and we select the probability to minimize the number of frames needed for identification. Both of these algorithms run in time linear to the number of categories present, t. We show that our approach significantly outperforms existing algorithms for category identification. The performance of our algorithms is within a constant factor of the lower bound.
给定大量的RFID标签,我们感兴趣的是确定在尽可能短的时间内出现的标签类别。由于在一个特定的类别中可能存在多个标签,因此依赖于解析单个标签的纯随机策略非常低效。相反,我们依赖于伪随机策略,该策略利用统一哈希函数以高概率准确识别给定的一组ψ标签中存在的所有t个类别。我们提出了两种算法:(a)确定最佳帧大小的单帧算法,以及(b)帧大小固定的概率版本,我们选择概率来最小化识别所需的帧数。这两种算法都与现有的类别数量t呈时间线性关系。我们表明,我们的方法显著优于现有的类别识别算法。我们的算法的性能在下界的一个常数因子内。
{"title":"Identifying RFID tag categories in linear time","authors":"M. Kodialam, W. Lau, T. Nandagopal","doi":"10.1109/WIOPT.2009.5291639","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291639","url":null,"abstract":"Given a large set of RFID tags, we are interested in determining the categories of tags that are present in the shortest time possible. Since there can be more than one tag present in a particular category, pure randomized strategies that rely on resolving individual tags are very inefficient. Instead, we rely on a pseudo-random strategy that utilizes a uniform hash function to accurately identify all t categories present among a given set of ψ tags with high probability. We propose two algorithms: (a) a single frame algorithm that determines the optimal frame size, and (b) a probabilistic version where the frame size is fixed, and we select the probability to minimize the number of frames needed for identification. Both of these algorithms run in time linear to the number of categories present, t. We show that our approach significantly outperforms existing algorithms for category identification. The performance of our algorithms is within a constant factor of the lower bound.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128443779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characterization of power consumption in thin clients due to protocol data transmission over IEEE 802.11 基于IEEE 802.11协议数据传输的瘦客户机功耗特性
P. Simoens, B. Vankeirsbilck, F. Ali, L. Deboosere, F. Turck, B. Dhoedt, P. Demeester, R. T. Duran, C. Desset
In thin client computing, applications are executed on a network server instead of on the user terminal. Since the amount of processing at the terminal is reduced, thin clients are potentially energy efficient devices. However, a network connection between client and server is required for the transmission of user input and display updates. The energy needed for this intense network communication might undo or even exceed the power savings achieved by the reduction in client-side processing. In this paper, we present experimental results on power efficiency of the wireless platform on the thin client in case of thin client traffic. The discussion is focused on VNC-RFB, a widespread thin client protocol, over an IEEE 802.11 link in three typical user scenarios. The results indicate that a cross-layer approach between application and wireless link layer could potentially lead to important power savings.
在瘦客户机计算中,应用程序在网络服务器上执行,而不是在用户终端上执行。由于终端上的处理量减少了,瘦客户机是潜在的节能设备。但是,客户机和服务器之间需要网络连接来传输用户输入和显示更新。这种密集的网络通信所需的能量可能抵消甚至超过减少客户端处理所节省的能量。本文给出了在瘦客户端流量情况下无线平台在瘦客户端上的功率效率的实验结果。讨论的重点是在三种典型的用户场景中通过IEEE 802.11链路的VNC-RFB,这是一种广泛使用的瘦客户机协议。结果表明,应用程序和无线链路层之间的跨层方法可能会导致重要的功耗节省。
{"title":"Characterization of power consumption in thin clients due to protocol data transmission over IEEE 802.11","authors":"P. Simoens, B. Vankeirsbilck, F. Ali, L. Deboosere, F. Turck, B. Dhoedt, P. Demeester, R. T. Duran, C. Desset","doi":"10.1109/WIOPT.2009.5291601","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291601","url":null,"abstract":"In thin client computing, applications are executed on a network server instead of on the user terminal. Since the amount of processing at the terminal is reduced, thin clients are potentially energy efficient devices. However, a network connection between client and server is required for the transmission of user input and display updates. The energy needed for this intense network communication might undo or even exceed the power savings achieved by the reduction in client-side processing. In this paper, we present experimental results on power efficiency of the wireless platform on the thin client in case of thin client traffic. The discussion is focused on VNC-RFB, a widespread thin client protocol, over an IEEE 802.11 link in three typical user scenarios. The results indicate that a cross-layer approach between application and wireless link layer could potentially lead to important power savings.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Joint load balancing, scheduling, and interference mitigation in multi-cell and multi-carrier wireless data systems 多小区和多载波无线数据系统中的联合负载平衡、调度和干扰缓解
Honghai Zhang, S. Rangarajan
We consider the problem of maximizing the weighted sum data rate in multi-cell and multi-carrier wireless data systems in the presence of interference. We present a scheme that jointly considers load balancing, user scheduling, and interference mitigation to improve the system performance. Our proposed scheme iteratively applies two processes. The first process solves the sub-problem of load balancing and user scheduling while fixing the power allocation of each BS (and thus fixing the interference). We prove that this sub-problem is NP-hard, and devise a 1/2-approximation algorithm to solve the problem. We also consider an extended model capturing finite queue size and propose a 1/2-approximation algorithm under this model. The second process solves the problem of interference mitigation assuming fixed load balancing and user scheduling. We develop a local-improvement based algorithm to solve this problem. Via simulations, we demonstrate that our joint scheme improves both average system throughput and fairness significantly. Compared to the scheme with fixed user-BS association and 1/3 frequency reuse, the lowest 10% cell-edge users obtain more than 60% performance improvement and 90%of users enjoy more than 30%throughput improvement.
研究了存在干扰的多小区多载波无线数据系统中加权和数据速率的最大化问题。提出了一种综合考虑负载均衡、用户调度和干扰抑制的方案,以提高系统性能。我们提出的方案迭代地应用两个过程。第一个进程解决了负载均衡和用户调度的子问题,同时确定了每个BS的功率分配(从而解决了干扰)。我们证明了这个子问题是np困难的,并设计了一个1/2逼近算法来解决这个问题。我们还考虑了捕获有限队列大小的扩展模型,并在该模型下提出了1/2逼近算法。第二个流程解决了在固定负载均衡和用户调度的情况下的干扰缓解问题。我们开发了一种基于局部改进的算法来解决这个问题。通过仿真,我们证明了我们的联合方案显著提高了系统的平均吞吐量和公平性。与固定用户- bs关联和1/3频率复用方案相比,最低10%的蜂窝边缘用户的性能提高60%以上,90%的用户的吞吐量提高30%以上。
{"title":"Joint load balancing, scheduling, and interference mitigation in multi-cell and multi-carrier wireless data systems","authors":"Honghai Zhang, S. Rangarajan","doi":"10.1109/WIOPT.2009.5291637","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291637","url":null,"abstract":"We consider the problem of maximizing the weighted sum data rate in multi-cell and multi-carrier wireless data systems in the presence of interference. We present a scheme that jointly considers load balancing, user scheduling, and interference mitigation to improve the system performance. Our proposed scheme iteratively applies two processes. The first process solves the sub-problem of load balancing and user scheduling while fixing the power allocation of each BS (and thus fixing the interference). We prove that this sub-problem is NP-hard, and devise a 1/2-approximation algorithm to solve the problem. We also consider an extended model capturing finite queue size and propose a 1/2-approximation algorithm under this model. The second process solves the problem of interference mitigation assuming fixed load balancing and user scheduling. We develop a local-improvement based algorithm to solve this problem. Via simulations, we demonstrate that our joint scheme improves both average system throughput and fairness significantly. Compared to the scheme with fixed user-BS association and 1/3 frequency reuse, the lowest 10% cell-edge users obtain more than 60% performance improvement and 90%of users enjoy more than 30%throughput improvement.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Quantization, channel compensation, and energy allocation for estimation in wireless sensor networks 无线传感器网络中估计的量化、信道补偿和能量分配
Xusheng Sun, E. Coyle
In clustered networks of wireless sensor motes, each mote collects noisy observations of the environment, quantizes these observations into a local estimate of finite length, and forwards them through one or more noisy wireless channels to the Cluster Head (CH). The measurement noise is assumed to be zero-mean and have finite variance. Each wireless hop is assumed to be a Binary Symmetric Channel (BSC) with a known crossover probability. We propose a novel scheme that uses dithered quantization and channel compensation to ensure that each motes' local estimate received by the CH is unbiased. The CH then fuses these unbiased local estimates into a global one using a Best Linear Unbiased Estimator (BLUE). The energy allocation problem at each mote and among different sensor motes are also discussed. Simulation results show that the proposed scheme can achieve much smaller mean square error (MSE) than two other common schemes while using the same amount of energy. The sensitivity of the proposed scheme to errors in estimates of the crossover probability of the BSC channel is studied by both analysis and simulation.
在无线传感器微球的集群网络中,每个微球收集环境的噪声观测,将这些观测量化为有限长度的局部估计,并通过一个或多个噪声无线信道将它们转发给簇头(CH)。假设测量噪声为零均值,方差有限。假设每个无线跳是一个二元对称信道(BSC),具有已知的交叉概率。我们提出了一种使用抖动量化和信道补偿的新方案,以确保CH接收到的每个粒子的局部估计是无偏的。然后,CH使用最佳线性无偏估计器(BLUE)将这些无偏局部估计融合到全局估计中。同时还讨论了各传感器点和不同传感器点之间的能量分配问题。仿真结果表明,在使用相同能量的情况下,该方案比其他两种常用方案的均方误差(MSE)小得多。通过分析和仿真研究了该方案对BSC信道交叉概率估计误差的敏感性。
{"title":"Quantization, channel compensation, and energy allocation for estimation in wireless sensor networks","authors":"Xusheng Sun, E. Coyle","doi":"10.1109/WIOPT.2009.5291616","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291616","url":null,"abstract":"In clustered networks of wireless sensor motes, each mote collects noisy observations of the environment, quantizes these observations into a local estimate of finite length, and forwards them through one or more noisy wireless channels to the Cluster Head (CH). The measurement noise is assumed to be zero-mean and have finite variance. Each wireless hop is assumed to be a Binary Symmetric Channel (BSC) with a known crossover probability. We propose a novel scheme that uses dithered quantization and channel compensation to ensure that each motes' local estimate received by the CH is unbiased. The CH then fuses these unbiased local estimates into a global one using a Best Linear Unbiased Estimator (BLUE). The energy allocation problem at each mote and among different sensor motes are also discussed. Simulation results show that the proposed scheme can achieve much smaller mean square error (MSE) than two other common schemes while using the same amount of energy. The sensitivity of the proposed scheme to errors in estimates of the crossover probability of the BSC channel is studied by both analysis and simulation.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Different dynamics for optimal association in heterogeneous wireless networks 异构无线网络中最优关联的不同动态
Pierre Coucheney, Corinne Touati, B. Gaujal
Most of recent mobile equipment now supports different network technologies (WiFi, WiMax, LTE, Bluetooth and such like). Meanwhile, network operators offer services through these different technologies. The superposition of the different technologies (using different frequency band) increases the potential throughput of the system and hence global performance.
大多数最新的移动设备现在支持不同的网络技术(WiFi, WiMax, LTE,蓝牙等)。同时,网络运营商通过这些不同的技术提供服务。不同技术(使用不同频带)的叠加增加了系统的潜在吞吐量,从而提高了全局性能。
{"title":"Different dynamics for optimal association in heterogeneous wireless networks","authors":"Pierre Coucheney, Corinne Touati, B. Gaujal","doi":"10.1109/WIOPT.2009.5291583","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291583","url":null,"abstract":"Most of recent mobile equipment now supports different network technologies (WiFi, WiMax, LTE, Bluetooth and such like). Meanwhile, network operators offer services through these different technologies. The superposition of the different technologies (using different frequency band) increases the potential throughput of the system and hence global performance.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network coding for data dissemination: it is not what you know, but what your neighbors don't know 数据传播的网络编码:不是你知道什么,而是你的邻居不知道什么
D. Lucani, F. Fitzek, M. Médard, M. Stojanovic
We propose a linear network coding scheme to disseminate a finite number of data packets in arbitrary networks. The setup assumes a packet erasure channel, slotted time, and that nodes cannot transmit and receive information simultaneously. The dissemination process is completed when all terminals can decode the original data packets. We also assume a perfect knowledge of the information at each of the nodes, but not necessarily a perfect knowledge of the channel. A centralized controller decides which nodes should transmit, to what set of receiver nodes, and what information should be broadcasted. We show that the problem can be thought of as a scheduling problem, which is hard to solve. Thus, we consider the use of a greedy algorithm that only takes into account the current state of the system to make a decision. The proposed algorithm tries to maximize the impact on the network at each slot, i.e. maximize the number of nodes that will benefit from the coded packet sent by each active transmitter. We show that our scheme is considerably better, in terms of the number of slots to complete transmission, than schemes that choose the node with more information as the transmitter at every time slot.
我们提出了一种线性网络编码方案,可以在任意网络中传播有限数量的数据包。该设置假定有一个包擦除通道、槽时间,并且节点不能同时发送和接收信息。当所有终端都能解码原始数据包时,传播过程就完成了。我们还假设对每个节点上的信息有完美的了解,但不一定对通道有完美的了解。一个集中的控制器决定哪些节点应该传输,向哪一组接收节点发送,以及应该广播哪些信息。我们证明了这个问题可以被认为是一个难以解决的调度问题。因此,我们考虑使用贪婪算法,它只考虑系统的当前状态来做出决策。所提出的算法试图最大化每个时隙对网络的影响,即最大化从每个主动发送器发送的编码数据包中受益的节点数量。我们表明,就完成传输的时隙数量而言,我们的方案比在每个时隙选择具有更多信息的节点作为发送器的方案要好得多。
{"title":"Network coding for data dissemination: it is not what you know, but what your neighbors don't know","authors":"D. Lucani, F. Fitzek, M. Médard, M. Stojanovic","doi":"10.1109/WIOPT.2009.5291585","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291585","url":null,"abstract":"We propose a linear network coding scheme to disseminate a finite number of data packets in arbitrary networks. The setup assumes a packet erasure channel, slotted time, and that nodes cannot transmit and receive information simultaneously. The dissemination process is completed when all terminals can decode the original data packets. We also assume a perfect knowledge of the information at each of the nodes, but not necessarily a perfect knowledge of the channel. A centralized controller decides which nodes should transmit, to what set of receiver nodes, and what information should be broadcasted. We show that the problem can be thought of as a scheduling problem, which is hard to solve. Thus, we consider the use of a greedy algorithm that only takes into account the current state of the system to make a decision. The proposed algorithm tries to maximize the impact on the network at each slot, i.e. maximize the number of nodes that will benefit from the coded packet sent by each active transmitter. We show that our scheme is considerably better, in terms of the number of slots to complete transmission, than schemes that choose the node with more information as the transmitter at every time slot.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On a generic entropy measure in physics and information 物理学和信息学中的一般熵测度
M. Elnaggar, A. Kempf
We define a generalized entropy that measures the evenness of the distribution of the real non-negative elements of a multiset X . The approach is to determine a comparison multiset R which is in a precise sense equivalent to X and which contains only one distinct positive element, whose multiplicity k then yields the desired measure. To this end, R and X are considered equivalent if their p− and q− norms coincide. Accordingly, we define k and its logarithm to be the effective cardinality and the generalized entropy of X respectively, of the order p,q . We show that the new entropy measure is a generalization of the Rényi entropy after proper normalization of the multiset elements. We also discuss some properties of the proposed measure.
我们定义了一个广义熵来度量多集合X的实非负元素分布的均匀性。该方法是确定一个比较多集R,它在精确意义上相当于X,并且只包含一个不同的正元素,其多重性k然后产生所需的测度。为此,如果R和X的p -和q -模重合,则认为它们是等价的。因此,我们定义k及其对数分别为X的有效基数和广义熵,其阶为p,q。我们证明了新的熵测度是在对多集元素进行适当的归一化之后,对rsamunyi熵的一种推广。我们还讨论了所提措施的一些性质。
{"title":"On a generic entropy measure in physics and information","authors":"M. Elnaggar, A. Kempf","doi":"10.1109/WIOPT.2009.5291598","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291598","url":null,"abstract":"We define a generalized entropy that measures the evenness of the distribution of the real non-negative elements of a multiset X . The approach is to determine a comparison multiset R which is in a precise sense equivalent to X and which contains only one distinct positive element, whose multiplicity k then yields the desired measure. To this end, R and X are considered equivalent if their p− and q− norms coincide. Accordingly, we define k and its logarithm to be the effective cardinality and the generalized entropy of X respectively, of the order p,q . We show that the new entropy measure is a generalization of the Rényi entropy after proper normalization of the multiset elements. We also discuss some properties of the proposed measure.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1