Skip to main content

Showing 1–38 of 38 results for author: Lucani, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22190  [pdf, ps, other

    cs.LG cs.IT eess.SP

    dreaMLearning: Data Compression Assisted Machine Learning

    Authors: Xiaobo Zhao, Aaron Hurst, Panagiotis Karras, Daniel E. Lucani

    Abstract: Despite rapid advancements, machine learning, particularly deep learning, is hindered by the need for large amounts of labeled data to learn meaningful patterns without overfitting and immense demands for computation and storage, which motivate research into architectures that can achieve good performance with fewer resources. This paper introduces dreaMLearning, a novel framework that enables lea… ▽ More

    Submitted 27 June, 2025; originally announced June 2025.

    Comments: 18 pages, 11 figures

  2. arXiv:2506.09186  [pdf, ps, other

    eess.SP cs.DB

    Not all those who drift are lost: Drift correction and calibration scheduling for the IoT

    Authors: Aaron Hurst, Andrey V. Kalinichev, Klaus Koren, Daniel E. Lucani

    Abstract: Sensors provide a vital source of data that link digital systems with the physical world. However, as sensors age, the relationship between what they measure and what they output changes. This is known as sensor drift and poses a significant challenge that, combined with limited opportunity for re-calibration, can severely limit data quality over time. Previous approaches to drift correction typic… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  3. Precision on Demand: Propositional Logic for Event-Trigger Threshold Regulation

    Authors: Valdemar Tang, Claudio Gomes, Daniel Lucani

    Abstract: We introduce a novel event-trigger threshold (ETT) regulation mechanism based on the quantitative semantics of propositional logic (PL). We exploit the expressiveness of the PL vocabulary to deliver a precise and flexible specification of ETT regulation based on system requirements and properties. Additionally, we present a modified ETT regulation mechanism that provides formal guarantees for sati… ▽ More

    Submitted 11 February, 2025; v1 submitted 26 August, 2024; originally announced August 2024.

    Comments: 17 pages, 7 figures

    Journal ref: IEEE Internet of Things Journal, vol. 12, no. 3, pp. 2674-2689, 1 Feb.1, 2025

  4. arXiv:2402.05974  [pdf, other

    eess.IV cs.CV cs.GR cs.IT

    RAGE for the Machine: Image Compression with Low-Cost Random Access for Embedded Applications

    Authors: Christian D. Rask, Daniel E. Lucani

    Abstract: We introduce RAGE, an image compression framework that achieves four generally conflicting objectives: 1) good compression for a wide variety of color images, 2) computationally efficient, fast decompression, 3) fast random access of images with pixel-level granularity without the need to decompress the entire image, 4) support for both lossless and lossy compression. To achieve these, we rely on… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Comments: 7 pages, submitted, 10 figures, submitted to IEEE International Conference on Image Processing (ICIP)

  5. PairwiseHist: Fast, Accurate and Space-Efficient Approximate Query Processing with Data Compression

    Authors: Aaron Hurst, Daniel E. Lucani, Qi Zhang

    Abstract: Exponential growth in data collection is creating significant challenges for data storage and analytics latency.Approximate Query Processing (AQP) has long been touted as a solution for accelerating analytics on large datasets, however, there is still room for improvement across all key performance criteria. In this paper, we propose a novel histogram-based data synopsis called PairwiseHist that u… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

  6. arXiv:2308.14627  [pdf, other

    cs.CR

    Zip to Zip-it: Compression to Achieve Local Differential Privacy

    Authors: Francesco Taurone, Daniel Lucani, Qi Zhang

    Abstract: Local differential privacy techniques for numerical data typically transform a dataset to ensure a bound on the likelihood that, given a query, a malicious user could infer information on the original samples. Queries are often solely based on users and their requirements, limiting the design of the perturbation to processes that, while privatizing the results, do not jeopardize their usefulness.… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Journal ref: 2023 IEEE Global Communications Conference: Selected Areas in Communications: Cloud/edge Computing, Networking, and Data Storage (Globecom2023 SAC CLOUD)

  7. Lossless preprocessing of floating point data to enhance compression

    Authors: Francesco Taurone, Daniel E. Lucani, Marcell Fehér, Qi Zhang

    Abstract: Data compression algorithms typically rely on identifying repeated sequences of symbols from the original data to provide a compact representation of the same information, while maintaining the ability to recover the original data from the compressed sequence. Using data transformations prior to the compression process has the potential to enhance the compression capabilities, being lossless as lo… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  8. arXiv:2304.07240  [pdf, other

    cs.DB

    GreedyGD: Enhanced Generalized Deduplication for Direct Analytics in IoT

    Authors: Aaron Hurst, Daniel E. Lucani, Qi Zhang

    Abstract: Exponential growth in the amount of data generated by the Internet of Things currently pose significant challenges for data communication, storage and analytics and leads to high costs for organisations hoping to leverage their data. Novel techniques are therefore needed to holistically improve the efficiency of data storage and analytics in IoT systems. The emerging compression technique Generali… ▽ More

    Submitted 14 April, 2023; originally announced April 2023.

    ACM Class: E.2

  9. arXiv:2303.04478  [pdf, other

    cs.DS

    Change a Bit to save Bytes: Compression for Floating Point Time-Series Data

    Authors: Francesco Taurone, Daniel E. Lucani, Marcell Fehér, Qi Zhang

    Abstract: The number of IoT devices is expected to continue its dramatic growth in the coming years and, with it, a growth in the amount of data to be transmitted, processed and stored. Compression techniques that support analytics directly on the compressed data could pave the way for systems to scale efficiently to these growing demands. This paper proposes two novel methods for preprocessing a stream of… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

    Journal ref: 2023 IEEE International Conference on Communications (ICC): SAC Cloud Computing, Networking and Storage Track (IEEE ICC'23 - SAC-02 CCNS Track)

  10. arXiv:2209.02334  [pdf, other

    cs.DB

    An Adaptive Column Compression Family for Self-Driving Databases

    Authors: Marcell Fehér, Daniel E. Lucani, Ioannis Chatzigeorgiou

    Abstract: Modern in-memory databases are typically used for high-performance workloads, therefore they have to be optimized for small memory footprint and high query speed at the same time. Data compression has the potential to reduce memory requirements but often reduces query speed too. In this paper we propose a novel, adaptive compressor that offers a new trade-off point of these dimensions, achieving b… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

    Comments: Appeared in the Thirteenth International Workshop on Accelerating Analytics and Data Management Systems Using Modern Processor and Storage Architectures (ADMS'22), a workshop of VLDB22

  11. arXiv:2202.13925  [pdf, ps, other

    cs.CR

    Bonsai: A Generalized Look at Dual Deduplication

    Authors: Hadi Sehat, Anders Lindskov Kloborg, Christian Mørup, Elena Pagnin, Daniel E. Lucani

    Abstract: Cloud Service Providers (CSPs) offer a vast amount of storage space at competitive prices to cope with the growing demand for digital data storage. Dual deduplication is a recent framework designed to improve data compression on the CSP while keeping clients' data private from the CSP. To achieve this, clients perform lightweight information-theoretic transformations to their data prior to upload.… ▽ More

    Submitted 29 March, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

  12. arXiv:2201.10839  [pdf, other

    cs.CR

    Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication

    Authors: Hadi Sehat, Elena Pagnin, Daniel E. Lucani

    Abstract: We consider the problem of sharing sensitive or valuable files across users while partially relying on a common, untrusted third-party, e.g., a Cloud Storage Provider (CSP). Although users can rely on a secure peer-to-peer (P2P) channel for file sharing, this introduces potential delay on the data transfer and requires the sender to remain active and connected while the transfer process occurs. In… ▽ More

    Submitted 26 January, 2022; originally announced January 2022.

  13. arXiv:2107.08868  [pdf, other

    cs.IT cs.IR

    Energy Efficient Data Recovery from Corrupted LoRa Frames

    Authors: Niloofar Yazdani, Nikolaos Kouvelas, R Venkatesha Prasad, Daniel E. Lucani

    Abstract: High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped,… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: 6 pages

  14. arXiv:2105.00721  [pdf, other

    cs.NI

    Stream Compression of DLMS Smart Meter Readings

    Authors: Marcell Fehér, Daniel E. Lucani, Morten Tranberg Hansen, Flemming Enevold Vester

    Abstract: Smart electricity meters typically upload readings a few times a day. Utility providers aim to increase the upload frequency in order to access consumption information in near real time, but the legacy compressors fail to provide sufficient savings on the low-bandwidth, high-cost data connection. We propose a new compression method and data format for DLMS smart meter readings, which is significan… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: 6 pages, 7 figures, IEEE conference format, submitted to Globecom'21

  15. arXiv:2104.15094  [pdf, other

    cs.NI

    QoS-Aware Placement of Deep Learning Services on the Edge with Multiple Service Implementations

    Authors: Nathaniel Hudson, Hana Khamfroush, Daniel E. Lucani

    Abstract: Mobile edge computing pushes computationally-intensive services closer to the user to provide reduced delay due to physical proximity. This has led many to consider deploying deep learning models on the edge -- commonly known as edge intelligence (EI). EI services can have many model implementations that provide different QoS. For instance, one model can perform inference faster than another (thus… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

    Comments: Accepted for publication through the 30th International Conference on Computer Communications and Networks (ICCCN 2021). This manuscript contains a complete proof of a theorem referenced in the ICCCN manuscript

  16. ZipLine: In-Network Compression at Line Speed

    Authors: Sébastien Vaucher, Niloofar Yazdani, Pascal Felber, Daniel E. Lucani, Valerio Schiavoni

    Abstract: Network appliances continue to offer novel opportunities to offload processing from computing nodes directly into the data plane. One popular concern of network operators and their customers is to move data increasingly faster. A common technique to increase data throughput is to compress it before its transmission. However, this requires compression of the data -- a time and energy demanding pre-… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

    Journal ref: 2020. Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery, New York, NY, USA, 399-405

  17. arXiv:2011.08381  [pdf, other

    cs.DC cs.NI

    Optimal Accuracy-Time Trade-off for Deep Learning Services in Edge Computing Systems

    Authors: Minoo Hosseinzadeh, Andrew Wachal, Hana Khamfroush, Daniel E. Lucani

    Abstract: With the increasing demand for computationally intensive services like deep learning tasks, emerging distributed computing platforms such as edge computing (EC) systems are becoming more popular. Edge computing systems have shown promising results in terms of latency reduction compared to the traditional cloud systems. However, their limited processing capacity imposes a trade-off between the pote… ▽ More

    Submitted 16 November, 2020; originally announced November 2020.

  18. arXiv:2007.11403  [pdf, ps, other

    cs.CR cs.IT

    Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings

    Authors: Hadi Sehat, Elena Pagnin, Daniel E. Lucani

    Abstract: This paper proposes Yggdrasil, a protocol for privacy-aware dual data deduplication in multi client settings. Yggdrasil is designed to reduce the cloud storage space while safeguarding the privacy of the client's outsourced data. Yggdrasil combines three innovative tools to achieve this goal. First, generalized deduplication, an emerging technique to reduce data footprint. Second, non-deterministi… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  19. arXiv:2007.10064  [pdf, other

    cs.NI

    Memory-aware Online Compression of CAN Bus Data for Future Vehicular Systems

    Authors: Niloofar Yazdani, Lars Nielsen, Daniel E. Lucani

    Abstract: Vehicles generate a large amount of data from their internal sensors. This data is not only useful for a vehicle's proper operation, but it provides car manufacturers with the ability to optimize performance of individual vehicles and companies with fleets of vehicles (e.g., trucks, taxis, tractors) to optimize their operations to reduce fuel costs and plan repairs. This paper proposes algorithms… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 6 pages, 7 figures

  20. Hermes: Enabling Energy-efficient IoT Networks with Generalized Deduplication

    Authors: Christian Göttel, Lars Nielsen, Niloofar Yazdani, Pascal Felber, Daniel E. Lucani, Valerio Schiavoni

    Abstract: With the advent of the Internet of Things (IoT), the ever growing number of connected devices observed in recent years and foreseen for the next decade suggests that more and more data will have to be transmitted over a network, before being processed and stored in data centers. Generalized deduplication (GD) is a novel technique to effectively reduce the data storage cost by identifying similar d… ▽ More

    Submitted 20 July, 2020; v1 submitted 22 May, 2020; originally announced May 2020.

    Comments: This work was partially financed by the SCALE-IoT Project (Grant No. 7026-00042B) granted by the Independent Research Fund Denmark, by the Aarhus Universitets Forskningsfond (AUFF) Starting Grant Project AUFF- 2017-FLS-7-1, and Aarhus University's DIGIT Centre. European Commission Project: LEGaTO - Low Energy Toolset for Heterogeneous Computing (EC-H2020-780681)

    Journal ref: DEBS'20: Proceedings of the 14th ACM International Conference on Distributed and Event-Based Systems (2020) 133-136

  21. Generalized Deduplication: Bounds, Convergence, and Asymptotic Properties

    Authors: Rasmus Vestergaard, Qi Zhang, Daniel E. Lucani

    Abstract: We study a generalization of deduplication, which enables lossless deduplication of highly similar data and show that standard deduplication with fixed chunk length is a special case. We provide bounds on the expected length of coded sequences for generalized deduplication and show that the coding has asymptotic near-entropy cost under the proposed source model. More importantly, we show that gene… ▽ More

    Submitted 7 August, 2019; v1 submitted 9 January, 2019; originally announced January 2019.

    Comments: 15 pages, 4 figures. This is the full version of a paper accepted for GLOBECOM 2019

  22. arXiv:1804.07190  [pdf, other

    cs.NI

    Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

    Authors: Xiaobo Zhao, Daniel E. Lucani, Xiaohong Shen, Haiyan Wang

    Abstract: This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow model that captures the overall process of data transmission between IoT devices, from the initial prepar… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 4 pages, 3 figures, accepted for publication in IEEE Communications Letters

  23. arXiv:1511.05892  [pdf, ps, other

    cs.IT cs.MM cs.NI cs.PF

    Analysis and Optimization of Sparse Random Linear Network Coding for Reliable Multicast Services

    Authors: Andrea Tassi, Ioannis Chatzigeorgiou, Daniel E. Lucani

    Abstract: Point-to-multipoint communications are expected to play a pivotal role in next-generation networks. This paper refers to a cellular system transmitting layered multicast services to a multicast group of users. Reliability of communications is ensured via different Random Linear Network Coding (RLNC) techniques. We deal with a fundamental problem: the computational complexity of the RLNC decoder. T… ▽ More

    Submitted 19 November, 2015; v1 submitted 18 November, 2015; originally announced November 2015.

    Comments: To appear on IEEE Transactions on Communications

  24. arXiv:1404.6620  [pdf, other

    cs.IT cs.NI

    Fulcrum Network Codes: A Code for Fluid Allocation of Complexity

    Authors: Daniel E. Lucani, Morten V. Pedersen, Diego Ruano, Chres W. Sørensen, Frank H. P. Fitzek, Janus Heide, Olav Geil

    Abstract: This paper proposes Fulcrum network codes, a network coding framework that achieves three seemingly conflicting objectives: (i) to reduce the coding coefficient overhead to almost n bits per packet in a generation of n packets; (ii) to operate the network using only GF(2) operations at intermediate nodes if necessary, dramatically reducing complexity in the network; (iii) to deliver an end-to-end… ▽ More

    Submitted 18 November, 2015; v1 submitted 26 April, 2014; originally announced April 2014.

    Comments: 30 pages, 12 figures, Submitted to the IEEE Transactions on Communications

  25. Systematic Network Coding with the Aid of a Full-Duplex Relay

    Authors: Giuliano Giacaglia, Xiaomeng Shi, MinJi Kim, Daniel E. Lucani, Muriel Medard

    Abstract: A characterization of systematic network coding over multi-hop wireless networks is key towards understanding the trade-off between complexity and delay performance of networks that preserve the systematic structure. This paper studies the case of a relay channel, where the source's objective is to deliver a given number of data packets to a receiver with the aid of a relay. The source broadcasts… ▽ More

    Submitted 30 March, 2012; originally announced April 2012.

    Comments: 6 pages, 5 figures, submitted to IEEE Globecom

  26. arXiv:1109.2613  [pdf, ps, other

    cs.NI

    Whether and Where to Code in the Wireless Relay Channel

    Authors: Xiaomeng Shi, Muriel Medard, Daniel E. Lucani

    Abstract: The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations. In energy-constrained systems, however, coding subgraphs should be chosen to control the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of ne… ▽ More

    Submitted 1 June, 2012; v1 submitted 12 September, 2011; originally announced September 2011.

    Comments: 11 pages, 12 figures, to be published in the IEEE JSAC Special Issue on Theories and Methods for Advanced Wireless Relays

  27. Energy-Delay Considerations in Coded Packet Flows

    Authors: Daniel E. Lucani, Joerg Kliewer

    Abstract: We consider a line of terminals which is connected by packet erasure channels and where random linear network coding is carried out at each node prior to transmission. In particular, we address an online approach in which each terminal has local information to be conveyed to the base station at the end of the line and provide a queueing theoretic analysis of this scenario. First, a genie-aided sce… ▽ More

    Submitted 31 May, 2011; originally announced May 2011.

    Comments: 5 pages, 3 figures. Accepted, IEEE ISIT 2011, Saint Petersburg, Russia

  28. arXiv:1103.0266  [pdf, ps, other

    cs.IT

    On the Order Optimality of Large-scale Underwater Networks

    Authors: Won-Yong Shin, Daniel E. Lucani, Muriel Medard, Milica Stojanovic, Vahid Tarokh

    Abstract: Capacity scaling laws are analyzed in an underwater acoustic network with $n$ regularly located nodes on a square, in which both bandwidth and received signal power can be limited significantly. A narrow-band model is assumed where the carrier frequency is allowed to scale as a function of $n$. In the network, we characterize an attenuation parameter that depends on the frequency scaling as well a… ▽ More

    Submitted 28 March, 2011; v1 submitted 1 March, 2011; originally announced March 2011.

    Comments: 25 pages, 6 figures, Submitted to IEEE Transactions on Information Theory (part of this work was submitted to the 2011 IEEE International Symposium on Information Theory 2011)

  29. arXiv:1008.0143  [pdf, ps, other

    cs.NI

    When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

    Authors: Xiaomeng Shi, Muriel Medard, Daniel Lucani

    Abstract: A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. We propose a simple network layer protocol for star networks, adapting redundancy based on both transmission and reception energies for data and control packets, as well as channel conditions. Our numerical results show that ev… ▽ More

    Submitted 25 February, 2011; v1 submitted 31 July, 2010; originally announced August 2010.

    Comments: 10 pages, 7 figures, submitted to the NC-Pro Workshop at IFIP Networking Conference 2011, and to appear in the conference proceedings, published by Springer-Verlag, in the Lecture Notes in Computer Science (LNCS) series

  30. arXiv:1005.0855  [pdf, ps, other

    cs.IT

    On Capacity Scaling of Underwater Networks: An Information-Theoretic Perspective

    Authors: Won-Yong Shin, Daniel E. Lucani, Muriel Medard, Milica Stojanovic, Vahid Tarokh

    Abstract: Capacity scaling laws are analyzed in an underwater acoustic network with $n$ regularly located nodes on a square. A narrow-band model is assumed where the carrier frequency is allowed to scale as a function of $n$. In the network, we characterize an attenuation parameter that depends on the frequency scaling as well as the transmission distance. A cut-set upper bound on the throughput scaling is… ▽ More

    Submitted 7 May, 2010; v1 submitted 5 May, 2010; originally announced May 2010.

    Comments: 16 pages, 4 figures, Submitted to IEEE Transactions on Information Theory

  31. Network Coding for Multi-Resolution Multicast

    Authors: MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Medard

    Abstract: Multi-resolution codes enable multicast at different rates to different receivers, a setup that is often desirable for graphics or video streaming. We propose a simple, distributed, two-stage message passing algorithm to generate network codes for single-source multicast of multi-resolution codes. The goal of this "pushback algorithm" is to maximize the total rate achieved by all receivers, whil… ▽ More

    Submitted 4 August, 2009; originally announced August 2009.

    Comments: 9 pages, 16 figures, submitted to IEEE INFOCOM 2010

  32. arXiv:0903.4443  [pdf, other

    cs.IT

    Broadcasting in Time-Division Duplexing: A Random Linear Network Coding Approach

    Authors: Daniel E. Lucani, Muriel Médard, Milica Stojanovic

    Abstract: We study random linear network coding for broadcasting in time division duplexing channels. We assume a packet erasure channel with nodes that cannot transmit and receive information simultaneously. The sender transmits coded data packets back-to-back before stopping to wait for the receivers to acknowledge the number of degrees of freedom, if any, that are required to decode correctly the infor… ▽ More

    Submitted 25 March, 2009; originally announced March 2009.

    Comments: 6 pages, 5 figures, Submitted to Workshop on Network Coding, Theory, and Applications (NetCod 2009)

  33. arXiv:0903.4434  [pdf, other

    cs.IT

    Random Linear Network Coding for Time-Division Duplexing: Queueing Analysis

    Authors: Daniel E. Lucani, Muriel Médard, Milica Stojanovic

    Abstract: We study the performance of random linear network coding for time division duplexing channels with Poisson arrivals. We model the system as a bulk-service queue with variable bulk size. A full characterization for random linear network coding is provided for time division duplexing channels [1] by means of the moment generating function. We present numerical results for the mean number of packet… ▽ More

    Submitted 25 March, 2009; originally announced March 2009.

    Comments: 5 pages, 5 figures, 2 tables, Submitted to ISIT 2009

  34. arXiv:0903.4426  [pdf, other

    cs.IT

    Capacity Scaling Laws for Underwater Networks

    Authors: Daniel E. Lucani, Muriel Médard, Milica Stojanovic

    Abstract: The underwater acoustic channel is characterized by a path loss that depends not only on the transmission distance, but also on the signal frequency. Signals transmitted from one user to another over a distance $l$ are subject to a power loss of $l^{-α}{a(f)}^{-l}$. Although a terrestrial radio channel can be modeled similarly, the underwater acoustic channel has different characteristics. The s… ▽ More

    Submitted 25 March, 2009; originally announced March 2009.

    Comments: 5 pages, 2 figures, to Appear in Proceedings of Asilomar Conference on Signals, Systems, and Computers, 2008

  35. arXiv:0901.0269  [pdf, other

    cs.IT

    Random Linear Network Coding For Time Division Duplexing: Energy Analysis

    Authors: Daniel E. Lucani, Milica Stojanovic, Muriel Médard

    Abstract: We study the energy performance of random linear network coding for time division duplexing channels. We assume a packet erasure channel with nodes that cannot transmit and receive information simultaneously. The sender transmits coded data packets back-to-back before stopping to wait for the receiver to acknowledge the number of degrees of freedom, if any, that are required to decode correctly… ▽ More

    Submitted 2 January, 2009; originally announced January 2009.

    Comments: 5 pages, 6 figures, Accepted to ICC 2009

  36. arXiv:0809.2350  [pdf, other

    cs.IT

    Random Linear Network Coding For Time Division Duplexing: When To Stop Talking And Start Listening

    Authors: Daniel E. Lucani, Milica Stojanovic, Muriel Médard

    Abstract: A new random linear network coding scheme for reliable communications for time division duplexing channels is proposed. The setup assumes a packet erasure channel and that nodes cannot transmit and receive information simultaneously. The sender transmits coded data packets back-to-back before stopping to wait for the receiver to acknowledge (ACK) the number of degrees of freedom, if any, that ar… ▽ More

    Submitted 13 September, 2008; originally announced September 2008.

    Comments: 9 pages, 9 figures, Submitted to INFOCOM'09

  37. arXiv:0809.0070  [pdf, ps, other

    cs.IT

    Underwater Acoustic Networks: Channel Models and Network Coding based Lower Bound to Transmission Power for Multicast

    Authors: Daniel E. Lucani, Muriel Médard, Milica Stojanovic

    Abstract: The goal of this paper is two-fold. First, to establish a tractable model for the underwater acoustic channel useful for network optimization in terms of convexity. Second, to propose a network coding based lower bound for transmission power in underwater acoustic networks, and compare this bound to the performance of several network layer schemes. The underwater acoustic channel is characterize… ▽ More

    Submitted 30 August, 2008; originally announced September 2008.

    Comments: 12 pages, 10 figures, 2 Tables, Accepted to Journal on Selected Areas in Communications (Underwater Communications and Wireless Networks)

  38. On the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel

    Authors: Daniel E. Lucani, Milica Stojanovic, Muriel Médard

    Abstract: The underwater acoustic channel is characterized by a path loss that depends not only on the transmission distance, but also on the signal frequency. As a consequence, transmission bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio system. The exact relationship between power, transmission band, distance and capacit… ▽ More

    Submitted 2 January, 2008; originally announced January 2008.

    Comments: 6 pages, 9 Figures, Awaiting acceptance to IEEE Oceans 08 (Conference), Kobe, Japan