Sánchez de la Fuente, Yago ; Skupin, Robert ; Schierl, Thomas (2016)
Panoramic streaming is a particular way of video streaming where an arbitrary Region-of-Interest (RoI) is transmitted from a high-spatial resolution video, i.e. a video covering a very “wide-angle” (much larger than the human field-of-view – e.g. 360°). Some transport schemes for panoramic video delivery have been proposed and demonstrated within the past decade, which allow users to navigate i...Autonomous algorithms for centralized and distributed interference coordination: a virtual layer-based approach
Kasparick, Martin ; Wunder, Gerhard (2014)
Interference mitigation techniques are essential for improving the performance of interference limited wireless networks. In this paper, we introduce novel interference mitigation schemes for wireless cellular networks with space division multiple access (SDMA). The schemes are based on a virtual layer that captures and simplifies the complicated interference situation in the network and that i...Empirical analysis of the effects and the mitigation of IPv4 address exhaustion
Richter, Philipp (2017)
IP addresses are essential resources for communication over the Internet. In IP version 4, an address is represented by 32 bits in the IPv4 header; hence there is a finite pool of roughly 4B addresses available. The Internet now faces a fundamental resource scarcity problem: The exhaustion of the available IPv4 address space. In 2011, the Internet Assigned Numbers Authority (IANA) depleted its ...Web content delivery, monetization, and search
Pujol Gil, Enric (2017)
The World Wide Web has become the most used information system worldwide. It has fueled an unprecedented commercialization of the Internet by turning this network system designed for academic data exchange into a widely used social medium. After decades of operational experience with these two systems, researchers and engineers continue to be daily confronted with the urge to accommodate new us...Towards energy aware wireless network operation
Pollakis, Emmanuel (2017)
Todays cellular communication networks have come a long way from voice only capabilities to wireless networks that serve millions of users and machine type devices with high data rates and low latencies. Typically, network designers overprovision the capacity of those networks in order to allow for some increase in demand over the years. This approach together with a largely static network oper...Security by similarity: information-theoretic secrecy and decentralized detection algorithms for wireless networks
Mohammadi, Jafar (2017)
The broadcasting attribute of the wireless communication channel poses severe security vulnerabilities since any adversary node in the range of reception is able to listen as well as to disrupt the ongoing communication. This dissertation considers the problem of security from two different perspectives: The information-theoretic approach at the physical-layer to avert eavesdropping and central...Energy savings in 5G automotive nomadic relaying networks
Ren, Zhe (2017)
The requirements of ubiquitous connectivity of high speed data access create fundamental challenges for the design of future wireless communication systems and modern vehicle telematic systems. Against this background, the concept of a nomadic relaying network is of enormous interest to both academia and industry. A nomadic relaying network consists of randomly distributed nomadic nodes (e.g. p...Call Graph Generated by Simulation-Based Tracing and Profiling
Busse, Anselm ; Karnapke, Reinhardt ; Parzyjegla, Helge (2017)
nullQuality of experience of multiparty conferencing and telemeeting systems
Skowronek, Janto (2017)
Die vorliegende Dissertation behandelt die Qualitätswahrnehmung von Telemeetingsystemen, d.h. audiovisuellen Telekonferenzsystemen, bei denen mehr als zwei Gesprächspartner miteinander verbunden sind. Die Dissertation legt den Schwerpunkt auf zwei Aspekte, die ein Telemeeting, d.h. Mehrpersonengespräch über ein Telemeetingsystem, von einem konventionellen (Video-)Telefonat zwischen zwei Teilneh...Understanding benefits of different vantage points in today’s Internet
Böttger, Jan (2017)
Measuring the Internet is indispensable to a better understanding of its current state and trends, but obtaining measurements is difficult both qualitatively and quantitatively. The challenges of “Internet Measurement” are manifold due to the nature of the beast, namely its complexity, distribution, and constant change. The Internet grows continuously and since it consists of many interdependen...Programming and managing swarms of mobile robots
Graff, Daniel (2017)
Numerous heterogeneous devices-including stationary as well as mobile devices-exist that are equipped with a variety of sensors and actuators. This enables new kinds of applications, e.g., applications for monitoring the environment and initiating early warnings in case of natural catastrophes, applications for exploration missions as well as applications for monitoring structural integrity of ...Statistical learning, anomaly detection, and optimization in self-organizing networks
Liao, Qi (2016)
Self-organizing network, considered as a starting point toward self-aware cognitive network, is an automation technology designed for automated configuring, monitoring, troubleshooting and optimizing for the next generation mobile networks. Its main functionalities include: self-configuration, self-optimization and self-healing. With the emergence of new wireless devices and applications, t...A dynamic and component-based process scheduler framework for heterogeneous many-core systems
Busse, Anselm (2016)
Since the first decade of the 21st century, improvements in computer performance are no longer achieved through increasing clock rates but parallelization and specialization. As a result, heterogeneous many-core systems are becoming more and more common. Leaving their niche in highly specialized computing, they have to be supported by a general purpose operating system. A major part of the supp...Channel investigation of outdoor millimeter-wave access links
Weiler, Richard Jürgen (2016)
This thesis presents measurements, characterizations and modeling approaches of the outdoor millimeter-wave access channel. More specifically, in this thesis I address an overlay concept for millimeter-wave 5G networks and corresponding channel measurement campaigns. These campaigns were planned and executed with an approach that focuses on fine spatial and temporal sampling of the channel. Thi...Appendices for: Improper Signaling in Two-Path Relay Channels
Gaafar, Mohamed ; Amin, Osama ; Schaefer, Rafael. F ; Alouini, Mohamed-Slim (2016)
This document contains the appendices for our work which is submitted to 2017 IEEE International Conference on Communications (ICC) Workshop on Full-Duplex Communications for Future Wireless Networks, Paris, France.A software fault-tolerance mechanism for mixed-critical real-time applications on consumer-grade many-core processors
Munk, Peter (2016)
The number of cores per processor continues to increase due to higher integration rates and smaller feature sizes. This development of many-core processors leads to a higher susceptibility to soft errors, which are caused by high-energy particle strikes. At the same time, the complexity and computational demand of automotive applications is rising steadily, following the vision of highly autom...Adaptation algorithms for HTTP-based video streaming
Miller, Konstantin (2016)
Ever since the invention of the cinematography, there has been a growing demand for high-quality video content. Recently, the broad availability of high-speed wireless Internet access, complemented by the pervasiveness of mobile, computationally powerful devices with high-resolution screens, have made the video delivery over the open Internet the technology of choice for both video on demand an...Wideband propagation channel in vehicular communication scenarios
Mahler, Kim (2016)
Future vehicles will be equipped with increasing computational capabilities and various vehicular sensors, enabling intelligent vehicles to perceive their surroundings in a better way. Vehicle-to-vehicle (V2V) communication is envisioned as a complementary sensor with remarkable potential for safety-related applications. The reliability of the wireless communication link is crucial and directly...Low complexity embedded fingerprint verification and identification system
Sun, Wei (2016)
A qualified fingerprint verification and identification system should resolve most of the problems of fingerprint image enhancement and fingerprint matching. In practice, the fingerprint images are not ideal and may have totally different qualities when the fingers are too moist too dry, improperly placed, or from some users who are engaged in heavy manual work. Furthermore nonlinear deformatio...Realizing software-defined wireless networks
Schulz-Zander, Julius (2016)
Fueled by the increasing popularity of wireless enabled mobile end-devices and the advent of the Internet-of-Things networks, the demand for wireless access technology is growing rapidly. Today, many hotels and cafés—and sometimes also entire cities—already offer free WiFi services. Moreover, several mobile operators operate massive WiFi HotSpot, as well as HotSpot 2.0, deployments for traffic ...
- 53 004 Datenverarbeitung; Informatik
- 51 620 Ingenieurwissenschaften und z...
- 36 000 Informatik, Informationswisse...
- 16 000 Informatik, Informationswisse...
- 13 600 Technik, Medizin, angewandte ...
- 10 600 Technik, Medizin, angewandte ...
- 7 600 Technik, Medizin, angewandte ...
- 6 000 Informatik, Informationswisse...
- 6 Optimization
- 5 000 Informatik, Informationswisse...
- Next »
- 159 true