Wireless networks are progressively displacing service provisioning towards the edge to accommodate the increasing traffic demands. This paradigm shift calls for smart policies to efficiently share network resources and ensure service delivery. In this talk, a concept of bidding and tipping for spectrum auctioning will be presented. In this concept users iteratively revise their strategies, which include bidding for spectrum, route selection and relaying incentives, to achieve their quality of service requirements. Further, a reinforcement learning algorithm will be discussed to automatize the bidding process based on users¹ previous experiences. Then, a collaborative cognitive dynamic network architecture (CDNA) will be outlined where mobile devices share their connectivities acting as access points for other users and harvest available spectrum.
Read more arrow_right_altThe second wave of cloud computing, named network cloudification, in the forms of SDN (Software Defined Networking), NFV (Network Function Virtualization), and 5G-MEC (Mobile Edge Computing), is to centralize and virtualize networking into data centers.
Queueing theory, the set of probabilistic techniques that study waiting lines or queues, is a fundamental tool to analyze the performance of modern telecommunication networks. In this talk, we present the results of the performance analysis of two queueing systems.
Read more arrow_right_altA multitude of wireless technologies are used within air traffic communication. From a conceptual perspective, all of them are insecure as security was never part of their design and the evolution of wireless security in aviation did not keep up with the state of the art.
Future networks based on virtualization will enable on-the-fly instantiation of services in the form of "network slices". In this talk we will focus on a fundamental resource allocation problem in this context, that of finding a minimum cost embedding of a network slice onto a graph representing the available resources of our architecture.
Read more arrow_right_altThe use of deceptive techniques in user-generated video portals is ubiquitous. Unscrupulous uploaders deliberately mislabel video descriptors, such as headline, thumbnail etc., in order to increase their views and subsequently their ad revenue. However, such deceptive practices come at the expense of the end-user’s experience as the content does not meet the viewer’s expectations, which are formed by the misleading headline and thumbnail.
Read more arrow_right_altIn this talk we present OpenBox — a software-defined framework for network-wide development, deployment, and management of network functions (NFs). OpenBox effectively decouples the control plane of NFs from their data plane, similarly to SDN solutions that only address the network’s forwarding plane.
Read more arrow_right_altCisco estimates that by 2019 traffic will be 64x than in 2005. Network caching can help cope with this traffic deluge as, by replicating content closer to the users, it reduces bandwidth consumption.
Read more arrow_right_altThe Internet is central to our lives, but we know astoundingly little about it.
How big is the Internet? How reliable? How is it evolving over months?
How does it change over the course of a day?
Wireless communication is not only a key technology underlying the mobile revolution, it is also used to connect, monitor, alert, and interact with physical infrastructures such as smart-grids, transportation networks, and even implantable devices.
Read more arrow_right_alt
Recent Comments