SDCoR: software defined cognitive routing for internet of vehicles
C Wang, L Zhang, Z Li, C Jiang - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is a subapplication of the Internet of Things in the automotive
field. Large amounts of sensor data require to be transferred in real-time. Most of the routing …
field. Large amounts of sensor data require to be transferred in real-time. Most of the routing …
Motion-Fi: Recognizing and counting repetitive motions with passive wireless backscattering
Recently several ground-breaking RF-based motion-recognition systems were proposed to
detect and/or recognize macro/micro human movements. These systems often suffer from …
detect and/or recognize macro/micro human movements. These systems often suffer from …
An online learning approach to network application optimization with guarantee
Network application optimization is essential for improving the performance of the
application as well as its user experience. The network application parameters are crucial in …
application as well as its user experience. The network application parameters are crucial in …
Learning with guarantee via constrained multi-armed bandit: Theory and network applications
There have been studies that consider optimizing network applications in an online learning
context using multi-armed bandit models. However, existing frameworks are problematic as …
context using multi-armed bandit models. However, existing frameworks are problematic as …
Socially-optimal mechanism design for incentivized online learning
Multi-arm bandit (MAB) is a classic online learning framework that studies the sequential
decision-making in an uncertain environment. The MAB framework, however, overlooks the …
decision-making in an uncertain environment. The MAB framework, however, overlooks the …
On improving wireless channel utilization: A collision tolerance-based approach
Packet corruption caused by collision is a critical problem that hurts the performance of
wireless networks. Conventional medium access control (MAC) protocols resort to collision …
wireless networks. Conventional medium access control (MAC) protocols resort to collision …
Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms
Multi-armed bandits (MAB) are widely applied to optimize networking applications such as
crowdsensing and mobile edge computing. Additional feedbacks (or partial feedbacks) on …
crowdsensing and mobile edge computing. Additional feedbacks (or partial feedbacks) on …
Reinforcement learning techniques for outer loop link adaptation in 4G/5G systems
SK Pulliyakode, S Kalyani - arXiv preprint arXiv:1708.00994, 2017 - arxiv.org
Wireless systems perform rate adaptation to transmit at highest possible instantaneous
rates. Rate adaptation has been increasingly granular over generations of wireless systems …
rates. Rate adaptation has been increasingly granular over generations of wireless systems …
Motion-Fi: Recognizing and Counting Repetitive Motions With Wireless Backscattering
Driven by a wide range of real-world applications, several ground-breaking RF-based
motion-recognition systems were proposed to detect and/or recognize macro/micro human …
motion-recognition systems were proposed to detect and/or recognize macro/micro human …
Minimizing File Transfer Time in Opportunistic Spectrum Access Model
We study the file transfer problem in opportunistic spectrum access (OSA) model, which has
been widely studied in throughput-oriented applications for max-throughput strategies and …
been widely studied in throughput-oriented applications for max-throughput strategies and …