Rachid El-azouzi

Learn More
We introduce Markov Decision Evolutionary Games with N players, in which each individual in a large population interacts with other randomly selected players. The states and actions of each player in an interaction together determine the instantaneous payoff for all involved players. They also determine the transition probabilities to move to the next(More)
—Connectivity in vehicular ad hoc networks tends to be vulnerable. This is mostly because of the influence of road's traffic parameters like traffic flow and vehicle's speed. One possible way to improve the connectivity is to add some nodes with higher transmission range. These nodes also could give some commercial services to the vehicles on roads (i.e.(More)
— Consider a wireless ad hoc network with random access channel. We present a model that takes into account topology, routing, random access in MAC layer and forwarding probability. We propose a new approach (based on cycle of transmissions) to derive throughput of multi-hop routes and stability of forwarding queues. With this cycle approach, we correct the(More)
The demand for Internet services that require frequent updates through small messages, such as microblogging, has tremendously grown in the past few years. Although the use of such applications by domestic users is usually free, their access from mobile devices is subject to fees and consumes energy from limited batteries. If a user activates his mobile(More)
In this paper we design an incentive mechanism for heterogeneous Delay Tolerant Networks (DTNs). The proposed mechanism tackles a core problem of such systems: how to induce coordination of DTN relays in order to achieve a target performance figure, e.g., delivery probability or end-to-end delay, under a given constraint in term of network resources, e.g.,(More)
A central problem in Delay Tolerant Networks (DTNs) is to persuade mobile nodes to participate in relaying messages. Indeed, the delivery of a message incurs a certain number of costs for a relay. We consider a two-hop DTN in which a source node, wanting to get its message across to the destination as fast as possible, promises each relay it meets a reward.(More)
Abstract—The surge of mobile data traffic forces network operators to cope with capacity shortage. The deployment of small cells in 5G networks shall increase radio access capacity. Mobile edge computing technologies can be used to manage dedicated cache memory at the edge of mobile networks. As a result, data traffic can be confined within the radio access(More)
— We consider in this paper both real-time traffic as well as data transfers sharing a common bottleneck link. We assume that data connections use TCP congestion control protocol and that real-time traffic uses some TCP-friendly transport protocol that satisfies the same square-root formula for throughput assignment as a functions of the experienced marking(More)
—The deployment of IEEE 802.11 based WLANs in populated areas is such that many mobile terminals are covered by several Access Points (APs). These mobiles have the possibility to associate to the AP with the strongest signal (best-RSSI association scheme).This can lead to poor performances and overloaded APs. Moreover, the well known anomaly in the protocol(More)
Network coding (NC) techniques for lossy wireless networks have been used for fault-tolerant and timely delivery of streaming video data. Recent research on inter-session NC notwithstanding, reliable transmission of high quality media over wireless networks continues to be a challenge. The effects of traffic and network dynamics on coding block size and(More)