By Topic

2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)

Date 6-10 Jan. 2014

Filter Results

Displaying Results 1 - 25 of 94
  • [Front cover]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS) [Copyright notice]

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • Message from general chairs

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Message from steering committee

    Publication Year: 2014, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Message from TPC chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Message from Poster chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from panel chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Message from Demos & Exhibits chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Message from sponsorship & local arrangements chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Message from Ph.D Forum chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Message from Mobile India chairs

    Publication Year: 2014, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • Message from Nethealth workshop chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Message from social networking workshop chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Message from E6 workshop chairs

    Publication Year: 2014, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • COMSNETS 2014 brochure

    Publication Year: 2014, Page(s):1 - 24
    Request permission for commercial reuse | PDF file iconPDF (3493 KB)
    Freely Available from IEEE
  • FRANTIC: A Fast Reference-based Algorithm for Network Tomography via compressive sensing

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1406 KB) | HTML iconHTML

    We study the problem of link and node delay estimation in undirected networks when at most k out of n links or nodes in the network are congested. Our approach relies on end-to-end measurements of path delays across pre-specified paths in the network. We present a class of algorithms that we call FRANTIC. The FRANTIC algorithms are motivated by compressive sensing; however, unlike traditional comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On whitespace identification using randomly deployed sensors

    Publication Year: 2014, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1331 KB) | HTML iconHTML

    This work considers the identification of the available whitespace, i.e., the regions that do not contain any existing transmitter within a given geographical area. To this end, n sensors are deployed at random locations within the area. These sensors detect for the presence of a transmitter within their radio range rs using a binary sensing model, and their individual decisions are com... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fair scheduling with deadline guarantees in single-hop networks

    Publication Year: 2014, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    We address the problem of simultaneously ensuring long-term fairness and deterministic delay guarantees for real-time traffic over a single-hop network. Specifically, we propose a network control policy that maximises a concave utility function of the average throughput of each flow, while guaranteeing that each packet is delivered within a deterministic deadline. Although this problem has been ad... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VillageLink: Wide-area wireless coverage

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1725 KB) | HTML iconHTML

    White spaces promise to revolutionize the way wireless connectivity is delivered over wide areas. However, large-scale white space networks face the problem of allocating channels to multiple contending users in the wide white space band. To tackle the issue, we first examine wireless propagation in a long-distance outdoor white space testbed and find that a complex combination of free-space loss ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The challenge of continuous mobile context sensing

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1382 KB) | HTML iconHTML

    In this paper, we highlight the challenge of continuously sensing context data from mobile phones. In particular, we show that the energy cost of this type of continuous sensing is extremely high if a) accuracy is desired, and b) power optimisations do not work well if multiple tasks are sensing concurrently. Our results are derived from our experience in building the LiveLabs context sensing plat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • I am a smartphone and I know my user is driving

    Publication Year: 2014, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1340 KB) | HTML iconHTML

    We intend to develop a smartphone app that can tell whether its user is a driver or a passenger in an automobile. While the core problem can be solved relatively easily with special installations in new high-end vehicles (e.g., NFC), constraints of backward compatibility makes the problem far more challenging. We design a Driver Detection System (DDS) that relies entirely on smartphone sensors, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A two time scale approach for coordinated multi-point transmission and reception over practical backhaul

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB) | HTML iconHTML

    We consider the problem of maximizing a given utility over heterogeneous wireless networks (HetNets) that have a practical (non ideal) backhaul. Such a backhaul is characterized by high latency and possibly limited capacity, which necessitates the use of semi-static schemes for resource management. The management in these semi-static schemes is done at two time scale s over a coordination unit wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient P2P video distribution by peer reorganization

    Publication Year: 2014, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1783 KB) | HTML iconHTML

    There are two types of P2P systems satisfying two different user demands: (a) file downloading and (b) VoD streaming. Example of (a) is the original BitTorrent, and examples for (b) including various commercial P2P-based VoD streaming systems such as that offered by PPLive. We have a hypothesis - by combining a type (a) system and a type (b) system as a single P2P system, both the file downloading... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defending concealedness in IEEE 802.11n

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1689 KB) | HTML iconHTML

    IEEE 802.11 distributed coordination function supports two access mechanisms - the basic access and the four-way access, both of which are vulnerable to the hidden and the exposed node problem (collectively called the concealed node problem). Though most of the works in literature suggest to overlook this problem due to the associated overhead to solve them, this paper shows that the problem becom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive sleep-wake control using reinforcement learning in sensor networks

    Publication Year: 2014, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1235 KB) | HTML iconHTML

    The aim in this paper is to allocate the `sleep time' of the individual sensors in an intrusion detection application so that the energy consumption from the sensors is reduced, while keeping the tracking error to a minimum. We propose two novel reinforcement learning (RL) based algorithms that attempt to minimize a certain long-run average cost objective. Both our algorithms incorporate feature-b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.