Fast Approximation Algorithms for p-Centers in Large ? -Hyperbolic Graphs

  • Edwards K.
  • Kennedy W.
  • Saniee I.

© 2018, Springer Science+Business Media, LLC, part of Springer Nature. We provide a quasilinear time algorithm for the p-center problem with an additive error less than or equal to 3 times the input graph?s hyperbolic constant. Specifically, for the graph G= (V, E) with n vertices, m edges and hyperbolic ...

Signal Ratio Detection and Approximate Performance Analysis for Ambient Backscatter Communication Systems with Multiple Receiving Antennas

© 2017, Springer Science+Business Media, LLC, part of Springer Nature. Recently, ambient backscatter attracts much attention since it can utilize ambient radio frequency signals to enable battery-free devices to communicate with others. Most existing studies about ambient backscatter assume that the reader is equipped with one receiving antenna. In practice, ...

Towards Modeling Cross-Domain Network Slices for 5G

Network Slicing (NS) is expected to be a key functionality of the upcoming 5G systems and coupled with Software Defined Networking (SDN) and Network Function Virtualization (NFV), NS will enable a flexible deployment of Network Functions belonging to multiple Service Function Chains (SFC) over a shared infrastructure. To address the ...

Benchmarking the ONOS Intent interfaces to ease 5G service management

The use cases of the upcoming 5G mobile networks introduce new and complex user demands that will require support for fast reconfiguration of network resources. Software Defined Network (SDN) is a key technology that can address these requirements, as it decouples the control plane from the data plane of the ...

Self-Healing and Resilience in Future 5G Cognitive Autonomous Networks

  • Ali-Tolppa J.
  • Bodrog L.
  • Kajo M.
  • Kocsis S.
  • Schultz B.

In the Self-Organizing Networks (SON) concept, self-healing functions are used to detect, diagnose and recover degraded states in the managed Network Functions (NFs) or other resources. Such methods are increasingly important in future network deployments, since ultra-high reliability is one of the key requirements for the future 5G networks, for ...

Towards Cognitive Autonomous Networks in 5G

Cell densification and new Radio Access Technologies (RATs) have been the solutions towards improving area-spectral efficiency to serve the ever-increasing traffic demand. However, these solutions lead to increased cost and complexity of network design and operation. The solution thereto is globally agreed to be further network automation, specifically, by embedding ...

Everything you wanted to know about the testing, but you were too afraid to ask

Presentation for HackYeah 2018, where we were discussing test theory in basis, some consequences of lack/poor testing and reasons why we need to tests. Also simple test methodologies were presented.

How to evaluate abstraction models for 5G mobile networks integration into industrial networks

The fifth generation of mobile networks (5G) will provide capabilities for its utilization in the communication in production systems. For several technical and commercial reasons, complementing industrial wired and wireless communication technology by 5G is more likely than replacing them completely [WSJ17]. This paper sketches abstraction models of 5G networks ...

Basic Web Applications Security

Bugs, including security bugs, existed, exist and will always exist. We can't change it, but it doesn't mean that we can ignore this fact during software development. During this lecture, I'm going to show how to hack and secure the web application. I'm going to introduce you to basic, but ...

Efficient Measurement on Programmable Switches Using Probabilistic Recirculation

Programmable network switches promise flexibility and high throughput, enabling applications such as load balancing and traffic engineering. Network measurement is a fundamental building block for such applications, including tasks such as the identification of heavy hitters (largest flows) or the detection of traffic changes. However, high-throughput packet processing architectures place ...

Sphinx won't bite you! Documenting Python Code

The importance of a well-documented code is known to anyone who has ever encountered a code without documentation... sometimes their own. Right next to readability of the code lays its documentation. Every programmer knows that even a single example of code usage can put them on the right track and ...

Time brings all things to pass

  • Witecki K.

When testing asynchronous and parallel software one can run into different race conditions. One can experience races between different parts of system or races between test environment and system under test. When wombined with arbitrary timeouts used extensively in the system complexity becomes hard to harness. Imperfect solutions include waiting ...


For sure, in the future chatbots will be our virtual assistants. The level of trust between human and machine, depends on how smart and helpful bots can be. With this short presentation we would like to share our experience in development and impression of first Knowledge chatbot delivered by Network ...

Silicon Photonics Enabled Hyper-Wideband RF Receiver With >85% Instantaneous Bandwidth

We demonstrate the first-ever silicon photonics enabled hyper-wideband RF spread-spectrum link. A hybrid III/V-silicon photonic mode-locked laser encoded with a four-channel silicon photonic phase encoder is used to generate optical carriers that coherently demodulate a received RF signal spanning an instantaneous bandwidth greater than 85% of the center frequency (12/14 ...

Delta probing policies for redundancy

  • Borst S.
  • Boxma O.
  • Raaijmakers Y.

We consider job dispatching in systems with N parallel servers. In redundancy-d policies, replicas of an arriving job are assigned to d?N servers selected uniformly at random (without replacement) with the objective to reduce the delay. We introduce a quite general workload model, in which job sizes have some probability ...

Adaptive Step-size Iterative Algorithm for Sparse Signal Recovery

  • Yuan X.

We develop the variational Bayesian plus Euclidean projection (VB-EP) algorithm for sparse signal recovery from compressed measurements. This algorithm is formulated as an iteratively alternating projection strategy. The first step projects the measurements/residuals to the signal level, which is implemented via a Bayesian model; the second step projects the results ...

User level performance analysis of multi-hop in-band backhaul for 5G

  • Drozdy A.
  • Kapanen J.
  • Manner J.

In recent years, mobile access networks operating at millimeter wavelengths have received a great deal of attention, as they promise previously unattainably high mobile data rates. At these frequencies, mobile access links are expected to use highly directional beamforming antennas, which are also well suited to backhaul links. Therefore, access ...

Energy Saving via Efficient Allocation of Paging Frames

We propose an alternative design for paging in next generation networks, and investigate its potential for increasing the energy efficiency of base stations. The proposed design allocates the paging frames in certain radio frames, aiming at providing longer sleep opportunities to the base stations. This allows more hardware components to ...

Slow Food, Slow Code

  • Latuszek G.

Have you met term slow-food?. Look at It came to life as reaction for fast-food. Its manifesto is "everyone has the right to good, clean and fair food" (Carlo Petrini - Slow Food Founder & President). How it maps to software engineering, especially test automation? I'm sure you have ...

Non-convex weighted ?<inf>p</inf>nuclear norm based ADMM framework for image restoration

  • Liu X.
  • Tang L.
  • Wang Q.
  • Wu Y.
  • Yuan X.
  • Zha Z.
  • Zhang X.

© 2018 Inspired by the fact that the matrix formed by nonlocal similar patches in a natural image is of low rank, the nuclear norm minimization (NNM) has been widely used in various image processing studies. Nonetheless, nuclear norm based convex surrogate of the rank function usually over-shrinks the rank ...