首页 > 最新文献

... IEEE Global Communications Conference. IEEE Global Communications Conference最新文献

英文 中文
Energy-efficient power allocation in cognitive sensor networks: A game theoretic approach 认知传感器网络中的节能功率分配:一种博弈论方法
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503148
Bo Chai, Ruilong Deng, Peng Cheng, Jiming Chen
In this paper, we study power allocation in cognitive sensor networks where cognitive users (cognitive enabled sensor nodes) opportunistically share a common spectrum with primary users (licensed devices). We define an energy efficiency-oriented utility function as a new metric to evaluate power allocation. Consider that sensor nodes are self-interested to maximize their own utility, we formulate the energy efficient power allocation problem as a non-cooperative game. We firstly prove that there exist Nash equilibriums in the proposed game. Secondly, we prove that the power allocation game is a supermodular game with some conditions. Finally, we use best response algorithm to identify the Nash equilibrium. Simulations are conducted to demonstrate that the proposed power allocation strategy can achieve satisfactory performance in terms of energy efficiency, convergence speed and fairness in cognitive sensor networks.
在本文中,我们研究了认知传感器网络中的功率分配,其中认知用户(认知启用的传感器节点)机会性地与主用户(许可设备)共享公共频谱。我们定义了一个以能源效率为导向的效用函数作为评估电力分配的新指标。考虑到传感器节点是自利的,以最大化自身的效用,我们将节能功率分配问题表述为一个非合作博弈。首先证明了所提对策存在纳什均衡。其次,在一定条件下证明了权力分配博弈是一个超模博弈。最后,利用最佳响应算法确定纳什均衡。仿真结果表明,在认知传感器网络中,所提出的功率分配策略在能量效率、收敛速度和公平性方面都取得了令人满意的性能。
{"title":"Energy-efficient power allocation in cognitive sensor networks: A game theoretic approach","authors":"Bo Chai, Ruilong Deng, Peng Cheng, Jiming Chen","doi":"10.1109/GLOCOM.2012.6503148","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503148","url":null,"abstract":"In this paper, we study power allocation in cognitive sensor networks where cognitive users (cognitive enabled sensor nodes) opportunistically share a common spectrum with primary users (licensed devices). We define an energy efficiency-oriented utility function as a new metric to evaluate power allocation. Consider that sensor nodes are self-interested to maximize their own utility, we formulate the energy efficient power allocation problem as a non-cooperative game. We firstly prove that there exist Nash equilibriums in the proposed game. Secondly, we prove that the power allocation game is a supermodular game with some conditions. Finally, we use best response algorithm to identify the Nash equilibrium. Simulations are conducted to demonstrate that the proposed power allocation strategy can achieve satisfactory performance in terms of energy efficiency, convergence speed and fairness in cognitive sensor networks.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"33 1","pages":"416-421"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76400103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Capacity analysis and power allocation under imperfect channel estimation for AF-based cooperative relay systems 基于af的协同中继系统不完全信道估计下的容量分析与功率分配
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503857
Chin-Liang Wang, Jyun-Yu Chen, Hung-Chin Wang
In this paper, we investigate the effect of channel estimation errors on the capacity of amplify-and-forward cooperative relay systems. Since an exact capacity expression in the presence of channel estimation errors is difficult to be found, we turn to derive its lower bound instead. Accordingly, by maximizing the derived lower bound, we propose power allocation schemes for both single-relay and multi-relay systems. For single-relay systems, an analytical solution for inequality constrained problem is too complicated to be obtained. Thus, we propose a gradient descent algorithm with a log-barrier function to solve the inequality constrained problem. For multi-relay systems, in terms of the channel estimates and the corresponding mean-squared errors, we provide a water-filling solution for the optimal power allocation among the relays. Simulation results show that the proposed power allocation schemes yield capacity gain compared with equal power allocation at low to medium signal-to-noise ratios.
本文研究了信道估计误差对放大转发协同中继系统容量的影响。由于难以找到存在信道估计误差的精确容量表达式,我们转而推导其下界。因此,通过最大化导出的下界,我们提出了单继电器和多继电器系统的功率分配方案。对于单继电器系统,不等式约束问题的解析解过于复杂,难以得到。因此,我们提出了一种带对数障碍函数的梯度下降算法来解决不等式约束问题。对于多继电器系统,在信道估计和相应的均方误差方面,我们为继电器之间的最佳功率分配提供了一种注水解决方案。仿真结果表明,在中低信噪比下,与等功率分配方案相比,所提出的功率分配方案可获得容量增益。
{"title":"Capacity analysis and power allocation under imperfect channel estimation for AF-based cooperative relay systems","authors":"Chin-Liang Wang, Jyun-Yu Chen, Hung-Chin Wang","doi":"10.1109/GLOCOM.2012.6503857","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503857","url":null,"abstract":"In this paper, we investigate the effect of channel estimation errors on the capacity of amplify-and-forward cooperative relay systems. Since an exact capacity expression in the presence of channel estimation errors is difficult to be found, we turn to derive its lower bound instead. Accordingly, by maximizing the derived lower bound, we propose power allocation schemes for both single-relay and multi-relay systems. For single-relay systems, an analytical solution for inequality constrained problem is too complicated to be obtained. Thus, we propose a gradient descent algorithm with a log-barrier function to solve the inequality constrained problem. For multi-relay systems, in terms of the channel estimates and the corresponding mean-squared errors, we provide a water-filling solution for the optimal power allocation among the relays. Simulation results show that the proposed power allocation schemes yield capacity gain compared with equal power allocation at low to medium signal-to-noise ratios.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"65 1","pages":"4677-4682"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83951781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Congestion Level based end-to-end acknowledgement mechanism for Delay Tolerant Networks 延迟容忍网络中基于拥塞级别的端到端确认机制
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503338
Ying An, Jiawei Huang, Hong Song, Jianxin Wang
End-to-end reliability in Delay Tolerant Networks (DTNs) is challenging and complicated because of high delay and absence of stable end-to-end path in the intermittently-connected mobile environment. Some existing acknowledgement mechanisms use active forwarding to provide the end-to-end reliability, while incurring excessive retransmissions or replications. The other passive mechanisms aim to reduce the storage overhead but may suffer a large delay. To improve the storage-delay tradeoff, we propose a Congestion Level based end-to-end ACKnowledgement (CL-ACK) mechanism, which adaptively adjusts the spread manner of ACK packets according to the ratio of drops over replications. Simulation results show that CL-ACK effectively controls resources consumption, reduces end-to-end delay, and achieves high message delivery rate.
在间歇性连接的移动环境中,由于延迟容忍网络的高延迟和缺乏稳定的端到端路径,使得端到端可靠性问题具有挑战性和复杂性。一些现有的确认机制使用主动转发来提供端到端的可靠性,同时会产生过多的重传或复制。其他被动机制的目的是减少存储开销,但可能会有很大的延迟。为了改善存储延迟的权衡,我们提出了一种基于拥塞水平的端到端确认(CL-ACK)机制,该机制根据丢失与复制的比率自适应调整ACK数据包的传播方式。仿真结果表明,CL-ACK有效地控制了资源消耗,降低了端到端延迟,实现了较高的消息传发率。
{"title":"A Congestion Level based end-to-end acknowledgement mechanism for Delay Tolerant Networks","authors":"Ying An, Jiawei Huang, Hong Song, Jianxin Wang","doi":"10.1109/GLOCOM.2012.6503338","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503338","url":null,"abstract":"End-to-end reliability in Delay Tolerant Networks (DTNs) is challenging and complicated because of high delay and absence of stable end-to-end path in the intermittently-connected mobile environment. Some existing acknowledgement mechanisms use active forwarding to provide the end-to-end reliability, while incurring excessive retransmissions or replications. The other passive mechanisms aim to reduce the storage overhead but may suffer a large delay. To improve the storage-delay tradeoff, we propose a Congestion Level based end-to-end ACKnowledgement (CL-ACK) mechanism, which adaptively adjusts the spread manner of ACK packets according to the ratio of drops over replications. Simulation results show that CL-ACK effectively controls resources consumption, reduces end-to-end delay, and achieves high message delivery rate.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"44 1","pages":"1574-1579"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90491858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Energy efficient scheduling for delay constrained communication in wireless body area networks 基于时延约束的无线体域网络通信节能调度
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503123
Qinghua Shen, W. Zhuang
Delay constraint and sensor energy consumption requirements are two core issues for e-healthcare applications in wireless body area networks. In this paper, we investigate the data transmission scheduling problem to utilize the sleep and opportunistic transmission for energy efficiency, while guaran- teeing the worst-case delay for medical data transmission. To achieve sensor energy saving by exploiting propagation channel quality with a deterministic delay requirement poses challenges in developing a scheduling policy. We address this problem using a Lyapunov optimization formulation and propose a two-step scheduling algorithm. We prove that the algorithm can provide worst-case delay guarantee under certain conditions. Theoretical analysis and simulation results are presented to demonstrate the tradeoff between the transmission delay and energy consumption.
延迟约束和传感器能耗要求是无线体域网络中电子医疗应用的两个核心问题。本文研究了医疗数据传输的调度问题,在保证最坏情况延迟的情况下,利用睡眠和机会传输来提高能源效率。利用具有确定性延迟要求的传播信道质量来实现传感器的节能,对调度策略的制定提出了挑战。我们使用Lyapunov优化公式来解决这个问题,并提出了一个两步调度算法。证明了该算法在一定条件下可以提供最坏情况下的延迟保证。理论分析和仿真结果证明了传输延迟和能量消耗之间的权衡。
{"title":"Energy efficient scheduling for delay constrained communication in wireless body area networks","authors":"Qinghua Shen, W. Zhuang","doi":"10.1109/GLOCOM.2012.6503123","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503123","url":null,"abstract":"Delay constraint and sensor energy consumption requirements are two core issues for e-healthcare applications in wireless body area networks. In this paper, we investigate the data transmission scheduling problem to utilize the sleep and opportunistic transmission for energy efficiency, while guaran- teeing the worst-case delay for medical data transmission. To achieve sensor energy saving by exploiting propagation channel quality with a deterministic delay requirement poses challenges in developing a scheduling policy. We address this problem using a Lyapunov optimization formulation and propose a two-step scheduling algorithm. We prove that the algorithm can provide worst-case delay guarantee under certain conditions. Theoretical analysis and simulation results are presented to demonstrate the tradeoff between the transmission delay and energy consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"14 1","pages":"262-267"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74691453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Peer selection in P2P file sharing systems over mobile cellular networks with consideration of downlink bandwidth limitation 考虑下行带宽限制的移动蜂窝网络P2P文件共享系统的对等点选择
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503406
Yan Zhang, Xu Zhou, Xuezhen Zhang, Shuhao Liu, D. Liao
In P2P file sharing systems over mobile cellular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of the requesting peer's demand respectively. Our algorithms take the requesting peer's downlink bandwidth as the target of the sum of the selected peers' uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the lowest traffic load before choosing each peer. We also provide a Fuzzy Cognitive Map that can be used to estimate peers' service ability in P2P systems over mobile cellular networks. Simulation results show that in respective cases DBaT-B and DBaT-N can both achieve much better load balance on cells than some traditional algorithms while ensuring favorable file transfer speed.
在移动蜂窝网络上的P2P文件共享系统中,文件传输速度的瓶颈通常是接收方的下行带宽,而不是发送方的上行带宽。本文考虑了下行链路带宽限制对文件传输速度的影响,提出了两种新的对等体选择算法,分别针对请求对等体需求的两种不同情况设计了DBaT-B和DBaT-N算法。我们的算法将请求对等体的下行带宽作为所选对等体上行带宽之和的目标。为了保证单元间的负载均衡,在选择每个对等节点之前,它们会先选择一个流量负载最低的单元。我们还提供了一个模糊认知图,可用于估计移动蜂窝网络上P2P系统中同伴的服务能力。仿真结果表明,在各自的情况下,DBaT-B和DBaT-N在保证良好的文件传输速度的同时,都能比一些传统算法实现更好的单元负载平衡。
{"title":"Peer selection in P2P file sharing systems over mobile cellular networks with consideration of downlink bandwidth limitation","authors":"Yan Zhang, Xu Zhou, Xuezhen Zhang, Shuhao Liu, D. Liao","doi":"10.1109/GLOCOM.2012.6503406","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503406","url":null,"abstract":"In P2P file sharing systems over mobile cellular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of the requesting peer's demand respectively. Our algorithms take the requesting peer's downlink bandwidth as the target of the sum of the selected peers' uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the lowest traffic load before choosing each peer. We also provide a Fuzzy Cognitive Map that can be used to estimate peers' service ability in P2P systems over mobile cellular networks. Simulation results show that in respective cases DBaT-B and DBaT-N can both achieve much better load balance on cells than some traditional algorithms while ensuring favorable file transfer speed.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"40 1","pages":"1981-1987"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84588451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient scheduling for wireless communication system 无线通信系统的节能调度
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503907
Kuhn-Chang Lin, Jiun-You Lai, Y. Su
Energy-efficient scheduling problem in wireless communication system is investigated in this paper. We propose two near-optimal schedulers which have simple structures for the general hard delay constraint scenario. Both single-user and multiuser cases are considered. The first scheduler invokes Gaussian approximation while the second one is inspired by the inverse water-filling (IWF) approach. The scheduling policies consist of a channel-awareness term and a delay-awareness term. Numerical results show that the proposed policies achieve near optimal performance when the total required transmit bits, R, is large. For the multiuser scenario, our scheduling strategy consists of an initial resource (number of time slots) allocation and a slot-by-slot user selection and bit loading algorithm. The former depends on the rate requirement and a priori knowledge of user-dependent channel statistic while the latter use an order statistic based approach designed to minimize the expected total energy consumption.
研究了无线通信系统中的节能调度问题。针对一般硬延迟约束场景,我们提出了两个结构简单的近最优调度程序。考虑了单用户和多用户情况。第一个调度器调用高斯近似,而第二个调度器的灵感来自逆注水(IWF)方法。调度策略由通道感知项和延迟感知项组成。数值结果表明,当所需的总传输位R较大时,所提策略的性能接近最优。对于多用户场景,我们的调度策略包括初始资源(时隙数量)分配和逐时隙用户选择和位加载算法。前者依赖于速率要求和用户相关信道统计的先验知识,而后者使用基于顺序统计的方法,旨在最小化预期总能耗。
{"title":"Energy-efficient scheduling for wireless communication system","authors":"Kuhn-Chang Lin, Jiun-You Lai, Y. Su","doi":"10.1109/GLOCOM.2012.6503907","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503907","url":null,"abstract":"Energy-efficient scheduling problem in wireless communication system is investigated in this paper. We propose two near-optimal schedulers which have simple structures for the general hard delay constraint scenario. Both single-user and multiuser cases are considered. The first scheduler invokes Gaussian approximation while the second one is inspired by the inverse water-filling (IWF) approach. The scheduling policies consist of a channel-awareness term and a delay-awareness term. Numerical results show that the proposed policies achieve near optimal performance when the total required transmit bits, R, is large. For the multiuser scenario, our scheduling strategy consists of an initial resource (number of time slots) allocation and a slot-by-slot user selection and bit loading algorithm. The former depends on the rate requirement and a priori knowledge of user-dependent channel statistic while the latter use an order statistic based approach designed to minimize the expected total energy consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"82 1","pages":"4969-4974"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85409703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards active measurement for DNS query behavior of botnets 僵尸网络DNS查询行为主动测量研究
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503218
Xiaobo Ma, Jianfeng Li, Jing Tao, X. Guan
Domain names play an increasingly important role for the botnet activities. Traditionally, DNS traces from several local DNS servers are used passively to measure the DNS query behavior. However, since botnets are a wide-scale threat and usually reside in geographically dispersed networks, the vantage point of several local DNS servers is sometimes too small to help us understand the DNS query behavior (e.g., whether queried or not, average query rate) of botnets. In this paper, we actively measure the DNS query behavior of botnets in geographically dispersed networks via the DNS cache probing technique. We first analytically characterize how multiple domain names are queried by botnets in different networks under certain circumstances. Then, we actively measure real botnet samples in the wild to gain insight into how multiple domain names are queried by botnets in 480 geographically dispersed networks globally, and show that our analytical characterization well describes the DNS query behavior of the botnet samples. The active measurement technique can help to acquire extensive DNS query information in different networks and thus potentially facilitate various DNS-related research and applications.
域名在僵尸网络活动中扮演着越来越重要的角色。传统的方法是被动地使用多个本地DNS服务器的DNS跟踪信息来衡量DNS查询行为。然而,由于僵尸网络是一个大规模的威胁,通常驻留在地理上分散的网络中,几个本地DNS服务器的优势点有时太小,无法帮助我们理解僵尸网络的DNS查询行为(例如,是否查询,平均查询率)。在本文中,我们通过DNS缓存探测技术主动测量地理分散网络中僵尸网络的DNS查询行为。我们首先分析了在特定情况下僵尸网络如何在不同网络中查询多个域名。然后,我们在野外积极测量真实的僵尸网络样本,以深入了解僵尸网络如何在全球480个地理分散的网络中查询多个域名,并表明我们的分析表征很好地描述了僵尸网络样本的DNS查询行为。主动测量技术可以在不同的网络中获取大量的DNS查询信息,从而为各种DNS相关的研究和应用提供了潜在的便利。
{"title":"Towards active measurement for DNS query behavior of botnets","authors":"Xiaobo Ma, Jianfeng Li, Jing Tao, X. Guan","doi":"10.1109/GLOCOM.2012.6503218","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503218","url":null,"abstract":"Domain names play an increasingly important role for the botnet activities. Traditionally, DNS traces from several local DNS servers are used passively to measure the DNS query behavior. However, since botnets are a wide-scale threat and usually reside in geographically dispersed networks, the vantage point of several local DNS servers is sometimes too small to help us understand the DNS query behavior (e.g., whether queried or not, average query rate) of botnets. In this paper, we actively measure the DNS query behavior of botnets in geographically dispersed networks via the DNS cache probing technique. We first analytically characterize how multiple domain names are queried by botnets in different networks under certain circumstances. Then, we actively measure real botnet samples in the wild to gain insight into how multiple domain names are queried by botnets in 480 geographically dispersed networks globally, and show that our analytical characterization well describes the DNS query behavior of the botnet samples. The active measurement technique can help to acquire extensive DNS query information in different networks and thus potentially facilitate various DNS-related research and applications.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"12 1","pages":"845-849"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82301012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An optimal scheduling for file dissemination under a full binary tree of trust relationship 基于信任关系的全二叉树下的最优文件传播调度
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503203
Chin-Fu Ku, Kai-Hsiang Yang, Jan-Ming Ho
In network applications with security constraints, it is usually desirable to disseminate a file from a server through trusted network channels to a set of peers. This is a problem seldom studied in the literature though the problems of data integrity and security have been studied by many. In this paper, we study the file dissemination problem with trust relation modeled as a rooted full binary tree. We present the OOFD algorithm to schedule dissemination of the file iteratively from each peer holding a replica of the file to one of its descendants on the binary tree. We show that, in a homogeneous network, OOFD algorithm is optimum in the sense that time it takes to disseminate the file to all nodes is minimized.
在具有安全约束的网络应用程序中,通常希望通过受信任的网络通道将文件从服务器传播到一组对等点。这是一个文献中很少研究的问题,虽然数据完整性和安全性的问题已经研究了很多。本文研究了将信任关系建模为有根全二叉树的文件传播问题。我们提出了OOFD算法来调度文件的传播,从持有文件副本的每个节点迭代地传播到二叉树上的一个后代节点。我们表明,在同构网络中,OOFD算法是最优的,因为将文件传播到所有节点所需的时间最小。
{"title":"An optimal scheduling for file dissemination under a full binary tree of trust relationship","authors":"Chin-Fu Ku, Kai-Hsiang Yang, Jan-Ming Ho","doi":"10.1109/GLOCOM.2012.6503203","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503203","url":null,"abstract":"In network applications with security constraints, it is usually desirable to disseminate a file from a server through trusted network channels to a set of peers. This is a problem seldom studied in the literature though the problems of data integrity and security have been studied by many. In this paper, we study the file dissemination problem with trust relation modeled as a rooted full binary tree. We present the OOFD algorithm to schedule dissemination of the file iteratively from each peer holding a replica of the file to one of its descendants on the binary tree. We show that, in a homogeneous network, OOFD algorithm is optimum in the sense that time it takes to disseminate the file to all nodes is minimized.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"70 1","pages":"751-757"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89106820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decentralized energy-efficient base station operation for green cellular networks 绿色蜂窝网络的分散节能基站运行
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503945
Wei-Te Wong, Ya-Ju Yu, Ai-Chun Pang
Given the explosive growth of mobile subscribers, network operators have to densely deploy base stations to serve the exponentially increasing access demands. Nevertheless, recent researches have pointed out that base station operation has been identified as a significant portion of total system energy consumption and 90% of the traffic is carried by only 40% of base stations even under peak traffic demand. Therefore, switching off underutilized base stations for saving power is an important issue with the increasing awareness of environmental responsibility and economical concerns of network operators. This paper targets the problem of dynamic base station operation, with an objective to minimize total power consumption of all base stations. We prove this problem is NP-hard and cannot be approximated in polynomial time with a ratio better than 3 over 2. Then, we propose a distributed algorithm to tackle it. The simulation results show that our proposed algorithm can significantly reduce the network power consumption.
随着移动用户的爆炸式增长,网络运营商必须密集部署基站以满足指数级增长的接入需求。然而,最近的研究指出,基站运行已被确定为系统总能耗的重要组成部分,即使在高峰流量需求下,90%的流量也仅由40%的基站承载。因此,关闭未充分利用的基站以节省电力是网络运营商日益增强的环境责任意识和经济关注的一个重要问题。本文以动态基站运行问题为研究对象,以使所有基站的总功耗最小为目标。我们证明了这个问题是np困难的,并且不能在多项式时间内用优于3 / 2的比率逼近。然后,我们提出了一种分布式算法来解决这个问题。仿真结果表明,该算法可以显著降低网络功耗。
{"title":"Decentralized energy-efficient base station operation for green cellular networks","authors":"Wei-Te Wong, Ya-Ju Yu, Ai-Chun Pang","doi":"10.1109/GLOCOM.2012.6503945","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503945","url":null,"abstract":"Given the explosive growth of mobile subscribers, network operators have to densely deploy base stations to serve the exponentially increasing access demands. Nevertheless, recent researches have pointed out that base station operation has been identified as a significant portion of total system energy consumption and 90% of the traffic is carried by only 40% of base stations even under peak traffic demand. Therefore, switching off underutilized base stations for saving power is an important issue with the increasing awareness of environmental responsibility and economical concerns of network operators. This paper targets the problem of dynamic base station operation, with an objective to minimize total power consumption of all base stations. We prove this problem is NP-hard and cannot be approximated in polynomial time with a ratio better than 3 over 2. Then, we propose a distributed algorithm to tackle it. The simulation results show that our proposed algorithm can significantly reduce the network power consumption.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"30 1","pages":"5194-5200"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88327830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Two-dimensional contract theory in Cognitive Radio networks 认知无线电网络中的二维契约理论
Pub Date : 2012-12-01 DOI: 10.1109/GLOCOM.2012.6503269
Yanming Cao, Qi Shi, Xinbing Wang, Xiaohua Tian, Y. Cheng
While the spectrum resource of modern society is more and more insufficient, Cognitive Radio, which allows the Secondary Users (unlicensed users, SU) to access the licensed spectrum, is a promising solution to make the utilization of spectrum resource more efficient. Among many different paradigms of cognitive radio, market-driven spectrum trading has been proved to be an efficient way to deal with Cognitive Radio problems. In this paper, we consider the problem of spectrum trading with single primary user (PU) who has multiple spectra selling his idle spectra to multiple SUs in multiple types. Since there is only one PU, so it is a monopoly market, in which the PU sets the prices, powers and time for the spectrum he sells, just as a monopolist. SUs as customers choose the spectrum with exact price, power and time to buy. We model it as a two-dimensional power-time-price contract which is much different from the usual contract because the time could either be a strategy that an SU could decide to choose itself or a type which is not decided by SUs. We first discuss the situation in which the time is set as the strategy and we will prove that it can derive a feasible contract with some conditions. Then we will discuss the second situation in which the time is set as a type. In this situation, because the SU has two kinds of types, so it's difficult to make it become a feasible contract, however we will provide a solution to deal with this problem.
在现代社会频谱资源越来越不足的情况下,认知无线电(Cognitive Radio)是一种很有前途的解决方案,它允许二次用户(即未授权用户,SU)访问已授权的频谱,从而提高频谱资源的利用效率。在许多不同的认知无线电范式中,市场驱动的频谱交易已被证明是处理认知无线电问题的有效方法。本文研究了具有多个频谱的单个主用户(PU)将其空闲频谱以多种类型出售给多个SUs的频谱交易问题。由于只有一个PU,所以这是一个垄断市场,其中PU为他销售的频谱设定价格,功率和时间,就像垄断者一样。作为客户选择频谱与确切的价格,功率和时间购买。我们将其建模为一个二维的功率-时间-价格合约,它与通常的合约有很大的不同,因为时间可以是一个SU可以决定自己选择的策略,也可以是一个不由SU决定的类型。我们首先讨论了以时间为策略的情况,并证明了它可以在一定条件下推导出一个可行契约。然后我们将讨论将时间设置为类型的第二种情况。在这种情况下,由于SU有两种类型,所以很难使其成为一个可行的合同,但是我们会提供一个解决方案来处理这个问题。
{"title":"Two-dimensional contract theory in Cognitive Radio networks","authors":"Yanming Cao, Qi Shi, Xinbing Wang, Xiaohua Tian, Y. Cheng","doi":"10.1109/GLOCOM.2012.6503269","DOIUrl":"https://doi.org/10.1109/GLOCOM.2012.6503269","url":null,"abstract":"While the spectrum resource of modern society is more and more insufficient, Cognitive Radio, which allows the Secondary Users (unlicensed users, SU) to access the licensed spectrum, is a promising solution to make the utilization of spectrum resource more efficient. Among many different paradigms of cognitive radio, market-driven spectrum trading has been proved to be an efficient way to deal with Cognitive Radio problems. In this paper, we consider the problem of spectrum trading with single primary user (PU) who has multiple spectra selling his idle spectra to multiple SUs in multiple types. Since there is only one PU, so it is a monopoly market, in which the PU sets the prices, powers and time for the spectrum he sells, just as a monopolist. SUs as customers choose the spectrum with exact price, power and time to buy. We model it as a two-dimensional power-time-price contract which is much different from the usual contract because the time could either be a strategy that an SU could decide to choose itself or a type which is not decided by SUs. We first discuss the situation in which the time is set as the strategy and we will prove that it can derive a feasible contract with some conditions. Then we will discuss the second situation in which the time is set as a type. In this situation, because the SU has two kinds of types, so it's difficult to make it become a feasible contract, however we will provide a solution to deal with this problem.","PeriodicalId":72021,"journal":{"name":"... IEEE Global Communications Conference. IEEE Global Communications Conference","volume":"16 1","pages":"1156-1161"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73783380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
... IEEE Global Communications Conference. IEEE Global Communications Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1