Our objective is to guarantee that vehicles that coordinate their operations will operate safely with all of the other vehicles, implemented by all of the other manufacturers, on the roadway.
Read more arrow_right_alt2013 IEEE Online Conference on Green Communications is the 3rd edition of IEEE OnlineGreenComm conducted entirely online and dedicated to addressing the challenges in energy-efficient communications and communications for green technologies.
Read more arrow_right_altWe study algorithms for carrier and rate allocation in cellular systems with distributed components such as a heterogeneous LTE system with macrocells and femtocells. Existing work on LTE systems often involves centralized techniques or requires significant signaling, and is therefore not always applicable in the presence of femtocells. More distributed CSMA-based algorithms (carrier-sense multiple access) were developed in the context of 802.11 systems and have been proven to be utility optimal. However, the proof typically assumes a single transmission rate on each carrier. Further, it relies on the CSMA collision detection mechanisms to know whether a transmission is feasible. In this talk we present a framework for LTE scheduling that is based on CSMA techniques. In particular we first prove that CSMA-based algorithms can be generalized to handle multiple transmission rates in a multi-carrier setting while maintaining utility optimality. We then show how such an algorithm can be implemented in a heterogeneous LTE system where the existing Channel Quality Indication (CQI) mechanism is used to decide transmission feasibility.
Read more arrow_right_altBitcoin is a decentralized peer-to-peer payments network. It is the first and most widely used example of a new kind of money known as cryptocurrency. Transactions are fast, non-repudiable and almost anonymous. Fees are extremely cheap and every single transaction is stored in a ledger called the block chain.
Read more arrow_right_altThis unique conference will be the venue fostering dialogue among scholars and practitioners belonging to these disciplines.
Event website: http://www.internet-science.eu/1st-internet-science-conference
Read more arrow_right_altThe main functionality of the Internet is to provide global connectivity for every node attached to it. In light of the IPv4 address space depletion, large networks are in the process of deploying IPv6. In this paper we perform an extensive analysis of how BGP route propagation affects global reachability of the active IPv6 address space in the context of this unique transition of the Internet infrastructure. We propose and validate a methodology for testing the reachability of an IPv6 address block active in the routing system. Leveraging the global visibility status of the IPv6 prefixes evaluated with the BGP Visibility Scanner, we then use this methodology to verify if the visibility status of the prefix impacts its reachability at the interdomain level. We perform active measurements using the RIPE Atlas platform. We test destinations with different BGP visibility degrees (i.e., limited visibility - LV, high visibility - HV and dark prefixes). We show that the IPv6 LV prefixes (v6LVPs) are generally reachable, mostly due to a less-specific HV covering prefix (v6HVP). However, this is not the case of the dark address space, which, by not having a covering v6HVP is largely unreachable. When talking about the results we present in this paper a better explanation of trace route and some basic concepts of BGP will be provided.
Read more arrow_right_altPeer-to-peer networks have been quite thoroughly measured over the past years; however it is interesting to note that the BitTorrent Mainline DHT has received very little attention even though it is by far the largest of currently active overlay systems, as our results show. As Mainline DHT differs from other systems, existing measurement methodologies are not appropriate for studying it. In this talk we present an efficient methodology for estimating the number of active users in the network. We have identified an omission in previous methodologies used to measure the size of the network and our methodology corrects this. This omission may lead to inaccuracies of up to 40% in the number of active users. Our method is based on modeling crawling inaccuracies as a Bernoulli process. It guarantees a very accurate estimation and is able to provide the estimate in about 5 seconds. Through experiments in controlled situations, we demonstrate the accuracy of our method and show the causes of the inaccuracies in previous work, by reproducing the incorrect results. Besides accurate network size estimates, our methodology can be used to detect network anomalies, in particular Sybil attacks in the network. We also report on the results from our measurements which have been going on for almost 2.5 years and are the first long-term study of Mainline DHT.
Read more arrow_right_altFind out what's inside a cellphone, a television set, the human body, ... with the help of researchers from the IMDEA Institutes.
Discover the huge amount of science and technology that surrounds our lives, making them more comfortable, simpler and safer, and meet those who are engaged in advancing science and technology every day.
Science in Your Living Room is the activity of the IMDEA Institutes in European initiative The Researchers' Night 2013. Its main objective is to present to the public the large amount of science and technology involved in almost every object and service around us. The audience is invited to interact and discover the appeal of the work of the researchers. The goal of this activity is to analyze, with the help of the audience, how different our life would be without science, stress the importance of science and technology for social welfare, and show how rewarding and interesting is getting involved in science and technology.
Read more arrow_right_altInformation and communication technologies (ICTs) often fail to perform well in environments and scenarios that were not envisioned at the time of the ICTs creation. Examples of such failures include poor usability of traditional WiFi networks in resource-constrained rural areas, geographically-dependent performance of centralised networked systems, and context-insensitive behaviour of ubiquitous computing devices.
Read more arrow_right_altDiscovering services in the local broadcast domain is easy from the application point of view. However, from the network point of view, especially when wireless networks are also involved, it is wasteful, as query and response are broadcast on all access points at the lowest data rate, ignoring efficient transmission modes. It also does not scale beyond the single broadcast domain, as this would require deployment of IP multicast, which has yet to happen despite decades of trying. We introduce Stateless DNS as an efficient and broader range alternative. Stateless DNS requires no action from the network service provider, improves upon privacy and comes with incremental deployment options. While providing a well-known DNS interface to the applications, it can identify organizational boundaries and uses existing DNS caches for performance.
Read more arrow_right_alt
Recent Comments