142 research outputs found

    Game theory for collaboration in future networks

    Get PDF
    Cooperative strategies have the great potential of improving network performance and spectrum utilization in future networking environments. This new paradigm in terms of network management, however, requires a novel design and analysis framework targeting a highly flexible networking solution with a distributed architecture. Game Theory is very suitable for this task, since it is a comprehensive mathematical tool for modeling the highly complex interactions among distributed and intelligent decision makers. In this way, the more convenient management policies for the diverse players (e.g. content providers, cloud providers, home providers, brokers, network providers or users) should be found to optimize the performance of the overall network infrastructure. The authors discuss in this chapter several Game Theory models/concepts that are highly relevant for enabling collaboration among the diverse players, using different ways to incentivize it, namely through pricing or reputation. In addition, the authors highlight several related open problems, such as the lack of proper models for dynamic and incomplete information games in this area.info:eu-repo/semantics/acceptedVersio

    Game theory for cooperation in multi-access edge computing

    Get PDF
    Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.info:eu-repo/semantics/acceptedVersio

    Convergent communication, sensing and localization in 6g systems: An overview of technologies, opportunities and challenges

    Get PDF
    Herein, we focus on convergent 6G communication, localization and sensing systems by identifying key technology enablers, discussing their underlying challenges, implementation issues, and recommending potential solutions. Moreover, we discuss exciting new opportunities for integrated localization and sensing applications, which will disrupt traditional design principles and revolutionize the way we live, interact with our environment, and do business. Regarding potential enabling technologies, 6G will continue to develop towards even higher frequency ranges, wider bandwidths, and massive antenna arrays. In turn, this will enable sensing solutions with very fine range, Doppler, and angular resolutions, as well as localization to cm-level degree of accuracy. Besides, new materials, device types, and reconfigurable surfaces will allow network operators to reshape and control the electromagnetic response of the environment. At the same time, machine learning and artificial intelligence will leverage the unprecedented availability of data and computing resources to tackle the biggest and hardest problems in wireless communication systems. As a result, 6G will be truly intelligent wireless systems that will provide not only ubiquitous communication but also empower high accuracy localization and high-resolution sensing services. They will become the catalyst for this revolution by bringing about a unique new set of features and service capabilities, where localization and sensing will coexist with communication, continuously sharing the available resources in time, frequency, and space. This work concludes by highlighting foundational research challenges, as well as implications and opportunities related to privacy, security, and trust

    Convergent Communication, Sensing and Localization in 6G Systems: An Overview of Technologies, Opportunities and Challenges

    Get PDF
    Herein, we focus on convergent 6G communication, localization and sensing systems by identifying key technology enablers, discussing their underlying challenges, implementation issues, and recommending potential solutions. Moreover, we discuss exciting new opportunities for integrated localization and sensing applications, which will disrupt traditional design principles and revolutionize the way we live, interact with our environment, and do business. Regarding potential enabling technologies, 6G will continue to develop towards even higher frequency ranges, wider bandwidths, and massive antenna arrays. In turn, this will enable sensing solutions with very fine range, Doppler, and angular resolutions, as well as localization to cm-level degree of accuracy. Besides, new materials, device types, and reconfigurable surfaces will allow network operators to reshape and control the electromagnetic response of the environment. At the same time, machine learning and artificial intelligence will leverage the unprecedented availability of data and computing resources to tackle the biggest and hardest problems in wireless communication systems. As a result, 6G will be truly intelligent wireless systems that will provide not only ubiquitous communication but also empower high accuracy localization and high-resolution sensing services. They will become the catalyst for this revolution by bringing about a unique new set of features and service capabilities, where localization and sensing will coexist with communication, continuously sharing the available resources in time, frequency, and space. This work concludes by highlighting foundational research challenges, as well as implications and opportunities related to privacy, security, and trust

    Energy Efficient Cooperative Communication

    Get PDF
    This dissertation studies several problems centered around developing a better understanding of the energy efficiency of cooperative wireless communication systems. Cooperative communication is a technique where two or more nodes in a wireless network pool their antenna resources to form a virtual antenna array . Over the last decade, researchers have shown that many of the benefits of real antenna arrays, e.g. spatial diversity, increased range, and/or decreased transmission energy, can be achieved by nodes using cooperative transmission. This dissertation extends the current body of knowledge by providing a comprehensive study of the energy efficiency of two-source cooperative transmission under differing assumptions about channel state knowledge, cooperative protocol, and node selfishness. The first part of this dissertation analyzes the effect of channel state information on the optimum energy allocation and energy efficiency of a simple cooperative transmission protocol called orthogonal amplify-and-forward (OAF). The source nodes are required to achieve a quality-of service (QoS) constraint, e.g. signal to noise ratio or outage probability, at the destination. Since a QoS constraint does not specify a unique transmit energy allocation when the nodes use OAF cooperative transmission, minimum total energy strategies are provided for both short-term and long-term QoS constraints. For independent Rayleigh fading channels, full knowledge of the channel state at both of the sources and at the destination is shown to significantly improve the energy efficiency of OAF cooperative transmission as well as direct (non-cooperative) transmission. The results also demonstrate how channel state knowledge affects the minimum total energy allocation strategy. Under identical channel state knowledge assumptions, the results demonstrate that OAF cooperative transmission tends to have better energy efficiency than direct transmission over a wide range of channel conditions. The second part of this dissertation focuses on the development of an opportunistic hybrid cooperative transmission protocol that achieves increased energy efficiency by not only optimizing the resource allocation but also by selecting the most energy efficient cooperative transmission protocol from a set of available protocols according to the current channel state. The protocols considered in the development of the hybrid cooperative transmission protocol include compress-and-forward (CF), estimate-and-forward (EF), non-orthogonal amplify-and-forward (NAF), and decode-and-forward (DF). Instantaneous capacity results are analyzed under the assumption of full channel state knowledge at both of the sources and the destination node. Numerical results are presented showing that the delay limited capacity and outage probability of the hybrid cooperative transmission protocol are superior to that of any single protocol and are also close to the cut-set bound over a wide range of channel conditions. The final part of this dissertation focuses on the issue of node selfishness in cooperative transmission. It is common to assume in networks with a central authority, e.g. military networks, that nodes will always be willing to offer help to other nodes when requested to do so. This assumption may not be valid in ad hoc networks operating without a central authority. This section of the dissertation considers the effect selfish behavior on the energy efficiency of cooperative communication systems. Using tools from non-cooperative game theory, a two-player relaying game is formulated and analyzed in non-fading and fading channel scenarios. In non-fading channels, it is shown that a cooperative equilibrium can exist between two self-interested sources given that the end of the cooperative interaction is uncertain, that the sources can achieve mutual benefit through cooperation, and that the sources are sufficiently patient in the sense that they value future payoffs. In fading channels, a cooperative conditional trigger strategy is proposed and shown to be an equilibrium of the two-player game. Sources following this strategy are shown to achieve an energy efficiency very close to that of a centrally-controlled system when they are sufficiently patient. The results in this section show that cooperation can often be established between two purely self-interested sources without the development of extrinsic incentive mechanisms like virtual currency

    Study on the application of information technology in inland maritime supervision

    Get PDF

    Design of large polyphase filters in the Quadratic Residue Number System

    Full text link

    Temperature aware power optimization for multicore floating-point units

    Full text link

    A Big Data and machine learning approach for network monitoring and security

    Get PDF
    In the last decade the performances of 802.11 (Wi-Fi) devices skyrocketed. Today it is possible to realize gigabit wireless links spanning across kilometers at a fraction of the cost of the wired equivalent. In the same period, mesh network evolved from being experimental tools confined into university labs, to systems running in several real world scenarios. Mesh networks can now provide city-wide coverage and can compete on the market of Internet access. Yet, being wireless distributed networks, mesh networks are still hard to maintain and monitor. This paper explains how today we can perform monitoring, anomaly detection and root cause analysis in mesh networks using Big Data techniques. It first describes the architecture of a modern mesh network, it justifies the use of Big Data techniques and provides a design for the storage and analysis of Big Data produced by a large-scale mesh network. While proposing a generic infrastructure, we focus on its application in the security domain

    Who wrote this scientific text?

    No full text
    The IEEE bibliographic database contains a number of proven duplications with indication of the original paper(s) copied. This corpus is used to test a method for the detection of hidden intertextuality (commonly named "plagiarism"). The intertextual distance, combined with the sliding window and with various classification techniques, identifies these duplications with a very low risk of error. These experiments also show that several factors blur the identity of the scientific author, including variable group authorship and the high levels of intertextuality accepted, and sometimes desired, in scientific papers on the same topic
    • …
    corecore