- arXiv.org
- Applied Physics
- Biological Physics
- History and Philosophy of Physics
- Fluid Dynamics
- Optics
- Data Analysis, Statistics and Probability
- General Physics
- Physics and Society
- Popular Physics
- Medical Physics
- Atomic and Molecular Clusters
- Plasma Physics
- Atomic Physics
- Space Physics
- Instrumentation and Detectors
- Computational Physics
- Geophysics
- Chemical Physics
- Classical Physics
- Accelerator Physics
- Physics Education
- Atmospheric and Oceanic Physics

- History and Overview
- Number Theory
- Information Theory
- Analysis of PDEs
- Statistics Theory
- General Mathematics
- Combinatorics
- Representation Theory
- Probability
- Complex Variables
- Mathematical Physics
- Algebraic Geometry
- Group Theory
- Symplectic Geometry
- Operator Algebras
- Differential Geometry
- Dynamical Systems
- Numerical Analysis
- Optimization and Control
- General Topology
- Logic
- Geometric Topology
- Quantum Algebra
- Metric Geometry
- Spectral Theory
- Algebraic Topology
- Classical Analysis and ODEs
- Category Theory
- K-Theory and Homology
- Rings and Algebras
- Commutative Algebra
- Functional Analysis

- General Literature
- Information Theory
- Neural and Evolutionary Computing
- Other Computer Science
- Hardware Architecture
- Symbolic Computation
- Operating Systems
- Computer Vision and Pattern Recognition
- Learning
- Databases
- Information Retrieval
- Social and Information Networks
- Programming Languages
- Multiagent Systems
- Software Engineering
- Sound
- Formal Languages and Automata Theory
- Artificial Intelligence
- Cryptography and Security
- Computer Science and Game Theory
- Numerical Analysis
- Distributed, Parallel, and Cluster Computing
- Systems and Control
- Human-Computer Interaction
- Discrete Mathematics
- Computational Complexity
- Computation and Language
- Logic in Computer Science
- Performance
- Computers and Society
- Data Structures and Algorithms
- Networking and Internet Architecture
- Graphics
- Multimedia
- Computational Geometry
- Robotics
- Computational Engineering, Finance, and Science
- Digital Libraries
- Emerging Technologies
- Mathematical Software

- Apr 20 2018 cs.NI arXiv:1804.07233v1Autonomous vehicles can construct a more accurate perception of their surrounding environment by exchanging rich sensor data with nearby vehicles. Such exchange can require larger bandwidths than currently provided by ITS-G5/DSRC and Cellular V2X. Millimeter wave (mmWave) communications can provide higher bandwidth and could complement current V2X standards. Recent studies have started investigating the potential of IEEE 802.11ad to support high bandwidth vehicular communications. This paper introduces the first performance evaluation of the IEEE 802.11ad MAC (Medium Access Control) and beamforming mechanism for mmWave V2V communications. The study highlights existing opportunities and shortcomings that should guide the development of mmWave communications for V2V communications.
- Apr 20 2018 cs.NI arXiv:1804.07204v1Public safety networks avail to disseminate information during emergency situations through its dedicated servers. Public safety networks accommodate public safety communication (PSC) applications to track the location of its utilizers and enable to sustain transmissions even in the crucial scenarios. Despite that, if the traditional setups responsible for PSCs are unavailable, it becomes prodigiously arduous to handle any of the safety applications, which may cause havoc in the society. Dependence on a secondary network may assist to solve such an issue. But, the secondary networks should be facilely deployable and must not cause exorbitant overheads in terms of cost and operation. For this, LoRaWAN can be considered as an ideal solution as it provides low power and long-range communication. However, an excessive utilization of the secondary network may result in high depletion of its own resources and can lead to a complete shutdown of services, which is a quandary at hand. As a solution, this paper proposes a novel network model via a combination of LoRaWAN and traditional public safety networks, and uses a self-enforcing agreement based game theory for allocating resources efficiently amongst the available servers. The proposed approach adopts memory and energy constraints as agreements, which are satisfied through Nash equilibrium. The numerical results show that the proposed approach is capable of efficiently allocating the resources with sufficiently high gains for resource conservation, network sustainability, resource restorations and probability to continue at the present conditions even in the complete absence of traditional Access Points (APs) compared with a baseline scenario with no failure of nodes.
- Apr 20 2018 cs.NI arXiv:1804.07190v1This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal scheme can save as much as 10.3% of bandwidth use, and as much as 44% storage use with respect to the closest suboptimal approach.
- Apr 20 2018 cs.NI arXiv:1804.07106v1Dense deployments of Small Cells are required to deliver the capacity promised by 5G networks. In this paper we present SWAM, a system that builds on commodity Wi-Fi routers with multiple wireless interfaces to provide a wireless access infrastructure supporting multi-tenancy, mobility, and integrated wireless access and backhaul. An infrastructure provider can deploy inexpensive SWAM nodes to cover a given geographical area, and re-sell this capacity to provide on-demand connectivity for Mobile Network Operators. Our main contribution is the design of the SWAM datapath and control plane, which are inspired by the overlay techniques used to enable multi-tenancy in data-center networks. We prototype SWAM in an office wireless testbed, and validate experimentally its functionality.
- Qiao Zhang, Danyang Zhuo, Vincent Liu, Petr Lapukhov, Simon Peter, Arvind Krishnamurthy, Thomas AndersonApr 20 2018 cs.NI arXiv:1804.06945v1A perennial question in computer networks is where to place functionality among components of a distributed computer system. In data centers, one option is to move all intelligence to the edge, essentially relegating switches and middleboxes, regardless of their programmability, to simple static routing policies. Another is to add more intelligence to the middle of the network in the hopes that it can handle any issue that arises. This paper presents an architecture, called Volur, that provides a third option by facilitating the co-existence of an intelligent network with an intelligent edge. The key architectural principle of Volur is predictability of the network. We describe the key design requirements, and show through case studies how our approach facilitates more democratic innovation of all parts of the network. We also demonstrate the practicality of our architecture by describing how to implement the architecture on top of existing hardware and by deploying a prototype on top of a large production data center.

Formal Black-Box Analysis of Routing Protocol Implementations

Martin Henessey Oct 03 2017 01:40 UTCKeshtidar Dec 13 2016 11:54 UTC

Hi, How can i get it??

Aram Harrow Mar 19 2013 02:59 UTC

...(continued)The original quantum Pagerank paper used adiabatic evolution, and this one uses the Szegedy walk. I wonder how the methods compare.

Another thing I'd like someone to figure out at some point is whether these can be done using resources scaling like poly log(# vertices) for power law graphs. T

- Supported by Silverpond.