The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless communications networks are often modeled as graphs in which the vertices represent wireless devices and the edges represent the communication links between them. However, graphs fail to capture the time-varying nature of wireless networks. Temporal networks are graphs in which the sets of nodes or edges are time-varying. We consider the most common case, in which the set of nodes is fixed...
An online learning problem with side information is considered. The problem is formulated as a graph structured stochastic Multi-Armed Bandit (MAB). Each node in the graph represents an arm in the bandit problem and an edge between two arms indicates closeness in their mean rewards. It is shown that such side information induces a Unit Interval Graph and several graph properties can be leveraged to...
Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different wireless devices. However, network administrators...
The emerging market of the Internet of Things (IoT) requires new energy-efficient and low-complexity Multiple-Input-Multiple-Output (MIMO-) aided radio access technologies. This trend will have a profound impact on both the theory and practice of future communication networks, which will not be purely optimized for approaching the attainable capacity anymore, but will explicitly include the energy...
The concept of mesh networks brings many challenges to the research community when designing such system. In this paper, we propose a new routing model to account for the link utilization between nodes, as well as the remaining energy left in each node. The framework, called Distributed Split-path, is implemented on top of the Optimized Link-State Routing (OLSR) protocol. We demonstrate the improvement...
Currently deployed wireless and cellular positioning techniques are optimized for outdoor operation and cannot provide highly accurate location information in indoor environments. Meanwhile, new applications and services for mobile devices, including the recent Enhanced 911 (E911), require accurate indoor location information up to the room/suite level. In this work, a new system for improving indoor...
Opportunistic communications through wireless ad-hoc mesh networks have been thoroughly studied in the context of military infrastructureless deployments, sensor networks and even human-centered pervasive networking. However, due to the lack of a model that accurately computes the probability distribution of the delay, we usually content ourselves with the mean values. Such an approach can limit both...
Indoor target tracking has garnered interest as communication systems and mobile device capabilities advance. Visible light communication (VLC) is an alternative to RF methods that uses light emitting diodes. In this paper, probabilistic filtering algorithms (particle and extended Kalman filters) are used for indoor tracking. The performance of the filters is compared with an another positioning method:...
The applications for MANETs have increased rapidly and today MANETs are capable of providing a variety of services. One of the major contributing factors is the availability of radios that are able to adapt to the channel conditions and can transmit at multiple data rates. A common approach for channel access is to employ a CSMA/CA based mechanism. However, these protocols tend to under perform at...
In this paper, we address the use of multi-layered sliding windows to detect the presence of a wireless network for cognitive radio applications. Although synchronization signals of the Long Term Evolution (LTE) has been used as the reference system, the proposed scheme is generic in principle. Our proposed scheme doesn't require any a priori knowledge of the exact synchronization sequences, so it...
We outline guiding principles for choosing the subband bandwidth of a multicarrier system with multiple antennas. Initially, we review considerations for the choice of bandwidth in fast-fading doubly dispersive channels. We append to these considerations those relevant to the use of multiple antennas for intereference rejection in the wideband regime. To weigh the benefits of narrow subbands, which...
Over the years, system calls (syscalls) have become an increasingly popular data source for host intrusion detection systems (HIDS). This is partly due to their strong security semantic implications. As syscalls conform to a program's control-flow graph, a deviation in a syscall sequence may imply a deviation in a program's control-flow graph. This is useful for detecting the control-flow hijacking...
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual user uptake has been low due to the high cost of issuance and maintenance of such certs. This has led to a situation whereby users are able to verify the identity of an organization...
An essential part of satellite communication is the orientation of the antenna, which can be difficult to ascertain on mobile platforms such as ships. While equipment to measure orientation accurately at sea exists, current solutions are expensive. This paper describes work toward an antenna orientation system using low-cost Global Position System (GPS) receivers. We investigated two methods: one...
A new synthesis scheme is proposed to effectively generate a random vector with prescribed joint density that induces a (latent) Gaussian tree structure. The quality of synthesis is measured by total variation distance between the synthesized and desired statistics. The proposed layered and successive encoding scheme relies on the learned structure of tree to use minimal number of common random variables...
The large number of malicious files that are produced daily outpaces the current capacity of malware analysis and detection. For example, Intel Security Labs reported that during the second quarter of 2016, their system found more than 40M of new malware [1]. The damage of malware attacks is also increasingly devastating, as witnessed by the recent Cryptowall malware that has reportedly generated...
There are two broad safety related message categories in vehicular networks: emergency and periodic messages that should share the scarce wireless resource simultaneously. Emergency messages deliver time-critical information with guaranteed reliability, e.g., road-safety information, whereas periodic ones convey normal status update information, e.g., vehicular positions, that is less time- and loss-critical...
With growing need for satellite based communication systems, there is increasing focus on the technological advancements that can reduce the cost and SWaP (Size, Weight, and Power) of a satellite payload without compromising the achieved bandwidth efficiency. In a recent technological development, the signal processing for payload antenna beamforming is moved to the ground. The resultant scheme, called...
Electromagnetic interference can cause severe performance degradation on wireless communication systems. In modern military platforms there are many closely located electronic systems, which could potentially cause interference. The performance degradation is largely affected by the characteristics of the interference. With knowledge of the actual interference environment, radio receivers can be adapted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.