Browsing by Subject "Computer Science, Information Systems"
Now showing items 1-20 of 59
-
Adaptive channel allocation in OFDM/SDMA wireless LANs with limited transceiver resources
(2004)Smart antennas increase capacity of wireless systems by allowing channel reuse by several users in the same cell through space division multiple access (SDMA). Orthogonal Frequency Division Multiplexing (OFDM) creates ... -
An analytic framework for modeling and detecting access layer misbehavior in wireless networks
(2008)The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. ... -
Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach
(2011)Cloud Computing is a model of service delivery and access where dynamically scalable and virtualized resources are provided as a service over the Internet. This model creates a new horizon of opportunity for enterprises. ... -
Asymptotic Laws for Joint Content Replication and Delivery in Wireless Networks
(2013)We investigate the scalability of multihop wireless communications, a major concern in networking, for the case that users access content replicated across the nodes. In contrast to the standard paradigm of randomly selected ... -
Automated context aggregation and file annotation for PAN-based computing
(2007)This paper presents a method for automatically annotating files created on portable devices with contextual metadata. We achieve this through the combination of two system components. One is a context dissemination mechanism ... -
Autoregressive energy-efficient context forwarding in wireless sensor networks for pervasive healthcare systems
(2014)Driven by technological advances in low-power network systems and medical sensors, we have witnessed during the recent years the adoption of wireless sensor networks (WSNs) in electronic healthcare. Improving the quality ... -
Cache consistency in Wireless Multimedia Sensor Networks
(2010)The production of cheap CMOS cameras, which are able to capture rich multimedia content, combined with the creation of low-power circuits, gave birth to what is called Wireless Multimedia Sensor Networks (WMSNs). WMSNs ... -
Capacity and Stable Throughput Regions for the Broadcast Erasure Channel With Feedback: An Unusual Union
(2013)We consider a source node broadcasting to two receivers over a general erasure channel with receiver feedback. We characterize the capacity region of the channel and construct algorithms based on linear network coding ... -
Categorical range queries in large databases
(2003)In this paper, we introduce the categorical (a.k.a. chromatic) range queries (CRQs) in the context of large, disk-resident data sets, motivated by the fact, that CRQs are conceptually simple and emerge often in DBMSs. On ... -
CDR-MAC: A protocol for full exploitation of directional antennas in ad hoc wireless networks
(2008)In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directional transmission of the Request To Send ... -
A Collaborative Biomedical Image-Mining Framework: Application on the Image Analysis of Microscopic Kidney Biopsies
(2013)The analysis and characterization of biomedical image data is a complex procedure involving several processing phases, such as data acquisition, preprocessing, segmentation, feature extraction, and classification. The ... -
A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks
(2009)The management of Grid resources requires scheduling of both computation and communication tasks at various levels. In this study, we consider the two constituent sub-problems of Grid scheduling, namely: (i) the scheduling ... -
A Cross-Layer Framework for Association Control in Wireless Mesh Networks
(2009)The user association mechanism specified by the IEEE 802.11 standard does not consider the channel conditions and the AP load in the association process. Employing the mechanism in its plain form in wireless mesh networks, ... -
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
(2012)Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ... -
Dynamic network provisioning for time-varying traffic
(2007)In this paper, we address the question of dynamic network provisioning for time-varying traffic rates, with the objective of maximizing the system throughput. We assume that the network is capable of providing bandwidth ... -
Dynamic resource allocation in CDMA systems with deterministic codes and multirate provisioning
(2006)Next generation wireless CDMA systems will provide high and variable data rates by using multicode structures, controllable code spreading gains, and transmit power adaptation. We address the emerging resource allocation ... -
Efficient algorithms for distortion and blocking techniques in association rule hiding
(2007)Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ... -
Emergency Fall Incidents Detection in Assisted Living Environments Utilizing Motion, Sound, and Visual Perceptual Components
(2011)This paper presents the implementation details of a patient status awareness enabling human activity interpretation and emergency detection in cases, where the personal health is threatened like elder falls or patient ...