The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In ultra-dense cellular networks, research works on enhancing cell edge performance receive considerable attention. Based on interlaced clustering, we propose a heuristic sparse beamforming strategy to improve the cell edge throughput effectively in distributed antenna systems (DASs). In our scheme, each cluster pattern (CP) is divided into several adaptive cells, where all the remote antenna units...
In this paper a Markov decision process (MDP) model for virtualized content delivery networks is proposed. We use stochastic optimization to assign cloud site resources to each user group. We propose how quality of experience (QoE) can be included in the modeling and optimization. We then present an optimal solution for a constraint-free version of the problem, and show the improvement in accumulated...
We demonstrate a compact, single-etched sub-wavelength grating coupler for the O-band application, which has a measured insertion loss of −4 dB, a 3-dB bandwidth of 39 nm, back reflections below −20 dB, and a design footprint of 20um × 40um.
The presented study analyses 563 representative benchmark sparse matrices with respect to their partitioning into uniformly-sized blocks. The aim is to minimize memory footprints of matrices. Different block sizes and different ways of storing blocks in memory are considered and statistically evaluated. Memory footprints of partitioned matrices are additionally compared with lower bounds and the CSR...
Fragmentation in Elastic Optical Networks is an issue caused by isolated, non-aligned, and non-contiguous frequency slots that can not be used to allocate new connection request to the network, due to the optical layer restrictions imposed to the Routing and Spectrum Assignment (RSA) algorithms. To deal with this issue, several studies about Spectrum Defragmentation have been presented. In this work,...
This paper presents the details of a CUDA implementation of the Subgraph Isomorphism Graph Challenge, a new effort aimed at driving progress in the graph analytics field. challenge consists of two graph analytics: triangle counting and k-truss. We present our CUDA implementation of the graph triangle counting operation and of the k-truss subgraph decomposition. Both implementations share the same...
Graph algorithms such as breadth-first search (BFS) have been gaining ever-increasing importance in the era of Big Data. However, the memory bandwidth remains the key performance bottleneck for graph processing. To address this problem, we utilize processing-in-memory (PIM), combined with non-volatile metal-oxide resistive random access memory (ReRAM), to improve the performance of both computation...
In this paper we consider multi-user multicarrier transmissions with flexible subcarrier spacings. In a scenario of multiple users access with different subcarrier spacings the orthogonality between subcarriers is disrupted. The paper presents the Intercarrier Interference (ICI) that occurs between two users with different subcarrier spacings in a Universal Filtered Multicarrier (UFMC) system. We...
Because of its high transmission rate, Time and Wavelength Division Multiplexed Passive Optical Network (TWDM-PON) has become a particular research topic. Due to the wavelength flexibility and multiple user's access, it becomes necessary and imperative to consider the fairness between all the Optical Network Units (ONUs) so that we can improve the quality of service of the users. This fairness includes...
This paper presents a low-overhead optimizer for the ubiquitous sparse matrix-vector multiplication (SpMV) kernel. Architectural diversity among different processors together with structural diversity among different sparse matrices lead to bottleneck diversity. This justifies an SpMV optimizer that is both matrix- and architecture-adaptive through runtime specialization. To this direction, we present...
An energy-efficient association control algorithm for wireless networks is proposed. Both the wake-sleep switch of each base station and the resource reservation overhead of its neighboring base stations are considered as factors to impact the base station on-off switch decision and the user association. The simulation results show that the overall system energy consumption can be reduced thanks to...
For the drawbacks of the synthetic bandwidth method based on time-domain back projection, a novel synthetic bandwidth method based on frequency-domain back projection is proposed in this article for stepped-frequency synthetic aperture radar to improve the computation efficiency and to realize the automatic spatial spectra cutting. To give a direct and clear comprehension for wideband synthesizing...
The potential of Split-Band processing to determine the absolute phase of an interferometric pair of SAR images has been demonstrated in previous studies. In this work we propose a new approach based on the joint use of Split-Band Interferometry and SAR Interferometry for the phase leveling of disconnected regions of an unwrapped interferogram. In this paper a new selector of frequency-persistent...
The integrated avionics system is a platform that integrates a series of flexible, reusable, interoperable hardware and software resources. It enables to implement the decoupled isolation of task software and physical resources under the premise of versatility of hardware resources and configuration of system applications, which can meet the requirements of software system updates and task changes...
The demonstration presents the first implementation of a resource negotiation scheme between users and a network for the provisioning of application-aware connectivity services. This active interaction enables the users, who request connectivity services with multiple application requirements, to select an alternative solution when the network does not have enough resources to satisfy the original...
Dense views are needed urgently for autostereoscopic three-dimensional (3D) displays. A dense view synthetization system with three input views which are captured by a three-camera rig is presented. In the system, an image preprocessing step is presented before rendering dense views, in which both color and depth images are optimized by the proposed adaptive joint view optimization algorithm. Then...
We study random access for machine-type commu- nications (MTC) based on the notion of compressive sensing (CS) over a distributed input distributed output (DIDO) system consisting of a number of remote radio heads (RRHs) that are closely located to devices. In a DIDO system, each active device can have a signature that depends on its connectivity to RRHs and the signatures of active devices are estimated...
This paper asks how much we can gain in terms of bandwidth and user satisfaction, if recommender systems became bandwidth aware and took into account not only the user preferences, but also the fact that they may need to serve these users under bandwidth constraints, as is the case over wireless networks. We formulate this as a new problem in the context of index coding: we relax the index coding...
The study of regenerating codes has advanced tremendously in recent years. However, most known constructions require large field size, and hence may be hard to implement in practice. In this paper, by using notions from field theory and matrix analysis to restructure known coding techniques, two explicit constructions of regenerating codes are obtained. These codes approach the cut-set bound as the...
Recent advances in Intrusion Risk Assessment (IRA) have brought promising solutions to enhance Intrusion Response Systems (IRS). However, current researches lack reasonable solutions to exploit system state information. Without the system state, the IRA results may suffer from the high false rate of Intrusion Detection Systems (IDS). To address this limitation, we propose a novel State-Aware Risk...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.