bbabanner.jpg

The quest for user similarity in mobile societies

In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this objective, we first introduce generalized profile structures, beyond mere location, that aim to capture users interests and prior experiences, in the form of a probability distribution. Afterwards, we

Software and Communications

A cooperative Q-learning approach for online power allocation in femtocell networks

In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells using distributed multiagent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, femto-based distributed and subcarrier-based distributed power control using Q-learning (CPC-Q, FBDPC-Q and SBDPCQ). CPC-Q, although not of practical interest, characterizes the global optimum. Each of FBDPC-Q and SBDPC-Q works in two different learning paradigms: Independent (IL) and

Software and Communications

Low-complexity Kalman filter-based carrier frequency offset estimation and tracking for OFDM systems

In this paper, an iterative blind estimator for fractional carrier frequency offset (CFO) in orthogonal frequency division multiplexing (OFDM) systems is proposed. The estimator utilizes the null subcarriers transmitted at the edge of the spectrum and does not require any training. In addition, the proposed estimator does not require any prior knowledge of the frequency response of the channel. The problem is formulated using a state-space model, and an extended Kalman filter (EKF) is employed to estimate the CFO iteratively. Simulation results illustrate the enhanced ability of the proposed

Software and Communications

On the flow anonymity problem in network coding

In this paper, we aim at protecting the privacy of the communicating parties while ensuring the authenticity of source nodes. In particular, we exploit intra-flow network coding to preserve the anonymity of communicating parties. Towards this objective, we propose an anonymity preservation scheme, namely closed group anonymity (CGA) that preserves the anonymity of the communicating parties via mixing their flows. Afterwards, we explore an instance of the Authentication-Privacy Trade-off in the context of Network Coding. We analyze the trade-off with the aid of the proposed anonymity scheme and

Software and Communications

Demo: O'BTW - An opportunistic, similarity-based mobile recommendation system

[No abstract available]

Software and Communications

Cross-layer minimum-delay scheduling and maximum-throughput resource allocation for multiuser cognitive networks

A cognitive network is considered that consists of a base station (BS) communicating with multiple primary and secondary users. Each secondary user can access only one of the orthogonal primary channels. A model is considered in which the primary users can tolerate a certain average delay. A special case is also considered in which the primary users do not suffer from any delay. A novel cross-layer scheme is proposed in which the BS performs successive interference cancellation and thus a secondary user can coexist with an active primary user without adversely affecting its transmission. A

Software and Communications

Cross-layer transmission rate/power policy for cognitive multi-access networks with imperfect sensing

We consider an underlay cognitive radio network with a primary user and a secondary user transmitting to a common receiver. The secondary user senses the primary user's channel to determine whether the primary user is active or idle. The secondary user's transmission policy is determined via a probabilistic cross-layer algorithm in which the secondary user's average packet delay is minimized subject to constraints on its average transmission power and the maximum probability of collision at the primary user. The proposed cross-layer algorithm determines the number of packets the secondary user

Software and Communications

Distributed spectrum sensing with sequential ordered transmissions to a cognitive fusion center

Cooperative spectrum sensing is a robust strategy that enhances the detection probability of primary licensed users. However, a large number of detectors reporting to a fusion center for a final decision causes significant delay and also presumes the availability of unreasonable communication resources at the disposal of a network searching for spectral opportunities. In this paper, we employ the idea of sequential detection to obtain a quick, yet reliable, decision regarding primary activity. Local detectors take measurements, and only a few of them transmit the log likelihood ratios (LLR) to

Software and Communications

QOS-constrained multiuser peer-to-peer amplify-and-forward relay beamforming

A wireless communication scenario is considered with K single-antenna source-destination pairs communicating through several half-duplex amplify-and-forward MIMO relays where each source is targeting only one destination. The relay beamforming matrices are designed in order to minimize the total power transmitted from the relays subject to quality of service constraints on the received signal to interference-plus-noise ratio at each destination node. Due to the nonconvexity of this problem, several approximations have been used in the literature to find a computationally efficient solution. A

Software and Communications

Proactive resource allocation in cognitive networks

Recently we have introduced the notion of proactive resource allocation and predictive wireless networks, where intelligent wireless networks are capable of tracking and exploiting the repetition patterns in human behavior while accessing the network resources. This predictability advantage grants the network more flexibility to schedule users' requests over a longer time horizon, and thereby significantly improves the quality of service (QoS) defined as outage probability. In this paper we extend our analysis to consider a network of two different QoS classes. The first is a primary class

Software and Communications