We study the role of caches in wireless interference networks. We focus on content caching and delivery across a Gaussian interference network, where both transmitters and receivers are equipped with caches. We provid...
详细信息
This paper presents a technique for active topology inference in store, code, and forward networks. Many techniques exist for topology inference and are well suited for storeand- forward and cut-through switching;howe...
详细信息
Cloud computing has been growing rapidly in the world over the past decade. The Studies and development of this system has met the demand of large number of users in the world. In order to share shared resources, most...
详细信息
This paper describes the POSTECH’s submission to the WMT 2018 shared task on Automatic Post-Editing (APE). We propose a new neural end-to-end post-editing model based on the transformer network. We modified the encod...
详细信息
This paper considers a device-To-device (D2D) fog-radio access network wherein a set of users are required to store/receive a set of files. The D2D devices are connected to a subset of the cloud data centers and thus ...
详细信息
This paper refers to secure the cloud in the scenario of overflow problem of a network coding storage system. From the analysis and experiments, it shows the impacts of overflow problem in a network coding scheme, whi...
详细信息
In cognitive radio, spectrum sensing is used to find spectrum hole and identify the primary users. Cognitive users should continuously sense the spectrum and detect the presence of primary user as soon as possible. Wh...
详细信息
ISBN:
(纸本)9781467326988
In cognitive radio, spectrum sensing is used to find spectrum hole and identify the primary users. Cognitive users should continuously sense the spectrum and detect the presence of primary user as soon as possible. When cognitive user is far away from the primary user, the signal received from the primary user may be weak and difficult to be detected, causing the problem of low detection probability and long detection time. To solve such problems, this paper proposes a distributed cooperative spectrum sensing strategy based on the joint use of network coding and transform domain processing. Chirp signals with different parameters are used for cognitive users and conventional communication system is used for primary user. In the receiver end, fractional Fourier transform domain based signal processing method is used to separate cognitive users with different parameters and primary user. network coding is used in different cognitive users to improve the spectrum efficiency of cognitive frequency bands. Theoretical analyses show that the proposed strategy can increase the detection probability, reduce detection time and improve the agility of the system at the same time.
As a huge numbers of heterogeneous devices will be connected in social cognitive radio networks (SCRNs), it needs more frequency spectrum. Moreover, dynamic spectrum availability and heterogeneous devices make it more...
详细信息
In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understa...
详细信息
In the past decade, remarkable progress has been made in the area of network coding in terms of theory, code design, and applications. However, from a cross-layer perspective, there have been fewer efforts on understanding the impact of lower layers on coding of packets at network layer to improve the network throughput. In this paper, we study and design power control that can enhance the performance of random network coding in wireless networks. Specifically, we utilize a differential equation based framework to analyze random network coding throughput, and design dynamic power control algorithm to achieve higher multicast throughput.
In this research, we address the stability issues in Cooperative Data Exchange (CDE), one of the central problems in wireless network coding. We consider a setting in which the users are selfish, i. e., would like to ...
详细信息
In this research, we address the stability issues in Cooperative Data Exchange (CDE), one of the central problems in wireless network coding. We consider a setting in which the users are selfish, i. e., would like to maximize their own utility. More specifically, we consider a setting where each user has a subset of packets in the ground set X, and wants all other packets in X. The users can exchange data by broadcasting coded or uncoded packets over a lossless channel, and monetary transactions are allowed between any pair of users. We define the utility of each user as the sum of two sub-utility functions: (i) the difference between the total payment received by the user and the total transmission rate of the user, and (ii) the difference between the total number of required packets by the user and the total payment made by the user. A rate-vector and payment-matrix pair (r, p) is said to stabilize the grand coalition (i. e., the set of all users) if (r, p) is Pareto- optimal over all minor coalitions (i. e., all proper subsets of users who collectively know all packets in X). Our goal is to design algorithms that compute a stabilizing rate- payment pair with minimum total sum-rate and minimum total sum-payment for any given instance of the problem. In this work, we propose two algorithms that maximize the sum of utility of all users (over all solutions), and one of the algorithms also maximizes the minimum utility among all users (over all solutions). The second algorithm requires a broker, where each user has to trust the broker and use the broker to exchange payments, whereas in the first algorithm there is no such requirement. In the first algorithm, the users directly compensate user broadcasting the packet in that particular round. Our scheme minimizes the total number of transmitted packets, as well as the total amount of payments. We also perform an extensive simulation study to evaluate the performance of our scheme in practical setting.
暂无评论