Inactivity timers in cellular networks are used to balance the trade-offs between resource efficiency for enhanced user experience and low management overhead. However, considerable radio resources and battery energy are wasted in the tail time. In this abstract, we proposed TailTheft, which leverages the tail time for batching and pre fetching. Our work is the […]
COOPERATIVE SPECTRUM SHARING BETWEEN ONE PRIMARY USER AND MULTIPLE SECONDARY USERS UNDER INCOMPLETE INFORMATION
Contract theory is effective in designing incentive compatible mechanisms in a monopoly market under incomplete information, where the employer needs to sign a contract with employees before fully knowing their private information. The key idea is to offer the right contract items so that all agents have the incentive to truthfully reveal their private information. […]
AN EFFICIENT DATA ACCESS USING COOPERATIVE CACHING IN DISRUPTION TOLERANT NETWORKS
Disruption tolerant networks (DTNs) consist of mobile devices that contact each other opportunistically. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. Our basic idea is to intentionally cache data at a set of network central locations (NCLs), […]
A NOVEL DATA ACCESS SCHEME IN DISRUPTION TOLERANT NETWORKS USING COOPERATIVE CACHING
Our basic idea is to intentionally cache data at a set of network central locations (NCLs), which can be easily accessed by other nodes in the network. We develop an efficient approach to NCL selection in DTNs based on a probabilistic selection metric. The selected NCLs achieve high chances for prompt response to user queries […]
A CONTRACT-BASED COOPERATIVE SPECTRUM SHARING MECHANISM
Contract theory is effective in designing incentive compatible mechanisms in a monopoly market under incomplete information, where the employer needs to sign a contract with employees before fully knowing their private information. The key idea is to offer the right contract items so that all agents have the incentive to truthfully reveal their private information. […]
ENHANCING THE QOS SUPPORT CAPABILITY OF HYBRID NETWORKS USING QOS-ORIENTED DISTRIBUTED ROUTING PROTOCOL
The emergence and the envisioned future of real time and multimedia applications have stimulated the need of high Quality of Service (QoS) support in wireless and mobile networking environments. The QoS support reduces end-to-end transmission delay and enhances throughput to guarantee the seamless communication between mobile devices and wireless infrastructures. In order to enhance the […]
HYBRID WIRELESS NETWORKS WITH QOD ROUTING PROTOCOL
In order to enhance the QoS support capability of hybrid wireless networks, in this abstract, we propose a QoS-Oriented Distributed routing protocol (QOD). Taking advantage of fewer transmission hops and any cast transmission features of the hybrid networks, QOD transforms the packet routing problem to a resource scheduling problem. QOD incorporates five algorithms: 1) a […]
Tail Theft Dual Queue Scheduling Algorithm for Energy Saving
This paper proposes TailTheft, a scheme that leverages the tail time for batching and prefetching to save energy. TailTheft provides a customized application programming interface (API) for applications. Applications indicate the type of request, the time that can be delayed or prefetched by calling the TailTheft API, as well as the type of action taken […]
Locx A Novel Approach to Achieving User Privacy in LBS
In this paper, we propose LocX (Location to index mapping, a novel approach to achieving user privacy while maintaining full accuracy in location-based social applications. we can partition location data based on users’ social groups, and then perform transformations on the location coordinates before storing them on untrusted servers. A user knows the transformation keys […]
Design and Implementation of a Technique for a Capacitive Touch Screen
This paper presented the design and implementation of a technique to transmit information through a capacitive touch screen. The key idea is to exploit the pervasive capacitive touch screen and touchpad input devices as receivers for an identification code transmitted by hardware identification token. While the token can take many forms, we consider here an […]