Learn More
From weather to networks, forecasting techniques constitute an interesting challenge: rather than giving a faithful description of the current reality, as a looking glass would do, researchers seek crystal-ball models to speculate on the future. This work is the first to explore the use of support vector machines (SVM) for the purpose of link load forecast.(More)
We present a novel methodology to accurately classify the traffic generated by P2P-TV applications, relying only on the count of packets they exchange with other peers during small time-windows. The rationale is that even a raw count of exchanged packets conveys a wealth of useful information concerning several implementation aspects of a P2P-TV application(More)
We propose a new methodology to estimate the spatial reuse of CSMA-like scheduling. Instead of focusing on spatial configurations of users, we model the interferences between users as a random graph. Using configuration models for random graphs, we show how the properties of the medium access mechanism are captured by some deterministic differential(More)
Preface A wireless communication network can be viewed as a collection of nodes, located in some domain, which can in turn be transmitters or receivers (depending on the network considered, nodes may be mobile users, base stations in a cellular network, access points of a WiFi mesh etc.). At a given time, several nodes transmit simultaneously, each toward(More)
This work addresses the estimation and calculation of the operating point of a net-work's link in a digital traffic network. The notion of operating point comes from Effective Band-width (EB) theory. The results are valid for a wide range of traffic types. This means that the statistical characteristics of the traffic may be very general. We show that,(More)
Peer-to-Peer streaming (P2P-TV) applications offer the capability to watch real time video over the Internet at low cost. Some applications have started to become popular, raising the concern of Network Operators that fear the large amount of traffic they might generate. Unfortunately, most of P2P-TV applications are based on proprietary and unknown(More)
In this paper we study the problem of traffic matrix estimation. The problem is ill-posed and thus some additional information has to be brought in to obtain an estimate. One common approach is to use the second moment statistics through a functional mean-variance relationship. We derive analytically the Fisher information matrix under this framework and(More)
In the simplest Matérn point processes, one retains certain points of a Pois-son point process in such a way that no pairs of points are at distance less than a threshold. This condition can be reinterpreted as a threshold condition on an extremal shot–noise field associated with the Poisson point process. This paper is focused on the case where one retains(More)
—This demo focuses on the online classification of traffic generated by P2P-TV applications, live video delivering services used by an ever increasing number of users worldwide. We designed a novel behavioural technique, which is able to reliably identify P2P-TV traffic simply based on raw counts of packets and bytes exchanged by the application during(More)
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each accepted connection obtains a minimum rate or equivalently a minimum SINR level --- which is not guaranteed by CSMA/CA --- and which are adapted to the wireless ad-hoc network(More)