22 results on '"Dousse, Olivier"'
Search Results
2. A probabilistic kernel method for human mobility prediction with smartphones
- Author
-
Do, Trinh Minh Tri, Dousse, Olivier, Miettinen, Markus, and Gatica-Perez, Daniel
- Published
- 2015
- Full Text
- View/download PDF
3. From big smartphone data to worldwide research: The Mobile Data Challenge
- Author
-
Laurila, Juha K., Gatica-Perez, Daniel, Aad, Imad, Blom, Jan, Bornet, Olivier, Do, Trinh Minh Tri, Dousse, Olivier, Eberle, Julien, and Miettinen, Markus
- Published
- 2013
- Full Text
- View/download PDF
4. Percolation in the Signal to Interference Ratio Graph
- Author
-
Dousse, Olivier, Franceschetti, Massimo, Macris, Nicolas, Meester, Ronald, and Thiran, Patrick
- Published
- 2006
5. Self-organization properties of CSMA/CA systems and their consequences on fairness
- Author
-
Durvy, Mathilde, Dousse, Olivier, and Thiran, Patrick
- Subjects
Ad hoc networks (Computer networks) -- Analysis ,Markov processes -- Usage - Abstract
Decentralized medium access control schemes for wireless networks based on CSMA/CA, such as the IEEE 802.11 protocol, are known to be unfair. In multihop networks, they can even favor some links to such an extent that the others suffer from virtually complete starvation. This observation has been reported in quite a few works, but the factors causing it are still not well understood. We find that the capture effect and the relative values of the receive and carrier sensing ranges play a crucial role in the performance of these protocols. Using a simple Markovian model, we show that an idealized CSMA/CA protocol suffers from starvation when the receiving and sensing ranges are equal, but quite surprisingly that this unfairness is reduced or even disappears when these two ranges are sufficiently different. We also show that starvation has a positive counterpart, namely organization. When its access intensity is large the protocol organizes the transmissions in space in such a way that it maximizes the number of concurrent successful transmissions. We obtain exact formulae for the so-called spatial reuse of the protocol on large line networks. Index Terms--Ad hoc networks, CSMA/CA, medium-access control (MAC), modeling, multihop, performance analysis.
- Published
- 2009
6. Closing the gap in the capacity of wireless networks via percolation theory
- Author
-
Franceschetti, Massimo, Dousse, Olivier, Tse, David N.C., and Thiran, Patrick
- Subjects
Wireless technology ,Mobile communication systems -- Analysis ,Wireless communication systems -- Analysis ,Scaling laws (Statistical physics) -- Analysis - Abstract
An achievable bit rate per source-destination pair in a wireless network of n randomly located nodes is determined adopting the scaling limit approach of statistical physics. It is shown that randomly scattered nodes can achieve, with high probability, the same 1/[square root of n] transmission rate of arbitrarily located nodes. This contrasts with previous results suggesting that a 1/[square root of n log n] reduced rate is the price to pay for the randomness due to the location of the nodes. The network operation strategy to achieve the result corresponds to the transition region between order and disorder of an underlying percolation model. If nodes are allowed to transmit over large distances, then paths of connected nodes that cross the entire network area can be easily found, but these generate excessive interference. If nodes transmit over short distances, then such crossing paths do not exist. Percolation theory ensures that crossing paths form in the transition region between these two extreme scenarios. Nodes along these paths are used as a backbone, relaying data for other nodes, and can transport the total amount of information generated by all the sources. A lower bound on the achievable bit rate is then obtained by performing pairwise coding and decoding at each hop along the paths, and using a time division multiple access scheme. Index Terms--Ad-hoc networks, capacity, percolation theory, scaling laws, throughput, wireless networks.
- Published
- 2007
7. On the throughput scaling of wireless relay networks
- Author
-
Dousse, Olivier, Franceschetti, Massimo, and Thiran, Patrick
- Subjects
Wireless LAN/WAN system ,Wireless network ,Information theory -- Analysis ,Wireless local area networks (Computer networks) -- Analysis - Abstract
The throughput of wireless networks is known to scale poorly when the number of users grows. The rate at which an arbitrary pair of nodes can communicate must decrease to zero as the number of users tends to infinity, under various assumptions. One of them is the requirement that the network is fully connected: the computed rate must hold for any pair of nodes of the network. We show that this requirement can be responsible for the lack of throughput scalability. We consider a two-dimensional (2-D) network of extending area with only one active source-destination pair at any given time, and all remaining nodes acting only as possible relays. Allowing an arbitrary small fraction of the nodes to be disconnected, we show that the per-node throughput remains constant as the network size increases. As a converse bound, we show that communications occurring at a fixed nonzero rate imply a fraction of the nodes to be disconnected. Our results are of information theoretic flavor, as they hold without assumptions on the communication strategies employed by the network nodes. Index Terms--Ad hoc networks, information theory, percolation theory, scaling laws, sensor networks, wireless networks.
- Published
- 2006
8. Physical connectivity of self-organised Ad Hoc Wireless networks
- Author
-
Dousse, Olivier and Thiran, Patrick
- Subjects
Self-organizing systems -- Evaluation ,Information networks -- Analysis ,Computer networks -- Analysis ,Mobile communication systems -- Analysis ,Wireless communication systems -- Analysis ,Wireless technology ,Business ,Computers ,Computers and office automation industries ,Electronics - Abstract
Wireless Ad Hoc networks contain nodes, which connect to each other without any fixed base stations and can operate only in a limited geographical area. The problem of wider geographical areas that Wireless Ad Hoc networks face is addressed.
- Published
- 2003
9. Asymptotic properties of wireless multi-hop networks
- Author
-
Dousse, Olivier and Thiran, Patrick
- Abstract
In this dissertation, we consider wireless multi-hop networks, where the nodes are randomly placed. We are particularly interested in their asymptotic properties when the number of nodes tends to infinity. We use percolation theory as our main tool of analysis. As a first model, we assume that nodes have a fixed connectivity range, and can establish wireless links to all nodes within this range, but no other (Boolean model). We compute for one-dimensional networks the probability that two nodes are connected, given the distance between them. We show that this probability tends exponentially to zero when the distance increases, proving that pure multi-hopping does not work in large networks. In two dimensions however, an unbounded cluster of connected nodes forms if the node density is above a critical threshold (super-critical phase). This is known as the percolation phenomenon. This cluster contains a positive fraction of the nodes that depends on the node density, and remains constant as the network size increases. Furthermore, the fraction of connected nodes tends rapidly to one when the node density is above the threshold. We compare this partial connectivity to full connectivity, and show that the requirement for full connectivity leads to vanishing throughput when the network size increases. In contrast, partial connectivity is perfectly scalable, at the cost of a tiny fraction of the nodes being disconnected. We consider two other connectivity models. The first one is a signal-to-interference- plus-noise-ratio based connectivity graph (STIRG). In this model, we assume deterministic attenuation of the signals as a function of distance. We prove that percolation occurs in this model in a similar way as in the previous model, and study in detail the domain of parameters where it occurs. We show in particular that the assumptions on the attenuation function dramatically impact the results: the commonly used power-law attenuation leads to particular symmetry properties. However, physics imposes that the received signal cannot be stronger than the emitted signal, implying a bounded attenuation function. We observe that percolation is harder to achieve in most cases with such an attenuation function. The second model is an information theoretic view on connectivity, where two arbitrary nodes are considered connected if it is possible to transmit data from one to the other at a given rate. We show that in this model the same partial connectivity can be achieved in a scalable way as in the Boolean model. This result is however a pure connectivity result in the sense that there is no competition and interferences between data flows. We also look at the other extreme, the Gupta and Kumar scenario, where all nodes want to transmit data simultaneously. We show first that under point-to-point communication and bounded attenuation function the total transport capacity of a fixed area network is bounded from above by a constant, whatever the number of nodes may be. However, if the network area increases linearly with the number of nodes (constant density), or if we assume power-law attenuation function, a throughput per node of order 1/√n can be achieved. This latter result improves the existing results about random networks by a factor (log n)1/2. In the last part of this dissertation, we address two problems related to latency. The first one is an intruder detection scenario, where a static sensor network has to detect an intruder that moves with constant speed along a straight line. We compute an upper bound to the time needed to detect the intruder, under the assumption that detection by disconnected sensors does not count. In the second scenario, sensors switch off their radio device for random periods, in order to save energy. This affects the delivery of alert messages, since they may have to wait for relays to turn on their radio to move further. We show that asymptotically, alert messages propagate with constant, deterministic speed in such networks.
- Published
- 2005
- Full Text
- View/download PDF
10. Opportunistic Sampling for Joint Population Size and Density Estimation.
- Author
-
Naini, Farid Movahedi, Dousse, Olivier, Thiran, Patrick, and Vetterli, Martin
- Subjects
BLUETOOTH technology ,WIRELESS communications ,STATISTICAL models ,MATHEMATICAL models ,FIXED effects model - Abstract
Consider a set of probes, called “agents”, who sample, based on opportunistic contacts, a population moving between a set of discrete locations. An example of such agents are Bluetooth probes that sample the visible Bluetooth devices in a population. Based on the obtained measurements, we construct a parametric statistical model to jointly estimate the total population size (e.g., the number of visible Bluetooth devices) and their spatial density. We evaluate the performance of our estimators by using Bluetooth traces obtained during an open-air event and Wi-Fi traces obtained on a university campus. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
11. Place Learning via Direct WiFi Fingerprint Clustering.
- Author
-
Dousse, Olivier, Eberle, Julien, and Mertens, Matthias
- Abstract
Most current mobile devices are able to determine their location, which has become part of the contextual information available to applications. However, in many cases, the exact position of the device in terms of longitude and latitude is not necessary. On the contrary, applications might benefit more from a discrete context variable that indicates the ``place'' in which the device currently is. To realize this, the continuous device's trajectory needs to be clustered into discrete locations. Besides, the device's location is often not measured directly, but rather inferred from other measurements, such as the list of available WiFi access points. Since similar WiFi measurements lead to similar estimates of the position, it appears that the conversion into geographical coordinates is an unnecessary step in the identification of places. In this paper, we describe a density-based clustering approach that allows to learn significant places directly from a set of raw WiFi measurements. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
12. Percolation in directed random geometric graphs.
- Author
-
Dousse, Olivier
- Abstract
The connectivity graph of wireless networks, under many models as well as in practice, may contain unidirectional links. The simplifying assumption that such links are useless is often made, mainly because most wireless protocols use per-hop acknowledgments. However, two-way communication between a pair of nodes can be established as soon as there exists paths in both directions between them. Therefore, instead of discarding unidirectional links, one might be interested in studying the strongly connected components of the connectivity graph. In this paper, we look at the percolation phenomenon in some directed random geometric graphs that can be used to model wireless networks. We show that among the nodes that can be reached from the origin, a non-zero fraction can also reach the origin. In other words, the percolation threshold for strong connectivity is equal to the threshold for one-way connectivity. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
13. Self-synchronizing properties of CSMA wireless multi-hop networks.
- Author
-
Xu, Kuang, Dousse, Olivier, and Thiran, Patrick
- Published
- 2010
- Full Text
- View/download PDF
14. Strong barrier coverage of wireless sensor networks.
- Author
-
Liu, Benyuan, Dousse, Olivier, Wang, Jie, and Saipulla, Anwar
- Published
- 2008
- Full Text
- View/download PDF
15. Delay of intrusion detection in wireless sensor networks.
- Author
-
Dousse, Olivier, Tavoularis, Christina, and Thiran, Patrick
- Published
- 2006
- Full Text
- View/download PDF
16. Mobility improves coverage of sensor networks.
- Author
-
Liu, Benyuan, Brass, Peter, Dousse, Olivier, Nain, Philippe, and Towsley, Don
- Published
- 2005
- Full Text
- View/download PDF
17. Latency of wireless sensor networks with uncoordinated power saving mechanisms.
- Author
-
Dousse, Olivier, Mannersalo, Petteri, and Thiran, Patrick
- Published
- 2004
- Full Text
- View/download PDF
18. Dynamic Coverage of Mobile Sensor Networks.
- Author
-
Liu, Benyuan, Dousse, Olivier, Nain, Philippe, and Towsley, Don
- Subjects
- *
WIRELESS sensor networks , *NASH equilibrium , *MOBILE communication systems , *CIRCLE-squaring , *MOBILE computing - Abstract
We study the dynamic aspects of the coverage of a mobile sensor network resulting from continuous movement of sensors. As sensors move around, initially uncovered locations may be covered at a later time, and intruders that might never be detected in a stationary sensor network can now be detected by moving sensors. However, this improvement in coverage is achieved at the cost that a location is covered only part of the time, alternating between covered and not covered. We characterize area coverage at specific time instants and during time intervals, as well as the time durations that a location is covered and uncovered. We further consider the time it takes to detect a randomly located intruder and prove that the detection time is exponentially distributed with parameter 2\lambda r \barv_s where \lambda represents the sensor density, r represents the sensor's sensing range, and \barv_s denotes the average sensor speed. For mobile intruders, we take a game theoretic approach and derive optimal mobility strategies for both sensors and intruders. We prove that the optimal sensor strategy is to choose their directions uniformly at random between [0, 2\pi ). The optimal intruder strategy is to remain stationary. This solution represents a mixed strategy which is a Nash equilibrium of the zero-sum game between mobile sensors and intruders. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
19. On the Fairness of Large CSMA Networks.
- Author
-
Durvy, Mathilde, Dousse, Olivier, and Thiran, Patrick
- Subjects
AD hoc computer networks ,WIRELESS communications ,PHASE transitions ,WIRELESS sensor networks ,ELECTRIC network topology - Abstract
We characterize the fairness of decentralized medium access control protocols based on CSMA/CA, in large multi-hop wireless networks. In particular, we show that the widely observed unfairness of these protocols in small network topologies does not always persist in large topologies. In regular networks, this unfairness is essentially due to the unfair advantage of nodes at the border of the network, which have a restricted neighborhood and thus a higher probability to access the communication channel. In large 1D lattice networks these border effects do not propagate inside the network, and nodes sufficiently far away from the border have equal access to the channel; as a result the protocol is long-term fair. In 2D lattice networks, we observe a phase transition. If the access intensity of the protocol is small, the border effects remain local and the protocol behaves similarly as in one-dimensional networks. However, if the access intensity of the protocol is large enough, the border effects persist independently of the size of the network and the protocol is strongly unfair. In irregular networks, the topology is inherently unfair. This unfairness increases with the access intensity of the protocol, but in a much smoother way than in regular two-dimensional networks. Finally, in situations where the protocol is long-term fair, we provide a characterization of its short-term fairness. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
20. Stochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks.
- Author
-
Haenggi, Martin, Andrews, Jeffrey G., Baccelli, François, Dousse, Olivier, and Franceschetti, Massimo
- Subjects
STOCHASTIC geometry ,RANDOM graphs ,WIRELESS sensor networks ,PERCOLATION theory ,POISSON processes ,POINT processes - Abstract
Wireless networks are fundamentally limited by the intensity of the received signals and by their interference. Since both of these quantities depend on the spatial location of the nodes, mathematical techniques have been developed in the last decade to provide communication-theoretic results accounting for the network's geometrical configuration. Often, the location of the nodes in the network can be modeled as random, following for example a Poisson point process. In this case, different techniques based on stochastic geometry and the theory of random geometric graphs -- including point process theory, percolation theory, and probabilistic combinatorics -- have led to results on the connectivity, the capacity, the outage probability, and other fundamental limits of wireless networks. This tutorial article surveys some of these techniques, discusses their application to model wireless networks, and presents some of the main results that have appeared in the literature. It also serves as an introduction to the field for the other papers in this special issue. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
21. Geometry and Random Graphs for the Analysis and Design of Wireless Networks.
- Author
-
Haenggi, Martin, Andrews, Jeffrey, Baccelli, Francois, Dousse, Olivier, Franceschetti, Massimo, and Towsley, Don
- Subjects
WIRELESS communications ,DATA transmission systems - Abstract
The article discusses various reports published within the issue, including one on the use of a hierarchical model and Voronoi tessellations for cellular networks to identify distance distributions between low and high-level network components, one on a method which is developed for analyzing the probability that a given graph occurs as a subgraph of a random geometric graph, and one on a data transmission protocol called BeSpoken that aims at forwarding packets along straight path.
- Published
- 2009
- Full Text
- View/download PDF
22. Impact of Interferences on Connectivity in Ad Hoc Networks.
- Author
-
Dousse, Olivier, Baccelli, François, and Thiran, Patrick
- Subjects
COMPUTER networks ,ELECTRONIC noise ,ELECTRIC interference ,CODE division multiple access ,TIME division multiple access ,DATA transmission systems - Abstract
We study the impact of interferences on the connectivity of large-scale ad hoc networks, using percolation theory. We assume that a hi-directional connection can be set up between two nodes if the signal to noise ratio at the receiver is larger than some threshold. The noise is the sum of the contribution of interferences from all other nodes, weighted by a coefficient γ, and of a background noise. We find that there is a critical value of γ above which the network is made of disconnected clusters of nodes. We also prove that if γ is nonzero but small enough, there exist node spatial densities for which the network contains a large (theoretically infinite) cluster of nodes, enabling distant nodes to communicate in multiple hops. Since small values of γ cannot be achieved without efficient CDMA codes, we investigate the use of a very simple TDMA scheme, where nodes can emit only every nth time slot. We show that it achieves connectivity similar to the previous system with a parameter γ / n. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.