Cognitive radio networking and communications: An overview

YC Liang, KC Chen, GY Li… - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Cognitive radio (CR) is the enabling technology for supporting dynamic spectrum access:
the policy that addresses the spectrum scarcity problem that is encountered in many …

Network monitoring in software-defined networking: A review

PW Tsai, CW Tsai, CW Hsu, CS Yang - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
Monitoring is an important concept in network management as it helps network operators to
determine the behavior of a network and the status of its components. Traffic engineering …

Anomaly detection in IP networks

M Thottan, C Ji - IEEE Transactions on signal processing, 2003 - ieeexplore.ieee.org
Network anomaly detection is a vibrant research area. Researchers have approached this
problem using various techniques such as artificial intelligence, machine learning, and state …

[BUCH][B] Handbook of approximation algorithms and metaheuristics

TF Gonzalez - 2007 - taylorfrancis.com
Delineating the tremendous growth in this area, the Handbook of Approximation Algorithms
and Metaheuristics covers fundamental, theoretical topics as well as advanced, practical …

Fast accurate computation of large-scale IP traffic matrices from link loads

Y Zhang, M Roughan, N Duffield… - ACM SIGMETRICS …, 2003 - dl.acm.org
A matrix giving the traffic volumes between origin and destination in a network has
tremendously potential utility for network capacity planning and management. Unfortunately …

A user's guide to compressed sensing for communications systems

K Hayashi, M Nagahara, T Tanaka - IEICE transactions on …, 2013 - search.ieice.org
This survey provides a brief introduction to compressed sensing as well as several major
algorithms to solve it and its various applications to communications systems. We firstly …

Network tomography: Recent developments

R Castro, M Coates, G Liang, R Nowak, B Yu - 2004 - projecteuclid.org
Today's Internet is a massive, distributed network which continues to explode in size as e-
commerce and related activities grow. The heterogeneous and largely unregulated structure …

Machine-to-machine communications: Technologies and challenges

KC Chen, SY Lien - Ad Hoc Networks, 2014 - Elsevier
Abstract Machine-to-machine (M2M) communications emerge to autonomously operate to
link interactions between Internet cyber world and physical systems. We present the …

Network tomography of binary network performance characteristics

N Duffield - IEEE Transactions on Information Theory, 2006 - ieeexplore.ieee.org
In network performance tomography, characteristics of the network interior, such as link loss
and packet latency, are inferred from correlated end-to-end measurements. Most work to …

PROMISE: peer-to-peer media streaming using CollectCast

M Hefeeda, A Habib, B Botev, D Xu… - Proceedings of the …, 2003 - dl.acm.org
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer
media streaming system encompassing the key functions of peer lookup, peer-based …