SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Pappas Nikolaos 1982 ) "

Sökning: WFRF:(Pappas Nikolaos 1982 )

  • Resultat 1-10 av 37
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Age of information : foundations and applications
  • 2023
  • Samlingsverk (redaktörskap) (övrigt vetenskapligt/konstnärligt)abstract
    • At the forefront of cutting-edge technologies, this text provides a comprehensive treatment of a crucial network performance metric, ushering in new opportunities for rethinking the whole design of communication systems. Detailed exposition of the communication and network theoretic foundations of Age of Information (AoI) gives the reader a solid background, and discussion of the implications on signal processing and control theory shed light on the important potential of recent research. The text includes extensive real-world applications of this vital metric, including caching, the Internet of Things (IoT), and energy harvesting networks. The far-reaching applications of AoI include networked monitoring systems, cyber-physical systems such as the IoT, and information-oriented systems and data analytics applications ranging from the stock market to social networks. The future of this exciting subject in 5G communication systems and beyond make this a vital resource for graduate students, researchers and professionals.
  •  
2.
  • Arvanitaki, Antonia, 1991-, et al. (författare)
  • Delay Performance of a Two-User Broadcast Channel with Security Constraints
  • 2020
  • Ingår i: SN Computer Science. - : Springer. - 2661-8907 .- 2662-995X. ; 1:1
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we consider the two-user broadcast channel with security constraints. We assume that a source broadcasts packets to two receivers, and that one of them has secrecy constraints, i.e., its packets need to be kept secret from the other receiver. The receiver with secrecy constraint has full-duplex capability, allowing it to transmit a jamming signal to increase its secrecy. We derive the average delay per packet and provide simulations and numerical results, where we compare different performance metrics for the cases when both receivers treat interference as noise, when the legitimate receiver performs successive decoding, and when the eavesdropper performs successive decoding. The results show that successive decoding provides better average packet delay for the legitimate user. Furthermore, we define a new metric that characterizes the reduction on the success probability for the legitimate user that is caused by the secrecy constraint. The results show that secrecy poses a significant amount of packet delay for the legitimate receiver when either receiver performs successive decoding. We also formulate an optimization problem, wherein the throughput of the eavesdropper is maximized under delay and secrecy rate constraints at the legitimate receiver. We provide numerical results for the optimization problem, where we show the trade-off between the transmission power for the jamming and the throughput of the non-legitimate receiver. The results provide insights into how channel ordering and encoding differences can be exploited to improve performance under different interference conditions.
  •  
3.
  • Arvanitaki, Antonia, 1991-, et al. (författare)
  • Secrecy in Congestion-Aware Broadcast Channels
  • 2021
  • Ingår i: Proc. Wireless Days Conference (WD) 2021. - : Institute of Electrical and Electronics Engineers (IEEE). - 9781665425599 - 9781665425605
  • Konferensbidrag (refereegranskat)abstract
    • Congestion-aware scheduling in the case of traditional downlink cellular communication has neglected the heterogeneity in terms of secrecy among different clients. In this paper, we study a two-user congestion-aware broadcast channel with heterogeneous traffic and different security requirements. The traffic with security requirements is intended for a legitimate user and it has bursty nature. The incoming packets are stored in a queue at the source. Furthermore, there is a second traffic flow intended for another user, it is delay tolerant and does not have secrecy constraints. The receiver which needs to be served with confidential data has full-duplex capabilities, and it can send a jamming signal to hinder eavesdropping of its data at the other user. We consider two randomized policies for selecting which packets to transmit, one is congestion-aware by taking into consideration the queue size, whereas the other one is non-congestion-aware. We analyse the throughput and the delay performance under two decoding schemes at the receivers and provide insights into their relative security performance and into how congestion control at the queue holding confidential information can help decrease the average delay per packet. We show that the two policies have the same secrecy performance for large random access probabilities. The derived results also take account of the self-interference caused at the receiver for whom confidential data is intended due to its full-duplex operation while jamming the communication at the other user.
  •  
4.
  • Avgouleas, Ioannis, 1983-, et al. (författare)
  • A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints
  • 2024
  • Ingår i: <em>Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon</em>. - : IEEE. - 9798350369533
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we analyze the performance of a wireless caching system with heterogeneous traffic and relaying capabilities satisfying secrecy constraints for one of two receiving users. In this setup, the second user has no secrecy requirements and receives cacheable content either from the relay helper or the core network through a wireless base station. The wireless relay helper can assist both users since it is equipped with finite storage that is split into cacheable and non-cacheable storage. Concurrently, a passive eavesdropper tries to overhear transmissions to the user with secrecy requirements. Consequently, we examine how this relay’s storage split and the eavesdropper affect the performance of the average throughput and delay of the system as the transmission powers, the relay’s transmission probability, and the relay’s cache size vary. © 2023 IEEE.
  •  
5.
  • Avgouleas, Ioannis, 1983- (författare)
  • IoT Networking Resource Allocation and Cooperation
  • 2017
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The Internet of Things (IoT) promises that "anything that can be connected, will be connected". It comprises of Information and Communication Technologies that interconnect billions of physical and visual things with some "basic" intelligence. The emerging IoT services will be able to react with minimal human intervention and further contribute to the big data era that requires real-time, ultrareliable, ubiquitous, scalable, and heterogeneous operation.This thesis is the result of our investigations on problems dealing with the evolution of such technologies. First, we explore the potential of using relay i.e., intermediate, nodes that assist users to transmit their packets in a a cellular network. Paper I provides insights into how adapting the cooperation of the relay's receiver and transmitter optimizes the network-wide throughput while the relay's queue stability is guaranteed.The next part of the thesis copes with the resource allocation of services on IoT devices equipped with multiple network interfaces. The resources are heterogeneous and can be split among dierent interfaces. Additionally, they are not interchangeable. In paper II, we develop optimization models for this resource allocation problem, prove the complexity of the models, and derive results that give intuition into the problems. Moreover, we propose algorithms that approximate the optimal solution and show under which circumstances this is possible.Finally, in paper III, we present a resource allocation problem specically for smart cities services. In comparison to the previous problem denition, resources are of one type but the IoT network device can oer capacities that vary over time. Furthermore, services have a tolerance regarding their preferred scheduling, namely, their allocation over time. We parametrize each service with a pricing function to indicate its tolerance to be served at the beginning of the scheduling window. We prove that the problem is computationally hard and provide numerical results to gain insight into how different pricing weight functions impact the allocations' distribution within the scheduling window.
  •  
6.
  • Avgouleas, Ioannis M., 1983- (författare)
  • Cooperation and Resource Allocation in Wireless Networking towards the IoT
  • 2019
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The Internet of Things (IoT) should be able to react with minimal human intervention and contribute to the Artificial Intelligence (AI) era requiring real-time and scalable operation under heterogeneous network infrastructures. This thesis investigates how cooperation and allocation of resources can contribute to the evolution of future wireless networks supporting the IoT.First, we examine how to allocate resources to IoT services which run on devices equipped with multiple network interfaces. The resources are heterogeneous and not interchangeable, and their allocation to a service can be split among different interfaces. We formulate an optimization model for this allocation problem, prove its complexity, and derive two heuristic algorithms to approximate the solution in large instances of the problem.The concept of virtualization is promising towards addressing the heterogeneity of IoT resources by providing an abstraction layer between software and hardware. Network function virtualization (NFV) decouples traditional network operations such a routing from proprietary hardware platforms and implements them as software entities known as virtualized network functions (VNFs). In the second paper, we study how VNF demands can be allocated to Virtual Machines (VMs) by considering the completion-time tolerance of the VNFs. We prove that the problem is NP-complete and devise a subgradient optimization algorithm to provide near-optimal solutions. Our numerical results demonstrate the effectiveness of our algorithm compared to two benchmark algorithms.Furthermore, we explore the potential of using intermediate nodes, the so-called relays, in IoT networks. In the third paper, we study a multi-user random-access network with a relay node assisting users in transmitting their packets to a destination node. We provide analytical expressions for the performance of the relay's queue and the system throughput. We optimize the relay’s operation parameters to maximize the network-wide throughput while maintaining the relay's queue stability. A stable queue at relay guarantees finite delay for the packets. Furthermore, we study the effect of the wireless links' signal-to-interference-plusnoise ratio (SINR) threshold and the self-interference (SI) cancellation on the per-user and network-wide throughput.Additionally, caching at the network edge has recently emerged as an encouraging solution to offload cellular traffic and improve several performance metrics of the network such as throughput, delay and energy efficiency. In the fourth paper, we study a wireless network that serves two types of traffic: cacheable and non-cacheable traffic. In the considered system, a wireless user with cache storage requests cacheable content from a data center connected with a wireless base station. The user can be assisted by a pair of wireless helpers that exchange non-cacheable content as well. We devise the system throughput and the delay experienced by the user and provide numerical results that demonstrate how they are affected by the non-cacheable packet arrivals, the availability of caching helpers, the parameters of the caches, and the request rate of the user.Finally, in the last paper, we consider a time-slotted wireless system that serves both cacheable and non-cacheable traffic with the assistance of a relay node. The latter has storage capabilities to serve both types of traffic. We investigate how allocating the storage capacity to cacheable and non-cacheable traffic affects the system throughput. Our numerical results provide useful insights into the system throughput e.g., that it is not necessarily beneficial to increase the storage capacity for the non-cacheable traffic to realize better throughput at the non-cacheable destination node.
  •  
7.
  • Avgouleas, Ioannis, 1983-, et al. (författare)
  • Scheduling Services on an IoT Device Under Time-Weighted Pricing
  • 2017
  • Ingår i: Conference Proceedings IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). - : IEEE conference proceedings. - 9781538635292 - 9781538635315 - 9781538635308 - 9781538635322 ; , s. 1-5
  • Konferensbidrag (refereegranskat)abstract
    • The emerging vision of smart cities necessitates the use of Internet of Things (IoT) network devices to implement sustainable solutions that will improve the operations of urban areas. A massive amount of smart cities services may demand allocation of computational resources, such as processing power or storage, that IoT devices offer. Within this context, we present an IoT network device comprising interfaces with one specific computational resource available. The efficient utilization of available IoT resources would improve the Quality of Service (QoS) of the IoT network that serves the smart city. All resource allocations must be completed within a given scheduling window and every service is parametrized by a pricing weight function to indicate its tolerance to be served at the beginning of the scheduling window. We propose a mathematical optimization formulation to minimize the total cost of allocating all demands within the scheduling window considering the tolerance level of each service at the same time. Moreover, we prove that the problem is computationally hard and we provide numerical results to gain insight into the impact of different pricing weight functions on the allocations’ distribution within the scheduling window.
  •  
8.
  • Avgouleas, Ioannis, 1983-, et al. (författare)
  • Virtual Network Functions Scheduling under Delay-Weighted Pricing
  • 2019
  • Ingår i: IEEE Networking Letters. - : IEEE. - 2576-3156. ; 1:4, s. 160-163
  • Tidskriftsartikel (refereegranskat)abstract
    • We consider a cost minimization problem for High Volume Servers (HVS) equipped with Virtual Machines (VMs) to serve Virtual Network Functions (VNF) demands for resources. Given a scheduling period, a central scheduler decides which VM to use for each VNF demand. Each VM can be activated or disabled with different costs. Each VNF has a delay-weighted pricing function to indicate its completion time tolerance. We prove the NP-completeness of the problem and develop an algorithm based on Lagrangian relaxation and subgradient optimization to deal with this computational complexity. Finally, our numerical results demonstrate our algorithm’s effectiveness compared to two benchmarks.
  •  
9.
  • Chen, Bolin, et al. (författare)
  • Modeling and Analysis of MPTCP Proxy-based LTE-WLAN Path Aggregation
  • 2017
  • Ingår i: 2017 IEEE Global Communications Conference (GLOBECOM), Proceedings Singapore 4 – 8 December 2017. - : IEEE Communications Society. - 9781509050192 - 9781509050208 ; , s. 1-7
  • Konferensbidrag (refereegranskat)abstract
    • Long Term Evolution (LTE)-Wireless Local Area Network (WLAN) Path Aggregation (LWPA) based on Multi- path Transmission Control Protocol (MPTCP) has been under standardization procedure as a promising and cost-efficient solution to boost Downlink (DL) data rate and handle the rapidly increasing data traffic. This paper aims at providing tractable analysis for the DL performance evaluation of large-scale LWPA networks with the help of tools from stochastic geometry. We consider a simple yet practical model to determine under which conditions a native WLAN Access Point (AP) will work under LWPA mode to help increasing the received data rate. Using stochastic spatial models for the distribution of WLAN APs and LTE Base Stations (BSs), we analyze the density of active LWPA- mode WiFi APs in the considered network model, which further leads to closed-form expressions on the DL data rate and area spectral efficiency (ASE) improvement. Our numerical results illustrate the impact of different network parameters on the performance of LWPA networks, which can be useful for further performance optimization. 
  •  
10.
  • Chen, Zheng, 1990-, et al. (författare)
  • Optimizing Information Freshness in a Multiple Access Channel With Heterogeneous Devices
  • 2021
  • Ingår i: IEEE Open Journal of the Communications Society. - : IEEE. - 2644-125X. ; 2, s. 456-470
  • Tidskriftsartikel (refereegranskat)abstract
    • In this work, we study age-optimal scheduling with stability constraints in a multiple access channel with two heterogeneous source nodes transmitting to a common destination. The first node is connected to a power grid and it has randomly arriving data packets. Another energy harvesting (EH) sensor monitors a stochastic process and sends status updates to the destination. We formulate an optimization problem that aims at minimizing the average age of information (AoI) of the EH node subject to the queue stability condition of the grid-connected node. First, we consider a Probabilistic Random Access (PRA) policy where both nodes make independent transmission decisions based on some fixed probability distributions. We show that with this policy, the average AoI is equal to the average peak AoI, if the EH node only sends freshly generated samples. In addition, we derive the optimal solution in closed form, which reveals some interesting properties of the considered system. Furthermore, we consider a Drift-Plus-Penalty (DPP) policy and develop AoI-optimal and peak-AoI-optimal scheduling algorithms using the Lyapunov optimization theory. Simulation results show that the DPP policy outperforms the PRA policy in various scenarios, especially when the destination node has low multi-packet reception capabilities.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 37
Typ av publikation
tidskriftsartikel (14)
konferensbidrag (12)
licentiatavhandling (5)
doktorsavhandling (4)
samlingsverk (redaktörskap) (1)
bokkapitel (1)
visa fler...
visa färre...
Typ av innehåll
refereegranskat (26)
övrigt vetenskapligt/konstnärligt (11)
Författare/redaktör
Pappas, Nikolaos, 19 ... (30)
Yuan, Di, 1970- (8)
Angelakis, Vangelis, ... (6)
Mohapatra, Parthajit (5)
Angelakis, Vangelis, ... (5)
Pappas, Nikolaos, As ... (5)
visa fler...
Fountoulakis, Emmano ... (5)
Avgouleas, Ioannis, ... (4)
Ephremides, Anthony, ... (3)
Kosta, Antzela, 1990 ... (3)
Carlsson, Niklas, 19 ... (2)
Kountouris, Marios (2)
Arvanitaki, Antonia, ... (2)
Fischione, Carlo, Pr ... (2)
Chen, Zheng, 1990- (2)
Liao, Qi, PhD (2)
Zhang, Jie (1)
Björnson, Emil, Prof ... (1)
Dhillon, Harpreet S. (1)
Li, Yuan (1)
Yuan, Di (1)
Abd-Elmagig, Mohamed ... (1)
Zhou, Bo (1)
Saad, Walid (1)
Pioro, Michal (1)
Gurtov, Andrei, 1979 ... (1)
Popovski, Petar (1)
Traganitis, Apostolo ... (1)
Ephremides, Anthony (1)
Dimitriou, Ioannis (1)
Avgouleas, Ioannis M ... (1)
Larsson, Erik G, 197 ... (1)
Soret, Beatriz (1)
Quek, Tony Q. S. (1)
Chen, Zheng (1)
DaSilva, Luiz A. (1)
Charalambous, Themis ... (1)
Chen, Bolin (1)
Zhou, Sheng (1)
Huang, Kaibin (1)
Lee, Jemin (1)
Fodor, Viktoria, Pro ... (1)
Liao, Qi (1)
Durisi, Giuseppe, Pr ... (1)
Angelakis, Vangelis, ... (1)
Shroff, Ness B., Pro ... (1)
Paschos, Georgios S. (1)
Kosta, Antzela (1)
Angelakis, Vangelis, ... (1)
Pappas, Nikolaos, Ph ... (1)
visa färre...
Lärosäte
Linköpings universitet (37)
Språk
Engelska (37)
Forskningsämne (UKÄ/SCB)
Teknik (35)
Naturvetenskap (4)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy