首页 > 最新文献

2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks最新文献

英文 中文
Physical layer security: Coalitional games for distributed cooperation 物理层安全性:分布式合作的联盟博弈
W. Saad, Zhu Han, T. Başar, M. Debbah, A. Hjørungnes
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question “what are the link-level secrecy capacity gains from cooperation?”, this paper attempts to answer the question of “how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?”. For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case.
无线网络节点间的协作是一种很有前途的技术,可以在多个窃听者存在的情况下提高无线传输的物理层安全性和保密能力。而现有的物理层安全文献回答了“从合作中获得的链路级保密能力是什么?”,本文试图回答“如何在一个实际的去中心化无线网络中,在信息交换存在保密容量成本的情况下,实现这些收益?”为此,我们将物理层安全合作问题建模为具有不可转移效用的联盟博弈,并提出了一种分布式联盟形成算法。通过该算法,无线用户可以自主协作和自组织成不相连的独立联盟,同时考虑到信息交换过程中的安全成本,使其保密能力最大化。我们分析了由此产生的联盟结构,讨论了它们的性质,并研究了用户如何自适应网络拓扑以适应环境变化,如移动性。仿真结果表明,该算法允许用户进行合作和自组织,同时相对于非合作情况,每个用户的平均保密能力提高了25.32%。
{"title":"Physical layer security: Coalitional games for distributed cooperation","authors":"W. Saad, Zhu Han, T. Başar, M. Debbah, A. Hjørungnes","doi":"10.1109/WIOPT.2009.5291619","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291619","url":null,"abstract":"Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question “what are the link-level secrecy capacity gains from cooperation?”, this paper attempts to answer the question of “how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?”. For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"61 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
A delay-minimizing routing strategy for wireless multi-hop networks 无线多跳网络的时延最小化路由策略
Kostas Stamatiou, F. Rossetto, M. Haenggi, T. Javidi, J. Zeidler, M. Zorzi
We consider a network where each route comprises a backlogged source, a number of relays and a destination at a finite distance. The locations of the sources and the relays are realizations of independent Poisson point processes. Given that the nodes observe a TDMA/ALOHA MAC protocol, our objective is to determine the number of relays and their placement such that the mean end-to-end delay in a typical route of the network is minimized.We first study an idealistic network model where all routes have the same number of hops, the same distance per hop and their own dedicated relays. Combining tools from queueing theory and stochastic geometry, we provide a precise characterization of the mean end-to-end delay. We find that the delay is minimized if the first hop is much longer than the remaining hops and that the optimal number of hops scales sublinearly with the source-destination distance. Simulating the original network scenario reveals that the analytical results are accurate, provided that the density of the relay process is sufficiently large. We conclude that, given the considered MAC protocol, our analysis provides a delay-minimizing routing strategy for random, multihop networks involving a small number of hops.
我们考虑一个网络,其中每条路由包括一个积压的源,一些中继和一个有限距离的目的地。源和继电器的位置是独立泊松点过程的实现。假设节点遵守TDMA/ALOHA MAC协议,我们的目标是确定中继的数量和它们的位置,从而使网络典型路由中的平均端到端延迟最小化。我们首先研究了一个理想网络模型,其中所有路由具有相同的跳数,相同的每跳距离和各自的专用中继。结合排队理论和随机几何的工具,我们提供了端到端平均延迟的精确表征。我们发现,当第一跳比剩余跳长得多时,延迟是最小的,并且最优跳数与源-目的距离呈亚线性关系。通过对原始网络场景的模拟表明,在中继过程密度足够大的情况下,分析结果是准确的。我们的结论是,给定所考虑的MAC协议,我们的分析为涉及少量跳数的随机多跳网络提供了延迟最小化路由策略。
{"title":"A delay-minimizing routing strategy for wireless multi-hop networks","authors":"Kostas Stamatiou, F. Rossetto, M. Haenggi, T. Javidi, J. Zeidler, M. Zorzi","doi":"10.1109/WIOPT.2009.5291567","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291567","url":null,"abstract":"We consider a network where each route comprises a backlogged source, a number of relays and a destination at a finite distance. The locations of the sources and the relays are realizations of independent Poisson point processes. Given that the nodes observe a TDMA/ALOHA MAC protocol, our objective is to determine the number of relays and their placement such that the mean end-to-end delay in a typical route of the network is minimized.We first study an idealistic network model where all routes have the same number of hops, the same distance per hop and their own dedicated relays. Combining tools from queueing theory and stochastic geometry, we provide a precise characterization of the mean end-to-end delay. We find that the delay is minimized if the first hop is much longer than the remaining hops and that the optimal number of hops scales sublinearly with the source-destination distance. Simulating the original network scenario reveals that the analytical results are accurate, provided that the density of the relay process is sufficiently large. We conclude that, given the considered MAC protocol, our analysis provides a delay-minimizing routing strategy for random, multihop networks involving a small number of hops.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"48 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Multi-sensor event detection under temporal correlations with renewable energy sources 可再生能源时间相关性下的多传感器事件检测
Neeraj Jaggi, K. Kar
Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective, such as detection of application specific events. This paper focuses on the design of efficient algorithms for multi-sensor activation in order to optimize the overall event detection probability. The recharge-discharge dynamics of the individual rechargeable sensor nodes, along with temporally correlated nature of event occurrences makes the optimal multi-sensor event detection question very challenging. We formulate the dynamic multi-sensor event detection question in a stochastic optimization framework, and design efficient sensor activation algorithms. Particularly, we analyze certain classes of threshold activation policies and show that they achieve near-optimal performance when the threshold is chosen carefully. Specifically, we show that a time-invariant threshold policy, which attempts to maintain a fixed number (appropriately chosen) of sensors active at all times, is optimal in absence of temporal correlations. Moreover, the same energy-balancing time-invariant threshold policy approaches optimality in presence of temporal correlations as well, albeit under certain limiting assumptions. Through simulation studies, we compare the performance of this time-invariant policy with energy-balancing correlation-dependent policies, and observe that although the latter perform better, the performance difference is rather small.
传感器网络在环境监测、救济行动、监视、保健和国防方面有重要应用。未来的传感器网络将包括具有可再生能源(如太阳能)能量收集能力的传感设备。部署在感兴趣区域的多个传感器节点将协作实现全局目标,例如检测特定应用程序事件。本文重点研究了多传感器激活的有效算法设计,以优化整体事件检测概率。单个可充电传感器节点的充放电动力学,以及事件发生的时间相关性,使得最优的多传感器事件检测问题非常具有挑战性。我们在随机优化框架中提出了动态多传感器事件检测问题,并设计了高效的传感器激活算法。特别是,我们分析了某些类型的阈值激活策略,并表明当仔细选择阈值时,它们可以获得接近最佳的性能。具体来说,我们表明,在没有时间相关性的情况下,尝试保持固定数量(适当选择)的活动传感器的时不变阈值策略是最优的。此外,尽管在某些限制假设下,相同的能量平衡定常阈值策略在存在时间相关性的情况下也接近最优性。通过仿真研究,我们比较了这种时不变策略与能量平衡相关依赖策略的性能,发现后者虽然性能更好,但性能差异很小。
{"title":"Multi-sensor event detection under temporal correlations with renewable energy sources","authors":"Neeraj Jaggi, K. Kar","doi":"10.1109/WIOPT.2009.5291634","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291634","url":null,"abstract":"Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective, such as detection of application specific events. This paper focuses on the design of efficient algorithms for multi-sensor activation in order to optimize the overall event detection probability. The recharge-discharge dynamics of the individual rechargeable sensor nodes, along with temporally correlated nature of event occurrences makes the optimal multi-sensor event detection question very challenging. We formulate the dynamic multi-sensor event detection question in a stochastic optimization framework, and design efficient sensor activation algorithms. Particularly, we analyze certain classes of threshold activation policies and show that they achieve near-optimal performance when the threshold is chosen carefully. Specifically, we show that a time-invariant threshold policy, which attempts to maintain a fixed number (appropriately chosen) of sensors active at all times, is optimal in absence of temporal correlations. Moreover, the same energy-balancing time-invariant threshold policy approaches optimality in presence of temporal correlations as well, albeit under certain limiting assumptions. Through simulation studies, we compare the performance of this time-invariant policy with energy-balancing correlation-dependent policies, and observe that although the latter perform better, the performance difference is rather small.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121232200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Finite random geometric graphs by circular and square coverage 有限随机几何图形由圆形和正方形覆盖
Chi-Kin Chau
Random geometric graphs are widely-used for modelling wireless ad hoc networks, where nodes are randomly deployed with each covering a finite region. The fundamental properties of random geometric graphs are often studied in the literature, such as the probability of connectivity and random coverage area. While there are numerous asymptotic results that concern the related scaling laws in very large random geometric graphs, more accurate estimation for the finite cases with moderate-sized networks remains challenging. In this paper, we present a remarkably good approximation relationship for the probability of connectivity and random coverage area between the random geometric graphs induced by circular and square coverage models, under suitable normalisation. We also provide analytical results towards justifying the good approximation relationship. This relationship is then exploited, combining with the results from reliability studies, to obtain more accurate estimation for the probability of connectivity in finite random geometric graphs.
随机几何图广泛用于无线自组织网络建模,其中节点随机部署,每个节点覆盖有限区域。文献中经常研究随机几何图的基本性质,如连通性概率和随机覆盖面积。虽然在非常大的随机几何图中有许多关于相关标度律的渐近结果,但对中等规模网络的有限情况进行更准确的估计仍然具有挑战性。在适当的归一化条件下,我们给出了圆形和方形覆盖模型所生成的随机几何图的连通性概率和随机覆盖面积的一个非常好的近似关系。我们还提供了分析结果来证明良好的近似关系。然后利用这种关系,结合可靠性研究的结果,获得有限随机几何图中连通性概率的更准确估计。
{"title":"Finite random geometric graphs by circular and square coverage","authors":"Chi-Kin Chau","doi":"10.1109/WIOPT.2009.5291570","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291570","url":null,"abstract":"Random geometric graphs are widely-used for modelling wireless ad hoc networks, where nodes are randomly deployed with each covering a finite region. The fundamental properties of random geometric graphs are often studied in the literature, such as the probability of connectivity and random coverage area. While there are numerous asymptotic results that concern the related scaling laws in very large random geometric graphs, more accurate estimation for the finite cases with moderate-sized networks remains challenging. In this paper, we present a remarkably good approximation relationship for the probability of connectivity and random coverage area between the random geometric graphs induced by circular and square coverage models, under suitable normalisation. We also provide analytical results towards justifying the good approximation relationship. This relationship is then exploited, combining with the results from reliability studies, to obtain more accurate estimation for the probability of connectivity in finite random geometric graphs.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Bargaining over fading interference channels 在衰落干扰信道上讨价还价
J. Brehmer, W. Utschick
We consider the problem of bargaining over block fading interference channels, where interaction between players takes place over multiple channel realizations. Based on the assumption that the transmitters have conflicting objectives, we use axiomatic bargaining theory to derive optimal rate allocations in each block. In the setup under consideration, the Nash bargaining solution (NBS) is non-causal, i.e., cannot be implemented in a real-world system. We argue that the invariance axiom is superfluous when bargaining over a rate region. Without the invariance axiom, an equivalent solution follows from the maximization of a sum of utilities under minimum utility constraints. This alternative solution is also non-causal. We propose causal approximations to the optimal solutions. The sum utility solution allows for a more systematic approximation than the NBS. Thus, dropping the invariance axiom makes it possible to choose a solution which can be better approximated. We provide numerical results to illustrate the performance of the proposed solutions.
我们考虑在块衰落干扰信道上讨价还价的问题,其中参与者之间的交互发生在多个信道实现上。基于发射机目标冲突的假设,我们使用公理议价理论推导出每个区块的最优费率分配。在考虑的设置中,纳什议价解决方案(NBS)是非因果的,即不能在现实世界系统中实现。我们论证了在速率域上讨价还价时不变性公理是多余的。在没有不变性公理的情况下,从最小效用约束下效用和的最大化得到一个等价解。这种替代解决方案也是非因果的。我们提出了最优解的因果近似。与国家统计局相比,总和效用解决方案允许更系统的近似。因此,放弃不变性公理使得选择一个可以更好地近似的解成为可能。我们提供了数值结果来说明所提出的解决方案的性能。
{"title":"Bargaining over fading interference channels","authors":"J. Brehmer, W. Utschick","doi":"10.1109/WIOPT.2009.5291614","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291614","url":null,"abstract":"We consider the problem of bargaining over block fading interference channels, where interaction between players takes place over multiple channel realizations. Based on the assumption that the transmitters have conflicting objectives, we use axiomatic bargaining theory to derive optimal rate allocations in each block. In the setup under consideration, the Nash bargaining solution (NBS) is non-causal, i.e., cannot be implemented in a real-world system. We argue that the invariance axiom is superfluous when bargaining over a rate region. Without the invariance axiom, an equivalent solution follows from the maximization of a sum of utilities under minimum utility constraints. This alternative solution is also non-causal. We propose causal approximations to the optimal solutions. The sum utility solution allows for a more systematic approximation than the NBS. Thus, dropping the invariance axiom makes it possible to choose a solution which can be better approximated. We provide numerical results to illustrate the performance of the proposed solutions.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117227028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying RFID tag categories in linear time 在线性时间内识别RFID标签类别
M. Kodialam, W. Lau, T. Nandagopal
Given a large set of RFID tags, we are interested in determining the categories of tags that are present in the shortest time possible. Since there can be more than one tag present in a particular category, pure randomized strategies that rely on resolving individual tags are very inefficient. Instead, we rely on a pseudo-random strategy that utilizes a uniform hash function to accurately identify all t categories present among a given set of ψ tags with high probability. We propose two algorithms: (a) a single frame algorithm that determines the optimal frame size, and (b) a probabilistic version where the frame size is fixed, and we select the probability to minimize the number of frames needed for identification. Both of these algorithms run in time linear to the number of categories present, t. We show that our approach significantly outperforms existing algorithms for category identification. The performance of our algorithms is within a constant factor of the lower bound.
给定大量的RFID标签,我们感兴趣的是确定在尽可能短的时间内出现的标签类别。由于在一个特定的类别中可能存在多个标签,因此依赖于解析单个标签的纯随机策略非常低效。相反,我们依赖于伪随机策略,该策略利用统一哈希函数以高概率准确识别给定的一组ψ标签中存在的所有t个类别。我们提出了两种算法:(a)确定最佳帧大小的单帧算法,以及(b)帧大小固定的概率版本,我们选择概率来最小化识别所需的帧数。这两种算法都与现有的类别数量t呈时间线性关系。我们表明,我们的方法显著优于现有的类别识别算法。我们的算法的性能在下界的一个常数因子内。
{"title":"Identifying RFID tag categories in linear time","authors":"M. Kodialam, W. Lau, T. Nandagopal","doi":"10.1109/WIOPT.2009.5291639","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291639","url":null,"abstract":"Given a large set of RFID tags, we are interested in determining the categories of tags that are present in the shortest time possible. Since there can be more than one tag present in a particular category, pure randomized strategies that rely on resolving individual tags are very inefficient. Instead, we rely on a pseudo-random strategy that utilizes a uniform hash function to accurately identify all t categories present among a given set of ψ tags with high probability. We propose two algorithms: (a) a single frame algorithm that determines the optimal frame size, and (b) a probabilistic version where the frame size is fixed, and we select the probability to minimize the number of frames needed for identification. Both of these algorithms run in time linear to the number of categories present, t. We show that our approach significantly outperforms existing algorithms for category identification. The performance of our algorithms is within a constant factor of the lower bound.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128443779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications 在延迟敏感应用的认知多中继系统中利用缓冲区
Yan Chen, V. Lau, Shunqing Zhang, Peiliang Qiu
Cognitive and cooperative technologies are two core components in the design of next generation wireless networks. One key issue associated with cognitive transmission is the inefficient spectrum sharing of the secondary system, especially for secondary communications separated by long distance. To boost the spectrum sharing efficiency, cognitive multi-relay system appears to be an attractive solution for the cognitive transmission systems. In this paper, we consider a cognitive multi-relay (CMR) system and propose a novel CMR buffered decode-and-forward protocol that exploit the buffers in the source and each relay node. Moreover, we derive the closed-form average end-to-end delay and the stability region by exploiting the birth-death nature of the queue dynamics and the methods of state aggregation and queue dominance. Comparing with the baseline protocols through analytical and numerical results, the proposed CMR-BDF scheme can dynamically adjust the cognitive transmission to exploit the spatial PU burstiness while simultaneously benefits from the advantage of double-sided selection diversity in both the source-relay and relay-destination interfaces.
认知技术和协作技术是下一代无线网络设计的两个核心组成部分。与认知传输相关的一个关键问题是二级系统的频谱共享效率低下,特别是对于远距离分离的二级通信。为了提高频谱共享效率,认知多中继系统是认知传输系统中一个有吸引力的解决方案。在本文中,我们考虑了一个认知多中继(CMR)系统,并提出了一种新的CMR缓冲解码和转发协议,该协议利用了源和每个中继节点中的缓冲区。利用队列动力学的生-死性质,利用状态聚合和队列优势的方法,导出了闭型平均端到端延迟和稳定区域。分析和数值结果表明,与基线协议相比,CMR-BDF方案可以动态调整认知传输以利用空间PU突发性,同时利用源中继和中继目的接口的双面选择分集优势。
{"title":"Exploiting buffers in cognitive multi-relay systems for delay-sensitive applications","authors":"Yan Chen, V. Lau, Shunqing Zhang, Peiliang Qiu","doi":"10.1109/WIOPT.2009.5291602","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291602","url":null,"abstract":"Cognitive and cooperative technologies are two core components in the design of next generation wireless networks. One key issue associated with cognitive transmission is the inefficient spectrum sharing of the secondary system, especially for secondary communications separated by long distance. To boost the spectrum sharing efficiency, cognitive multi-relay system appears to be an attractive solution for the cognitive transmission systems. In this paper, we consider a cognitive multi-relay (CMR) system and propose a novel CMR buffered decode-and-forward protocol that exploit the buffers in the source and each relay node. Moreover, we derive the closed-form average end-to-end delay and the stability region by exploiting the birth-death nature of the queue dynamics and the methods of state aggregation and queue dominance. Comparing with the baseline protocols through analytical and numerical results, the proposed CMR-BDF scheme can dynamically adjust the cognitive transmission to exploit the spatial PU burstiness while simultaneously benefits from the advantage of double-sided selection diversity in both the source-relay and relay-destination interfaces.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134090316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different dynamics for optimal association in heterogeneous wireless networks 异构无线网络中最优关联的不同动态
Pierre Coucheney, Corinne Touati, B. Gaujal
Most of recent mobile equipment now supports different network technologies (WiFi, WiMax, LTE, Bluetooth and such like). Meanwhile, network operators offer services through these different technologies. The superposition of the different technologies (using different frequency band) increases the potential throughput of the system and hence global performance.
大多数最新的移动设备现在支持不同的网络技术(WiFi, WiMax, LTE,蓝牙等)。同时,网络运营商通过这些不同的技术提供服务。不同技术(使用不同频带)的叠加增加了系统的潜在吞吐量,从而提高了全局性能。
{"title":"Different dynamics for optimal association in heterogeneous wireless networks","authors":"Pierre Coucheney, Corinne Touati, B. Gaujal","doi":"10.1109/WIOPT.2009.5291583","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291583","url":null,"abstract":"Most of recent mobile equipment now supports different network technologies (WiFi, WiMax, LTE, Bluetooth and such like). Meanwhile, network operators offer services through these different technologies. The superposition of the different technologies (using different frequency band) increases the potential throughput of the system and hence global performance.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127699470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network coding for data dissemination: it is not what you know, but what your neighbors don't know 数据传播的网络编码:不是你知道什么,而是你的邻居不知道什么
D. Lucani, F. Fitzek, M. Médard, M. Stojanovic
We propose a linear network coding scheme to disseminate a finite number of data packets in arbitrary networks. The setup assumes a packet erasure channel, slotted time, and that nodes cannot transmit and receive information simultaneously. The dissemination process is completed when all terminals can decode the original data packets. We also assume a perfect knowledge of the information at each of the nodes, but not necessarily a perfect knowledge of the channel. A centralized controller decides which nodes should transmit, to what set of receiver nodes, and what information should be broadcasted. We show that the problem can be thought of as a scheduling problem, which is hard to solve. Thus, we consider the use of a greedy algorithm that only takes into account the current state of the system to make a decision. The proposed algorithm tries to maximize the impact on the network at each slot, i.e. maximize the number of nodes that will benefit from the coded packet sent by each active transmitter. We show that our scheme is considerably better, in terms of the number of slots to complete transmission, than schemes that choose the node with more information as the transmitter at every time slot.
我们提出了一种线性网络编码方案,可以在任意网络中传播有限数量的数据包。该设置假定有一个包擦除通道、槽时间,并且节点不能同时发送和接收信息。当所有终端都能解码原始数据包时,传播过程就完成了。我们还假设对每个节点上的信息有完美的了解,但不一定对通道有完美的了解。一个集中的控制器决定哪些节点应该传输,向哪一组接收节点发送,以及应该广播哪些信息。我们证明了这个问题可以被认为是一个难以解决的调度问题。因此,我们考虑使用贪婪算法,它只考虑系统的当前状态来做出决策。所提出的算法试图最大化每个时隙对网络的影响,即最大化从每个主动发送器发送的编码数据包中受益的节点数量。我们表明,就完成传输的时隙数量而言,我们的方案比在每个时隙选择具有更多信息的节点作为发送器的方案要好得多。
{"title":"Network coding for data dissemination: it is not what you know, but what your neighbors don't know","authors":"D. Lucani, F. Fitzek, M. Médard, M. Stojanovic","doi":"10.1109/WIOPT.2009.5291585","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291585","url":null,"abstract":"We propose a linear network coding scheme to disseminate a finite number of data packets in arbitrary networks. The setup assumes a packet erasure channel, slotted time, and that nodes cannot transmit and receive information simultaneously. The dissemination process is completed when all terminals can decode the original data packets. We also assume a perfect knowledge of the information at each of the nodes, but not necessarily a perfect knowledge of the channel. A centralized controller decides which nodes should transmit, to what set of receiver nodes, and what information should be broadcasted. We show that the problem can be thought of as a scheduling problem, which is hard to solve. Thus, we consider the use of a greedy algorithm that only takes into account the current state of the system to make a decision. The proposed algorithm tries to maximize the impact on the network at each slot, i.e. maximize the number of nodes that will benefit from the coded packet sent by each active transmitter. We show that our scheme is considerably better, in terms of the number of slots to complete transmission, than schemes that choose the node with more information as the transmitter at every time slot.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
On a generic entropy measure in physics and information 物理学和信息学中的一般熵测度
M. Elnaggar, A. Kempf
We define a generalized entropy that measures the evenness of the distribution of the real non-negative elements of a multiset X . The approach is to determine a comparison multiset R which is in a precise sense equivalent to X and which contains only one distinct positive element, whose multiplicity k then yields the desired measure. To this end, R and X are considered equivalent if their p− and q− norms coincide. Accordingly, we define k and its logarithm to be the effective cardinality and the generalized entropy of X respectively, of the order p,q . We show that the new entropy measure is a generalization of the Rényi entropy after proper normalization of the multiset elements. We also discuss some properties of the proposed measure.
我们定义了一个广义熵来度量多集合X的实非负元素分布的均匀性。该方法是确定一个比较多集R,它在精确意义上相当于X,并且只包含一个不同的正元素,其多重性k然后产生所需的测度。为此,如果R和X的p -和q -模重合,则认为它们是等价的。因此,我们定义k及其对数分别为X的有效基数和广义熵,其阶为p,q。我们证明了新的熵测度是在对多集元素进行适当的归一化之后,对rsamunyi熵的一种推广。我们还讨论了所提措施的一些性质。
{"title":"On a generic entropy measure in physics and information","authors":"M. Elnaggar, A. Kempf","doi":"10.1109/WIOPT.2009.5291598","DOIUrl":"https://doi.org/10.1109/WIOPT.2009.5291598","url":null,"abstract":"We define a generalized entropy that measures the evenness of the distribution of the real non-negative elements of a multiset X . The approach is to determine a comparison multiset R which is in a precise sense equivalent to X and which contains only one distinct positive element, whose multiplicity k then yields the desired measure. To this end, R and X are considered equivalent if their p− and q− norms coincide. Accordingly, we define k and its logarithm to be the effective cardinality and the generalized entropy of X respectively, of the order p,q . We show that the new entropy measure is a generalization of the Rényi entropy after proper normalization of the multiset elements. We also discuss some properties of the proposed measure.","PeriodicalId":143632,"journal":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116862045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1