Caching to the Sky: Proactive Deployment of Cache-enabled SBSs for Cellular-Connected UAVs

Enhancing LTE support for aerial users has become the study focus of recent 3rd Generation Partnership Project (3GPP) standardizations due to their high maneuverability and flexibility for on-demand deployment. A question arises: how to serve aerial users using LTE network deployments with base station (BS) antennas targeting terrestrial coverage. In ...

ClickNF: a Modular Stack for Network Function Composition

Network function virtualization calls for the replacement of specialized equipment and monolithic software deployments by functionally equivalent but leaner modular software implementations. Server-side network functions developers could especially benefit from the existence of a highly customizable yet scalable framework for the rapid design of network applications. However, balancing the conflicting ...

Cross Link Interference Suppression By Orthogonal Projector in 5G Dynamic-TDD URLLC Systems

Dynamic time division duplexing (TDD) is envisioned as a vital transmission technology of the 5G new radio, due to its reciprocal propagation characteristics. However, the potential cross link interference (CLI) imposes a fundamental limitation against the feasibility of the ultra-reliable and low latency communications (URLLC) in dynamic-TDD systems. In this ...

End-to-End Network Slice Resource Allocation for 5G Mobile Edge Computing

Mobile Edge Computing (MEC) is a key feature in future 5G mobile networks. It enables, low latency services, by bringing them closer towards the users. In 5G also a new logical network architecture providing isolated logical Network Slices (NSLs) is introduced. This necessitates an initial capacity planning and allocation of ...

Automatic Inference of Cloud Application Performance Degradation

In order for a cloud operator to make effective decisions with respect to horizontal scaling, migration, and root cause analysis, current cloud orchestration tools often need to monitor application or service-level metrics, such as latency (response time) or throughput. The interpretation of these metrics often requires significant experience (and expertise) ...

An Efficient Model for Mobile Network Slice Embedding under Resource Uncertainty

The fifth generation (5G) of mobile networks will support several new use cases, like the Internet of Things (IoT), massive Machine Type Communication (mMTC) and Ultra- Reliable and Low Latency Communication (URLLC) as well as significant improvements of the conventional Mobile Broadband (MBB) use case. End-to-end network slicing is a ...

Path Planning Problems with Side Observations- When Colonels Play Hide-and-Seek

Resource allocation games such as the famous Colonel Blotto (CB) and Hide-and-Seek (HS) games are often used to model a large variety of practical problems, but only in their one-shot versions. Indeed, due to their extremely large strategy space, it remains an open question how one can efficiently learn in ...

Combinatorics of nondeterministic walks of the Dyck and Motzkin type

This paper introduces nondeterministic walks, a new variant of one-dimensional discrete walks. At each step, a nondeterministic walk draws a random set of steps from a predefined set of sets and explores all possible extensions in parallel. We introduce our new model on Dyck steps with the nondeterministic step set ...

Symbolic Method and Directed Graph Enumeration

We introduce the arrow product, a new generating function technique for directed graph enumeration. It provides new short proofs for previous results of Gessel on the number of directed acyclic graphs and of Liskovets, Robinson and Wright on the number of strongly connected directed graphs. We also obtain new enumerative ...

On Hyper-local Conversational Agents in Urban Settings

In the last decade, a large number of virtual assistants have been offered to the market. These conversational agents use vocal commands from the users to perform various personalized tasks that are constrained by the applications a user installs on her devices. We consider a brand new conversational agent in ...

An Early Characterisation of Wearing Variability onMotion Signals for Wearables

We explore a new variability observed in motion signals acquired from modern wearables. Wearing Variability refers to the variations of the device orientation and placement across wearing events. We collect the accelerometer data on a smartwatch and an earbud and analyse how motion signals change due to the wearing variability. ...

RSRP Fingerprinting and Deep Learning Assisted UE Positioning in 5G

In this work, we investigate user equipment (UE) positioning assisted by deep learning (DL) in 5G and beyond networks. As compared to state of the art positioning algorithms used in today's networks, radio signal fingerprinting and machine learning (ML) assisted positioning requires smaller additional feedback overhead; and the positioning estimates ...

Benefits of software testing using the Scrum framework. How to avoid the Cargo Cult?

Short analysis of diffrent approaches to the small project/ team management.