摘要:
Spectrum access for Internet of things (IOT) applications including receiving information about expected use by a primary user of a spectrum band in a radio frequency spectrum. The spectrum band is classified into at least two working modes based on the expected use. The spectrum band is sensed to determine a current access pattern of the primary user. Based on the classifying and the sensing, one of the working modes is selected as a current working mode of the primary user. Transmissions are scheduled on the spectrum band using a current schedule that is responsive to the current working mode of the primary user. If the current working mode of the primary user changes, the sensing, selecting, scheduling, and determining whether the current working mode has changed are re-performed. Otherwise, the transmission scheduling and determining if the current working mode has changed are re-performed.
摘要:
Techniques for configuring a wireless network cloud system comprise the following steps. A density metric is estimated corresponding to at least one given coverage area of a wireless network cloud system. A configuration is determined for one or more network-access components in the given coverage area of the wireless network cloud system in response to the estimated density metric. The determined configuration may then be applied to the one or more network-access components. The density metric may correspond to a user density and/or a traffic density in the given coverage area.
摘要:
Techniques for configuring a wireless network cloud system comprise the following steps. A density metric is estimated corresponding to at least one given coverage area of a wireless network cloud system. A configuration is determined for one or more network-access components in the given coverage area of the wireless network cloud system in response to the estimated density metric. The determined configuration may then be applied to the one or more network-access components. The density metric may correspond to a user density and/or a traffic density in the given coverage area.
摘要:
Spectrum access for Internet of things (IOT) applications including receiving information about expected use by a primary user of a spectrum band in a radio frequency spectrum. The spectrum band is classified into at least two working modes based on the expected use. The spectrum band is sensed to determine a current access pattern of the primary user. Based on the classifying and the sensing, one of the working modes is selected as a current working mode of the primary user. Transmissions are scheduled on the spectrum band using a current schedule that is responsive to the current working mode of the primary user. If the current working mode of the primary user changes, the sensing, selecting, scheduling, and determining whether the current working mode has changed are re-performed. Otherwise, the transmission scheduling and determining if the current working mode has changed are re-performed.
摘要:
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input.
摘要:
A method of transmitting a query in a wireless network includes receiving a plurality of queries from a plurality of user equipments, aggregating the plurality of queries at a node of the network, the network including at least one of an access point of the network and an intermediate node of the network, and transmitting the aggregated plurality of queries to a query server.
摘要:
A system and method for adaptive remote decision making includes steps of: receiving from an application layer a target range for a level of reporting quality for processed data; setting data collection parameters to meet the target range; collecting the data from a plurality of remote data collecting devices deployed in the distributed computing system, a portion of said data being compromised during the collecting process; processing the collected data to produce the processed data; evaluating the processed data based on observable metrics of current collected data and reported data losses; forecasting an expected reporting quality while continuing to collect the data; comparing the expected reporting quality with the target range; and reporting the processed data when the expected reporting quality falls within the target range for the level of reporting quality.
摘要:
An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data.
摘要:
An aspect of this invention is a method that includes a computing apparatus estimating geographic locations as a function of time for each of a plurality of sensor nodes. The method further includes estimating a quality of information as a function of time for sensed data to be sensed by the plurality of sensor nodes at the estimated geographic locations; and sending the estimated quality of information as a function of time to one or more applications or consumers of the sensed data.
摘要:
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a second node of the wireless network. The second node provides a first input for the key establishment to the first node using communication encoded with the spreading code. Responsive to obtaining the first input from the second node, the first node provides a second input for the key establishment to the second node using communication encoded with the spreading code. Then, the first node and the second node establish the shared secret-key using the first input and the second input.