Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (2)
- Asynchronous communication (1)
- C-RAN (1)
- Channel coding (1)
- Cloud computing (1)
-
- Coded distributed computation (1)
- Computer networks (1)
- Controller (1)
- Data centers (1)
- Data fusion (1)
- Decision fusion (1)
- Deletion/insertion channel (1)
- Dependent randomization (1)
- Drone assisted network (1)
- Drone placement (1)
- Edge computing (1)
- Free space optics (1)
- Generative adversarial neural networks (1)
- Internet packet classifiers (1)
- Large deviation (1)
- Live media production (1)
- Metaheuristic optimization (1)
- Multi-objective optimization (1)
- Multicast (1)
- Network function virtualization (1)
- Parallel decentralized detection (1)
- Private information retrieval (1)
- SDN (1)
- Secret sharing (1)
- Spectrum allocation (1)
Articles 1 - 7 of 7
Full-Text Articles in Engineering
Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong
Coordination, Adaptation, And Complexity In Decision Fusion, Weiqiang Dong
Dissertations
A parallel decentralized binary decision fusion architecture employs a bank of local detectors (LDs) that access a commonly-observed phenomenon. The system makes a binary decision about the phenomenon, accepting one of two hypotheses (H0 (“absent”) or H1 (“present”)). The k 1 LD uses a local decision rule to compress its local observations yk into a binary local decision uk; uk = 0 if the k 1 LD accepts H0 and uk = 1 if it accepts H1. The k 1 LD sends its decision uk over a noiseless dedicated channel to a Data Fusion Center (DFC). The DFC combines the …
Drone-Assisted Emergency Communications, Di Wu
Drone-Assisted Emergency Communications, Di Wu
Dissertations
Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Countering Internet Packet Classifiers To Improve User Online Privacy, Sina Fathi-Kazerooni
Dissertations
Internet traffic classification or packet classification is the act of classifying packets using the extracted statistical data from the transmitted packets on a computer network. Internet traffic classification is an essential tool for Internet service providers to manage network traffic, provide users with the intended quality of service (QoS), and perform surveillance. QoS measures prioritize a network's traffic type over other traffic based on preset criteria; for instance, it gives higher priority or bandwidth to video traffic over website browsing traffic. Internet packet classification methods are also used for automated intrusion detection. They analyze incoming traffic patterns and identify malicious …
Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif
Live Media Production: Multicast Optimization And Visibility For Clos Fabric In Media Data Centers, Ammar Latif
Dissertations
Media production data centers are undergoing a major architectural shift to introduce digitization concepts to media creation and media processing workflows. Content companies such as NBC Universal, CBS/Viacom and Disney are modernizing their workflows to take advantage of the flexibility of IP and virtualization.
In these new environments, multicast is utilized to provide point-to-multi-point communications. In order to build point-to-multi-point trees, Multicast has an established set of control protocols such as IGMP and PIM. The existing multicast protocols do not optimize multicast tree formation for maximizing network throughput which lead to decreased fabric utilization and decreased total number of admitted …
Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan
Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan
Dissertations
Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …
Error Correction For Asynchronous Communication And Probabilistic Burst Deletion Channels, Chen Yi
Error Correction For Asynchronous Communication And Probabilistic Burst Deletion Channels, Chen Yi
Dissertations
Short-range wireless communication with low-power small-size sensors has been broadly applied in many areas such as in environmental observation, and biomedical and health care monitoring. However, such applications require a wireless sensor operating in "always-on" mode, which increases the power consumption of sensors significantly. Asynchronous communication is an emerging low-power approach for these applications because it provides a larger potential of significant power savings for recording sparse continuous-time signals, a smaller hardware footprint, and a lower circuit complexity compared to Nyquist-based synchronous signal processing.
In this dissertation, the classical Nyquist-based synchronous signal sampling is replaced by asynchronous sampling strategies, i.e., …
Coding Against Stragglers In Distributed Computation Scenarios, Malihe Aliasgari
Coding Against Stragglers In Distributed Computation Scenarios, Malihe Aliasgari
Dissertations
Data and analytics capabilities have made a leap forward in recent years. The volume of available data has grown exponentially. The huge amount of data needs to be transferred and stored with extremely high reliability. The concept of "coded computing", or a distributed computing paradigm that utilizes coding theory to smartly inject and leverage data/computation redundancy into distributed computing systems, mitigates the fundamental performance bottlenecks for running large-scale data analytics.
In this dissertation, a distributed computing framework, first for input files distributedly stored on the uplink of a cloud radio access network architecture, is studied. It focuses on that decoding …