Taxonomy augmented object recognition

  • Ji Q.
  • Wang X.
  • Yue Zhao

Realistic scene object recognition in computer vision still faces great challenges due to the large intra-class variation of object images caused by factors like object appearance variation and viewpoint change. To address this challenge, we propose to exploit the semantic relationships embedded in object taxonomy for improved object recognition. Specifically, ...

Fundamental Limits of Cache-Aided Interference Management

  • Avestimehr A.
  • Maddah-Ali M.
  • Naderializadeh N.

We consider a system, comprising a library of $N$ files (e.g., movies) and a wireless network with a $K_{T}$ transmitters, each equipped with a local cache of size of $M_{T}$ files and a $K_{R}$ receivers, each equipped with a local cache of size of $M_{R}$ files. Each receiver will ask ...

Distributed Staircase Codes for Connectionless Optical Metro Networks

  • Gebhard U.
  • Lei M. Zhang
  • Schmalen L.

We demonstrate a multipoint-to-point network architecture for optical metro networks with distributed FEC encoding based on a novel modification of staircase codes. We show that our scheme can maximize the throughput on the network by using a simple rate-adaptation scheme.

On prediction of resource consumption of service requests in cloud environments

  • Derakhshan F.
  • Randriamasy S.
  • Roessler H.
  • Schefczik H.

The functional efficiency of cloud solutions depends on their responsive allocation of processing resources to individual tasks according to their predefined completion time. An optimum usage of resources requires an accurate prediction of resource consumption. In this paper we introduce a novel method for predicting the resource consumption of processing ...

Towards Automated IoT Service Recommendation

  • Le Pallec .
  • Nesrine Ammar
  • Noirie L.

Today, people buy connected objects for limited usages, although these objects could be used in many other IoT services they are not aware of. In this demo paper, we illustrate a solution that helps people to better leverage their connected objects by recommending all services they could benefit from.

Stimulus-based Sandbox for Learning Resource Dependencies in Virtualized Distributed Applications

  • Aghasaryan A.
  • Bouzid M.
  • Kostadinov D.

In this paper, we describe a profiling sandbox for cloud-based distributed applications where the dependencies on available computing resources can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation applied to an application node acts as a stimulus which propagates ...

Providing for privacy in a network infrastructure protection context

  • Holtmanns S.
  • Oliver I.

Machine Learning and Big Data Analysis are seen as the silver bullet to detect and counteract attacks on critical communication infrastructure. Every message is analysed and is to some degree under suspicion. The principle of innocent until proven guilty does not seem to apply to modern communication usage. On the ...

Incorporating trust in NFV: Addressing the challenges

  • Hippelainen L.
  • Lal S.
  • Oliver I.
  • Ravidas S.

Network Functions Virtualization (NFV) helps in reducing the dependency on hardware equipments by virtualizing the telecommunication network functions. While the current works have considered different frameworks for NFV and various challenges associated with it, only a few have considered trust as an aspect of NFV. In this paper, we discuss ...

A scalable routing mechanism for stateful microservices

Scalability is an important requirement in the development and the operation of applications in a cloud environment. To handling heavy concurrency in the input load, many design-related and operational factors should be considered. The microservice architecture patterns provide better means to increase the scalability than traditional software architecture patterns. However, ...

Telecom strategies for service discovery in microservice environments

In order to communicate with another service, a service needs to know the address of other services. This knowledge can be acquired by a process called service discovery (SD). In a microservice architecture (MSA), unlike SOA, a service discovery framework has not been provided out of the box. In a ...

Photonic networks and devices feature: introduction

  • Fontaine N.
  • Furdek M.
  • Simsarian J.
  • Zervas G.

This feature issue, based on the OSA Photonic Networks and Devices (NETWORKS) meeting, part of the Advanced Photonics Congress, showcases the latest progress across the photonic network ecosystem from physical-layer devices to network management solutions.

An 8 x 10-Gb/s, 42-km High-Split TWDM PON Featuring Distributed Raman Amplification and a Remotely Powered Intelligent Splitter

  • Earnshaw M.
  • Gnauck A.
  • Hehmann J.
  • Iannone P.
  • Jentsch L.
  • Pfeiffer T.
  • Straub M.

We demonstrate an intelligent symmetric-rate, 8 x 10- Gb/s, bi-directional time and wavelength-division multiplexed passive optical network (TWDM-PON) with 42-km reach, and 1:256 split. 1425-nm laser pump light provides distributed Raman amplification for the upstream channels (allowing lowcost low-power transmitters), serves as a low-rate telemetry channel, and powers an intelligent ...

From Scaling Disparities to Integrated Parallelism: A Decathlon for a Decade

  • Neilson D.
  • Winzer P.

Based on a variety of long-term network traffic data across different geographies and applications as well as long-term scaling trends of key information and communication technologies, we identify fundamental scaling disparities between technologies used to generate and process data and technologies used to transport data. These disparities could lead to ...

Uplink Performance Analysis of Dense Cellular Networks With LoS and NLoS Transmissions

  • Albert Y. Zomaya
  • Guoqiang Mao
  • Lopez-Perez D.
  • Ming Ding
  • Tian Ding
  • Zihuai Lin

In this paper, we analyse the coverage probability and the area spectral efficiency (ASE) for the uplink (UL) of dense small cell networks (SCNs) considering a practical path loss model incorporating both line-of-sight (LoS) and non-line-of-sight (NLoS) transmissions. Compared with the existing work, we adopt the following novel approaches in ...

Multidimensional Mutual Information Characterization of Nonlinear Interactions over Time and Polarizations

  • Eriksson T.
  • Fehenberger T.
  • Idler W.

The achievable information rate is experimentally estimated in coherent fiber optical communication for different four dimensional descriptions of the channel to the demapper. Polarization-multiplexed 16-ary quadrature amplitude modulation with channel symbolrates of either 10 or 20 Gbaud are investigated in experiments over both erbium doped fiber amplifier based links and ...

Freedom of Speech: Thwarting Jammers via a Probabilistic Approach

  • Di Pietro R.
  • Oligeri G.

In this paper, we introduce a probabilistic protocol-Freedom of Speech (FoS)- that assures the delivery of the message to be broadcast (to n nodes) in the presence of a powerful jammer. FoS enjoys several features when compared to competing schemes: it requires each node to store just n symmetric pairwise ...

Risk Thinking for Cloud-Based Application Services

  • Bauer E.

Enterprises take risks, like developing new product/service offerings and expanding into new markets and sales channels, in pursuit of reward. Many enterprises are moving their applications and IT services to the cloud in pursuit of reduced operational expenses and an accelerated pace of service innovation without compromising user service quality. ...

Survey of cloud server geolocating techniques

  • Hippelainen L.
  • Lai S.
  • Oliver I.

Every cloud data center has a geographical location, which is known to, at least, its owner. Still, it is a challenge for a cloud customer to discover indisputably the location of the data center, which hosts an active cloud based service and its data. Knowing the location is necessary to ...

Coding for Distributed Fog Computing

  • Avestimehr S.
  • Li S.
  • Maddahali M.

Redundancy is abundant in Fog networks (i.e., many computing and storage points) and grows linearly with network size. We demonstrate the transformational role of coding in Fog computing for leveraging such redundancy to substantially reduce the bandwidth consumption and latency of computing. In particular, we discuss two recently proposed coding ...

Video Compressive Sensing with Side Information

  • Pang S.
  • Sun Y.
  • Yuan X.

We report a temporal compressive imaging system with side information. In addition to a coded measurement used to play the pivot role to reconstruct high speed video frames, we employ a second channel to capture the blurry image as side information to improve the reconstruction quality. These two channels are ...