Search For:

Displaying 1-46 out of 46 total
A Class of Non-statistical Traffic Anomaly Detection in Complex Network Systems
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Wenlin Han,Wei Xiong,Yang Xiao,Magdy Ellabidy,Athanasios V. Vasilakos,Naixue Xiong
Issue Date:June 2012
pp. 640-646
Recently Network traffic anomaly detection has become a popular research tendency, as it can detect new attack types in real time. The real-time network traffic anomaly detection is still an unsolved problem of network security. The network traffic appears...
 
Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor Networks
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Wenzhong Guo,Jong Hyuk Park,Laurence T. Yang,Athanasios V. Vasilakos,Naixue Xiong,Guolong Chen
Issue Date:December 2011
pp. 360-367
Topology control is one of the most fundamental problems in wireless sensor networks (WSNs). It is of great importance for prolonging network lifetime, reducing radio interference and energy consumption, increasing the efficiency of media access control (M...
 
Computation of an Equilibrium in Spectrum Markets for Cognitive Radio Networks
Found in: IEEE Transactions on Computers
By Sang-Seon Byun,Ilangko Balashingham,Athanasios V. Vasilakos, Heung-No Lee
Issue Date:February 2014
pp. 304-316
In this paper, we investigate a market equilibrium in multichannel sharing cognitive radio networks (CRNs): it is assumed that every subchannel is orthogonally licensed to a single primary user (PU), and can be shared with multiple secondary users (SUs). W...
 
A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization
Found in: IEEE Transactions on Services Computing
By Yuezhi Zhou,Yaoxue Zhang,Hao Liu,Naixue Xiong,Athanasios V. Vasilakos
Issue Date:January 2014
pp. 40-53
Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, ...
 
EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks
Found in: 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS)
By Yanjun Yao, Qing Cao,Athanasios V. Vasilakos
Issue Date:October 2013
pp. 182-190
In many wireless sensor network (WSN) applications, a subset of nodes (source nodes) are selected to sense the environment, generate data, and transmit them back to the sink over multiple hops. Many previous research efforts have tried to achieve trade-off...
 
MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By M. Reza Rahimi,Nalini Venkatasubramanian,Athanasios V. Vasilakos
Issue Date:June 2013
pp. 75-82
This paper exploits the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. User Mobility introduces new complexities in enabling an optimal decomposit...
 
Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Yang Xiao,Miao Peng,John Gibson,Geoffrey G. Xie,Ding-Zhu Du,Athanasios V. Vasilakos
Issue Date:October 2012
pp. 1538-1554
This paper investigates the fundamental performance limits of medium access control (MAC) protocols for particular multihop, RF-based wireless sensor networks and underwater sensor networks. A key aspect of this study is the modeling of a fair-access crite...
 
On Studying Relationship between Altruism and the Psychological Phenomenon of Self-Deception in Rational and Autonomous Networks
Found in: 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)
By Yufeng Wang,Athanasios V. Vasilakos,Qun Jin,Jianhua Ma
Issue Date:June 2012
pp. 336-341
In open networking environments, resources, services, strategies and actions are voluntarily provided, maintained, chosen and determined by independent, rational and autonomous peers. Basically, Game theory is a basic tool for modeling choices by rational ...
 
Message from UbiSafe Symposium Chairs
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Athanasios V. Vasilakos,Webin Jiang,Gregorio Martinez,Ryan K.L. Ko
Issue Date:June 2012
pp. xxxvi
No summary available.
   
A Self-tuning Failure Detection Scheme for Cloud Computing Service
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Naixue Xiong,Athanasios V. Vasilakos,Jie Wu,Y. Richard Yang,Andy Rindos,Yuezhi Zhou,Wen-Zhan Song,Yi Pan
Issue Date:May 2012
pp. 668-679
Cloud computing is an increasingly important solution for providing services deployed in dynamically scalable cloud networks. Services in the cloud computing networks may be virtualized with specific servers which host abstracted details. Some of the serve...
 
Study on the Effect of Utility Uncertainty on Behavior Diffusion in Autonomous and Rational Networks
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Yufeng Wang,Athanasios V. Vasilakos,Jianhua Ma
Issue Date:October 2011
pp. 188-194
For behavior diffusion in autonomous and rational networks, most understanding comes from models and ideas borrowed from epidemiology on empirical or synthetic biological networks. However, in rational and autonomous networks, agents make strategic choice ...
 
Approximating Congestion + Dilation in Networks via
Found in: IEEE Transactions on Computers
By Costas Busch,Rajgopal Kannan,Athanasios V. Vasilakos
Issue Date:September 2012
pp. 1270-1283
A classic optimization problem in network routing is to minimize C+D, where C is the maximum edge congestion and D is the maximum path length (also known as dilation). The problem of computing the optimal C^{\ast}+D^{\ast} is NP-complete even when either C...
 
Resource and Revenue Sharing with Coalition Formation of Cloud Providers: Game Theoretic Approach
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Dusit Niyato, Athanasios V. Vasilakos, Zhu Kun
Issue Date:May 2011
pp. 215-224
In cloud computing, multiple cloud providers can cooperate to establish a resource pool to support internal users and to offer services to public cloud users. In this paper, we study the cooperative behavior of multiple cloud providers. The hierarchical co...
 
Petri Net Modeling of the Reconfigurable Protocol Stack for Cloud Computing Control Systems
Found in: Cloud Computing Technology and Science, IEEE International Conference on
By Hui Chen, Chunjie Zhou, Yuanqing Qin, Art Vandenberg, Athanasios V. Vasilakos, Naixue Xiong
Issue Date:December 2010
pp. 393-400
The Industrial Ethernet is promising for the implementation of a Cloud Computing based control system. However, numerous standard organizations and vendors have developed various Industrial Ethernets to satisfy the real-time requirements of field devices. ...
 
SecCloud: Bridging Secure Storage and Computation in Cloud
Found in: Distributed Computing Systems Workshops, International Conference on
By Lifei Wei, Haojin Zhu, Zhenfu Cao, Weiwei Jia, Athanasios V. Vasilakos
Issue Date:June 2010
pp. 52-61
Cloud computing becomes a hot research topic in the recent years. In the cloud computing, software applications and databases are moved to the centralized large data centers, which is called cloud. In the cloud, due to lack of physical possession of the da...
 
A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Naixue Xiong, Xiaohua Jia, Laurence T. Yang, Athanasios V. Vasilakos, Yingshu Li, Yi Pan
Issue Date:September 2010
pp. 1254-1266
This paper proposes a novel and efficient distributed flow control scheme for multirate multicast (MR-M), based on the well-known Proportional Integral and Derivative (PID) controllers. The PID controller at each router computes its expected incoming rate ...
 
Automated Design of Logic Circuits with a Increasable Evolution Approach
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Guoliang He, Naixue Xiong, Athanasios V. Vasilakos, Yuanxiang Li, Zhongzhi Shi
Issue Date:June 2009
pp. 206-213
Since the scalability of logic circuits is becoming larger and more complex, the auto-design is becoming more and more difficult. In order to improve automatic design and performance evaluation of logic circuits in efficiency and capability of optimization...
 
Design and analysis of an active predictive algorithm in wireless multicast networks
Found in: Parallel and Distributed Processing Symposium, International
By Naixue Xiong,Laurence T. Yang, Yi Pan,Athanasios V. Vasilakos,Jing He
Issue Date:May 2009
pp. 1-8
With the ever-increasing wireless multicast data applications recently, considerable efforts have focused on the large scale heterogeneous wireless multicast, especially those with large propagation delays, which means the feedbacks arriving at the source ...
 
Maya-Pyramid: A Scalable and Self-Organizing Unstructured P2P Overlay
Found in: Web Intelligence and Intelligent Agent Technology, International Conference on
By Deng Li, Zhigang Chen, Hui Liu, Athanasios V. Vasilakos
Issue Date:November 2007
pp. 411-414
Locating content in an efficient and scalable way without centralized control is one of the challenges within P2P computing. The paper presents an unstructured P2P overlay called Maya pyramid overlay (MPO) where update and backup only take place in two nei...
 
Leaky Bucket Mechanism with Learning Algorithm for ATM Traffic Policing
Found in: Computers and Communications, IEEE Symposium on
By Antonios F. Atlasis, Georgios I. Stassinopoulos, Athanasios V. Vasilakos
Issue Date:July 1997
pp. 68
The traffic policing in ATM networks is one of the most critical preventive congestion control mechanisms. It intends to ensure that each source conforms to its traffic parameters negotiated during the Call Admission Control phase. In this paper, we enhanc...
 
Scheduling Parallel Cloud Computing Services: An Evolutional Game
Found in: Information Science and Engineering, International Conference on
By Guiyi Wei, Athanasios V. Vasilakos, Naixue Xiong
Issue Date:December 2009
pp. 376-379
Cloud computing is a natural evolution for data and compute centers with automated systems management, workload balancing, and virtualization technologies. Cloud-based services integrate globally distributed resources into seamless computing platforms. In ...
 
CDC: Compressive Data Collection for Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiao-Yang Liu,Yanmin Zhu,Linghe Kong,Cong Liu,Yu Gu,Athanasios V. Vasilakos,Min-You Wu
Issue Date:August 2014
pp. 1
Data collection is a crucial operation in wireless sensor networks. The design of data collection schemes is challenging due to the limited energy supply and the hot spot problem. Leveraging empirical observations that sensory data possess strong spatiotem...
 
Physarum Optimization: A Biology-inspired Algorithm for the Steiner Tree Problem in Networks
Found in: IEEE Transactions on Computers
By Liang Liu,Yuning Song,Haiyang Zhang,Huadong Ma,Athanasios V. Vasilakos
Issue Date:December 2013
pp. 1
Using insights from biological processes could help to design new optimization techniques for long-standing computational problems. This paper exploits a cellular computing model in the slime mold physarum polycephalum to solve the Steiner tree problem whi...
 
MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Found in: 2012 IEEE 5th International Conference on Utility and Cloud Computing (UCC)
By M. Reza Rahimi,Nalini Venkatasubramanian,Sharad Mehrotra,Athanasios V. Vasilakos
Issue Date:November 2012
pp. 83-90
The rise in popularity of mobile applications creates a growing demand to deliver richer functionality to users executing on mobile devices with limited resources. The availability of cloud computing platforms has made available unlimited and scalable reso...
   
Toward preserving privacy and functionality in geosocial networks
Found in: Proceedings of the 19th annual international conference on Mobile computing & networking (MobiCom '13)
By Athanasios V. Vasilakos, Bogdan Carbunar, Jaime Ballesteros, Mahmudur Rahman, Naphtali Rishe
Issue Date:September 2013
pp. 207-210
In this paper, we consider an environment in which computational offoading is adopted amongst mobile devices. We call such an environment a mobile device cloud (MDC). In this work, we highlight via emulation, experimenation and real measurements, the poten...
     
A RF4CE-based remote controller with interactive graphical user interface applied to home automation system
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Athanasios V. Vasilakos, Chin-Feng Lai, Jong Hyuk Park, Meikang Qiu, Min Chen
Issue Date:February 2013
pp. 1-19
With the increase in commercial electronic equipment and its complicated control interfaces, how to design an effective and user-friendly control interface has become a topic for many researchers. This research introduces two-directional communication of a...
     
Heterogeneity playing key role: Modeling and analyzing the dynamics of incentive mechanisms in autonomous networks
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Akihiro Nakao, Athanasios V. Vasilakos, Yufeng Wang
Issue Date:September 2012
pp. 1-25
Heterogeneities (heterogeneous characteristics) are intrinsic in dynamic and autonomous networks, and may be caused by the following factors: finite nodes, structured network graph, mutation of node's strategy and topological view, and dynamic linking, and...
     
Physarum optimization: a new heuristic algorithm to minimal exposure problem
Found in: Proceedings of the 18th annual international conference on Mobile computing and networking (Mobicom '12)
By Athanasios V. Vasilakos, Huadong Ma, Liang Liu, Yuning Song
Issue Date:August 2012
pp. 419-422
Nature is an invaluable source of inspiration for long-standing computational problems. Genetic algorithms and ant colony optimization are the well-known successes. Drawing the inspirations from these successful experience, we exploit the computing model i...
     
Predicting location using mobile phone calls
Found in: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication (SIGCOMM '12)
By Athanasios V. Vasilakos, Daqiang Zhang, Haoyi Xiong
Issue Date:August 2012
pp. 295-296
Location prediction using mobile phone traces has attracted increasing attention. Owing to the irregular user mobility patterns, it still remains challenging to predict user location. Our empirical study in this paper shows that the call patterns are stron...
     
On modeling of coevolution of strategies and structure in autonomous overlay networks
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Akihiro Nakao, Athanasios V. Vasilakos, Yufeng Wang
Issue Date:July 2012
pp. 1-23
Currently, on one hand, there exist much work about network formation and/or growth models, and on the other hand, cooperative strategy evolutions are extensively investigated in biological, economic, and social systems. Generally, overlay networks are het...
     
Time-varying channel estimation for OFDM with extended observation window
Found in: Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications (VANET '12)
By Athanasios V. Vasilakos, Dan Shan, Paul Richardson, Weidong Xiang
Issue Date:June 2012
pp. 93-98
Orthogonal Frequency-Division Multiplexing (OFDM) systems operating in high mobility environments experience time-varying channel, which leads to serious inter-carrier-interferences. Basis Expansion Model (BEM) is a widely used technique to estimate the ti...
     
Modeling and simulation of joint time-frequency properties of spectrum usage in cognitive radio
Found in: Proceedings of the 4th International Conference on Cognitive Radio and Advanced Spectrum Management (CogART '11)
By Athanasios V. Vasilakos, David Lopez-Perez, Fernando Casadevall, Miguel Lopez-Benitez
Issue Date:October 2011
pp. 1-5
The development of the Dynamic Spectrum Access/Cognitive Radio (DSA/CR) technology can significantly benefit from the availability of realistic models able to accurately capture and reproduce the statistical properties of spectrum usage in real wireless co...
     
Minimising cell transmit power: towards self-organized resource allocation in OFDMA femtocells
Found in: Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM (SIGCOMM '11)
By Athanasios V. Vasilakos, David Lopez-Perez, Holger Claussen, Xiaoli Chu
Issue Date:August 2011
pp. 410-411
With the introduction of femtocells, cellular networks are moving from the conventional centralised architecture to a distributed one, where each network cell should make its own radio resource management decisions, while providing inter-cell interference ...
     
Albatross sampling: robust and effective hybrid vertex sampling for social graphs
Found in: Proceedings of the 3rd ACM international workshop on MobiArch (HotPlanet '11)
By Athanasios V. Vasilakos, Beixing Deng, Cong Ding, Long Jin, Pan Hui, Tianyi Wang, Xing Li, Yang Chen
Issue Date:June 2011
pp. 11-16
Nowadays, Online Social Networks (OSNs) have become dramatically popular and the study of social graphs attracts the interests of a large number of researchers. One critical challenge is the huge size of the social graph, which makes the graph analyzing or...
     
A market-clearing model for spectrum trade in cognitive radio networks
Found in: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '11)
By Athanasios V. Vasilakos, Ilangko Balasingham, Sang-Seon Byun
Issue Date:May 2011
pp. 1-9
We model cognitive radio networks (CRNs) as a spectrum market where every primary user (PU) offer her subchannels with certain interference bound indicating the interference limit the PU can tolerate, and secondary users (SUs) purchase the right to access ...
     
Managing resources for healthcare service calls in a cellular network with relays and machine-type communication nodes
Found in: Proceedings of the First ACM MobiHoc Workshop on Pervasive Wireless Healthcare (MobileHealth '11)
By Athanasios V. Vasilakos, Ki-Dong Lee
Issue Date:May 2011
pp. 1-8
With the rapid growth of elderly population, u-healthcare service combined with advanced wireless networking technology is gaining popularity. The advance in medical sensor technology has boasted up the u-healthcare market potential. However, the global co...
     
Backpressure-based routing protocol for DTNs
Found in: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM (SIGCOMM '10)
By Amit Dvir, Athanasios V. Vasilakos
Issue Date:August 2010
pp. 112-ff
In this paper we consider an alternative, highly agile In this paper we consider an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN), in which routing and forwarding decisions are made on a per-packet basis. ...
     
Security-aware multimedia scheduling over heterogeneous wireless networks
Found in: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference (IWCMC '10)
By Athanasios V. Vasilakos, Baoyu Zheng, Jingwu Cui, Joel Rodrigues, Liang Zhou, Sulan Tang
Issue Date:June 2010
pp. 1156-1160
Security is increasingly becoming an important issue in the design of multimedia applications. However, existing scheduling schemes for real-time multimedia services over heterogeneous networks generally do not take into account security requirements when ...
     
An autonomic framework for reliable multicast: A game theoretical approach based on social psychology
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Athanasios V. Vasilakos, Markos P. Anastasopoulos, Panayotis G. Cottis
Issue Date:November 2009
pp. 1-23
A major challenge in wireless terrestrial networks is to provide large-scale reliable multicast and broadcast services. The main problem limiting the scalability of such networks is feedback implosion, a problem arising when a large number of users transmi...
     
Editorial to the special issue
Found in: ACM Transactions on Autonomous and Adaptive Systems (TAAS)
By Athanasios V. Vasilakos, Witold Pedrycz
Issue Date:November 2009
pp. 1-3
No summary available.
     
New simulation models for non-isotropic scattering mobile-to-mobile Rayleigh fading channels
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Athanasios V. Vasilakos, Cheng-Xiang Wang, David I. Laurenson, Sana Salous, Xiang Cheng
Issue Date:June 2009
pp. 5-6
To simulate mobile-to-mobile (M2M) Rayleigh fading channels under more realistic scenario of non-isotropic scattering, we propose one deterministic and one stochastic sum-of-sinusoids (SoS) based simulation models. The proposed models extensively consider ...
     
Collaborative beamforming and dirty paper coding assisted transmission strategy for e-health wireless sensor networks
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Athanasios V. Vasilakos, Feng Han, Pingyi Fan, Ying Chang
Issue Date:June 2009
pp. 5-6
Very recently, the advancements of these years in the realms of sensors, wireless communications, and pervasive computing have been proposed to facilitate the health-care service and/or disaster relief. As essential components of these tele-medical systems...
     
Centralized scheduling and channel assignment scheme in third generation router based WiMAX mesh network
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Athanasios V. Vasilakos, Jun Xiao, Naixue Xiong
Issue Date:June 2009
pp. 5-6
The IEEE 802.16 standard proposes two kinds of scheduling algorithms in WiMAX mesh networks, centralized and distributed algorithms. This paper mainly introduces a scheme working in a centralized mode. In this scheme, each node is equipped with a third gen...
     
A distributed call admission control scheme for satellite networks under rain fading
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Athanasios V. Vasilakos, Dionysia K. Petraki, Markos P. Anastasopoulos, Panayotis G. Cottis
Issue Date:June 2009
pp. 5-6
A novel distributed call admission control scheme for satellite networks operating at frequencies above 10 GHz is presented in this paper. The major factor impairing the performance of the satellite path at these frequencies is rain, a physical phenomenon ...
     
Vehicular communication: protocol design, testbed implementation and performance analysis
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Athanasios V. Vasilakos, Cheng-Xiang Wang, Chowdhury Sayeed Hyder, Shihabur Rahman Chowdhury, Sumaiya Iqbal
Issue Date:June 2009
pp. 5-6
Vehicular Communication Networks and Systems (VCNS) and Intelligent Transportation Systems (ITS) are one of the most attractive and challenging topics in recent days since a well efficient protocol for vehicular communication can facilitate the reduction o...
     
Application of computational intelligence techniques in active networks
Found in: Proceedings of the 2001 ACM symposium on Applied computing (SAC '01)
By Athanasios V. Vasilakos, Kostas G. Anagnostakis, Witold Pedrycz
Issue Date:March 2001
pp. 448-455
This paper describes the effects of program restructuring in a dataflow environment. Previous studies showed that dataflow programs can exhibit locality and that a memory hierarchy is feasible in a dataflow environment. This study shows that the order in w...
     
 1