Communication Aspects of a Modified Cooperative Adaptive Cruise Control Algorithm

This paper investigates the ability of modified Cooperative Adaptive Cruise Control to support high-density car platooning. We first use a simplistic communication model to study the impact of actuation lag, message periodicity, and communication delay on the minimum feasible inter-car spacing. We then use a detailed IEEE 802.11p simulation model ...

Security Witnesses for Compiler Transformations

Compiler optimizations can be correct and yet be insecure. Program changes made during optimization may weaken security guarantees -- for instance, by introducing new ways to leak secret data. This work presents a methodology for ensuring that security properties are preserved during compilation. Properties are expressed as automata operating over ...

Scaling of random walk betweenness in networks

We study the betweenness centrality (BC) of vertices of a graph using random walk paths. Random walk BC (RWBC) provides an alternative measure to the shortest path centrality of each vertex in a graph as it aggregates contributions from possibly all vertex-pairs in the graph and not just from those ...

Precoding and Detection for Broadband Single Carrier Terahertz Massive MIMO Systems Using LSQR Algorithm

The terahertz (THz) communication utilizes the frequency spectrum above 300 GHz and is widely considered as a promising solution to the future high-speed shortrange wireless communication beyond millimeter wave (mmWave) communication. While providing tens of gigahertz bandwidth, it is subjected to high propagation path loss, intersymbol and inter-user interferences. The ...

The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race

  • Cresci S.
  • Petrocchi M.
  • Pietro R.
  • Spognardi A.
  • Tesconi M.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Recent studies in social media spam and automation provide anecdotal argumentation of the rise of a new generation of spambots, so-called social spambots. Here, for the first time, we extensively study this novel ...

How 64 GBaud optical carriers maximize the capacity in core elastic WDM networks with fewer transponders per Gb/s

Following the extensive investigations of the research community throughout the last 5 years regarding the transmission performance when roughly doubling the channel symbol rate in WDM systems from generic 32 GBaud to more than 60 GBaud, this evolution is about to become a reality in the field by the next ...

Pilot Allocation for Computationally Efficient Non-Iterative Estimation of Phase Noise in OFDM

This paper proposes a pilot subcarrier allocation approach for OFDM waveforms, which enables construction of phase-noise estimate with high efficiency and low overhead in non-iterative manner. The complexity and the performance of the overall phase-noise suppression algorithm together with the proposed pilot allocation approach are evaluated against a reference algorithm. ...

An 11 GHz dual-sided self-calibrating dynamic comparator in 28 nm CMOS

Licensee MDPI, Basel, Switzerland. This paper demonstrates a high-speed, low-noise dynamic comparator, employing self-calibration. The proposed dual-sided, fully-dynamic offset calibration is able to reduce the input-referred offset voltage by a factor of ten compared to the uncalibrated value without any speed or noise penalty and with less than 5% power ...

DyMo: Dynamic Monitoring of Large-Scale LTE-Multicast Systems

IEEE LTE evolved Multimedia Broadcast/Multicast Service (eMBMS) is an attractive solution for video delivery to very large groups in crowded venues. However, the deployment and management of eMBMS systems are challenging, due to the lack of real-time feedback from the user equipments (UEs). Therefore, we present the Dynamic Monitoring (DyMo) ...

Friendly, appealing or both? Characterising user experience in sponsored search landing pages

  • Bron M.
  • Chute M.
  • Evans H.
  • Lalmas M.
  • Redi M.
  • Silvestri F.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Many of today's websites have recognised the importance of mobile friendly pages to keep users engaged and to provide a satisfying user experience. However, next to the experience provided by the sites themselves, ...

Analyzing uber's ride-sharing economy

  • Aiello L.
  • Djuric N.
  • Grbovic M.
  • Kooti F.
  • Lerman K.
  • Radosavljevic V.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. Uber is a popular ride-sharing application that matches people who need a ride (or riders) with drivers who are willing to provide it using their personal vehicles. Despite its growing popularity, there exist ...

Building and analyzing a global co-authorship network using google scholar data

  • Chen R.
  • Chen Y.
  • Ding C.
  • Fu X.
  • Hu J.
  • Hui P.

© 2017 International World Wide Web Conference Committee (IW3C2), published under Creative Commons CC BY 4.0 License. By publishing papers together, academic authors can form a co-authorship network, modeling the collaboration among them. This paper presents a data-driven study by crawling and analyzing the vast majority of author profiles of ...

Going down dangerous paths? (An editorial)

At the end of my 6-year tenure as the Editor-in-Chief of the IEEE/OSA Journal of lightwave technology, I would like to take the opportunity to not only reflect on this very special journal that has served our photonics community for the past 35 years, but more generally on the state ...

Deadline Constrained Traffic Handling under Average Power Constraints

  • Angelakis V.
  • Ephremides A.
  • Fountoulakis E.
  • Liao Q.
  • Pappas N.

Wireless devices need to adapt their transmission power according to the fluctuating wireless channel in order to meet constraints of delay sensitive applications. In this paper, we consider delay sensitivity in the form of strict deadlines on packet arriving in a transmission queue. Packets missing the deadline while in the ...

Annotate: Organizing Unstructured Contents Via Topic Labels

This is a presentation for the publication that has been already cleared for external release. With the advent of Big Data paradigm, filtering, retrieval, and linking of unstructured multi-modal data has become a necessity. Assigning topic labels to contents, that accurately capture the meaning and contextual information, is a fundamental ...

A Secure End-to-End Cloud Computing Solution for Emergency Management via UAVs

  • Fischer T.
  • Gao J.
  • Knode J.
  • Liao Q.
  • Naseer F.
  • Oechsner C.

To properly determine the severity of an emergency and provide a quick response, information has to be gathered, confirmed, and analyzed. Artificial intelligence assisted UAV can provide a unique perspective and review extensive information for an incident. However, their limited computing capacity and battery duration raise the challenge to compute-intensive ...

Enabling Dynamic Resource Sharing for Slice Customization in 5G Networks

Network slicing is one of the main novelty of 5G systems and it is expected to radically change the approach of network operators to the support of vertical applications managed by tenants with specific and stringent performance requirements. Static allocation of resources to slices is a straightforward approach to meet ...

On the Impact of Listen-Before-Talk on Ultra-Reliable Low-Latency Communications

In this paper, we study the performance of ultrareliable low latency communication (URLLC) for cellular standalone systems in unlicensed bands. Our focus is on the 5 GHz band, adopting a system model in coherence with the MulteFire standard, which essentially is a variant of LTE (Long Term Evolution) for unlicensed ...

Uplink ultra-reliable low latency communications assessment in unlicensed spectrum

Through this paper, the performance of uplink transmissions in terms of latency and reliability in unlicensed spectrum is addressed. Our goal is to provide insights into how ultra-reliable and low latency communications behave over the unlicensed spectrum in standalone mode. Our system model is based on the MulteFire radio access ...

Throughput Analysis for Relay-Assisted Millimeter-Wave Wireless Networks

In this work, we analyze the throughput of random access multi-user relay-assisted millimeter-wave wireless networks, in which both the destination and the relay have multipacket reception capability. We consider a full-duplex network cooperative relay, which stores the successfully received packets in a queue, whose performance are analyzed. Moreover, we study ...