7 results on '"James A. DeBardelaben"'
Search Results
2. Statistical Methods for Generating Synthetic Email Data Sets
- Author
-
Esteban Urdiales, Otis B. Jennings, Karolyn O. Babalola, and James A. DeBardelaben
- Subjects
010104 statistics & probability ,Computer science ,05 social sciences ,050301 education ,Data mining ,0101 mathematics ,computer.software_genre ,0503 education ,01 natural sciences ,Transaction data ,computer ,Generator (mathematics) - Abstract
This document outlines and demonstrates an approach to generating a synthetic email dataset using the Enron email dataset as a reference and the Synthetic Transaction Data Generator (STDG) simulator application. With statistical measures extracted from the Enron dataset, we generate synthetic email threads within the confines of a fictitious corporate structure. Our approach extrapolates the network structure of who communicates with whom and the timing of these communications, but it ignores semantic content. To this end, we first harvest the statistical network and temporal features of the Enron reference dataset. With these features, we use the agent-based STDG application to stochastically generate corporations of arbitrary sizes and email transactions within the corporations over a specified time period. We evaluate our methodology by comparing features of the synthetically-generated datasets with those of the reference dataset.
- Published
- 2018
- Full Text
- View/download PDF
3. Real time implementation of a multiuser detection enabled ad-hoc network
- Author
-
John A. Tranquilli, Joseph A. Farkas, Joshua D. Niedzwiecki, Brian M. Pierce, L. Reggie Brothers, and James A. DeBardelaben
- Subjects
Spread spectrum ,Signal-to-noise ratio ,Computer science ,Wireless ad hoc network ,Real-time computing ,Media access control ,Spectral efficiency ,Interference (wave propagation) ,Multiuser detection ,Communication channel ,Scheduling (computing) - Abstract
In contrast to the interference avoidance paradigm that conventional wireless communication systems follow, the DARPA Interference Multiple Access (DIMA) Communications program intentionally structures multiple-access interference to enable high-capacity, low-latency, spread spectrum communications. The systempsilas adaptive multi-user detection (MUD) receiver algorithms enable the transmission of multiple data streams in the same time and frequency channel without need for centralized control of synchronization or power levels. This paper focuses on the DIMA system level implementation of the prototype radio network, along with the results from both non-real-time testing and real-time performance characterization efforts. Extensive simulations and non-real-time over-the-air testing helped to drive the design of a real-time MUD receiver implemented on a single FPGA. The Media Access Control Layer, implemented on a General Purpose Processor (GPP), facilitates intentional interference through a defined frame structure that also enables distributed synchronization and scheduling. During the real-time performance characterization period, the DIMA prototype network demonstrated 3.5 times the spectral efficiency of comparable 802.11 ad-hoc systems at low signal to noise ratios (SNRs). DIMA demonstrated up to 11x reductions in latency jitter in the same comparison. These gains can be leveraged in future military applications to provide increased capabilities and improved performance to the war fighter.
- Published
- 2008
- Full Text
- View/download PDF
4. SATCOM-CX
- Author
-
L. Reginald Brothers, Steven Carson, Carl Symborski, and James A. DeBardelaben
- Published
- 2007
- Full Text
- View/download PDF
5. Interference multiple access communications
- Author
-
L. Reggie Brothers, James A. DeBardelaben, Joshua Niedzwiecki, Rachel E. Learned, Yiftach Eisenberg, and David M. Cooper
- Subjects
Engineering ,business.industry ,Wireless network ,Mesh networking ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Code rate ,Communications system ,Scheduling (computing) ,Network-centric warfare ,Wireless ,Network performance ,Telecommunications ,business ,Computer network - Abstract
The implementation of network centric warfare on the battlefield has driven the growing demand for high capacity warfighter communication systems. Although new high capacity SATCOM systems such as WGS are being introduced in the near term, these systems use the interference avoidance paradigm, which fundamentally limits overall network performance. This paper introduces a new wireless networking paradigm called Interference Multiple Access (IMA), developed under the auspices of DARPA. The interference multiple access paradigm exploits multi-access interference to enable revolutionary improvements in wireless communication capacity and latency without the need for infrastructure, coordination, or spectrum preplanning. Simulation and over-the-air test results suggest that greater than 3X increases in network throughput (especially in low SNR scenarios) can be achieved over traditional contention and scheduled-based spectrum access approaches when applied to WIN-T NCW terminals communicating in a mesh topology over the WGS constellation.
- Published
- 2007
- Full Text
- View/download PDF
6. Network coding for wireless applications
- Author
-
Desmond S. Lun, Ebad Ahmed, L. Reggie Brothers, James A. DeBardelaben, Michelle Effros, Tracey Ho, David Karger, Ralf Koetter, Anna Lee, Samuel J. MacMullan, Muriel Médard, and Fang Zhao
- Subjects
Key distribution in wireless sensor networks ,Wi-Fi array ,Geography ,Network packet ,Wireless network ,business.industry ,Linear network coding ,Computer Science::Networking and Internet Architecture ,Wireless WAN ,Radio resource management ,business ,Heterogeneous network ,Computer network - Abstract
The advent of network coding promises to change many aspects of networking. Network coding moves away from the classical approach of networking, which treats networks as akin to physical transportation systems. We overview some of the main features of network coding that are most relevant to wireless networks. In particular, we discuss the fact that random distributed network coding is asymptotically optimal for wireless networks with and without packet erasures. These results are extremely general and allow packet loss correlation, such as may occur in fading wireless channels. The coded network lends itself, for multicast connections, to a cost optimization which not only outperforms traditional routing tree-based approaches, but also lends itself to a distributed implementation and to a dynamic implementation when changing conditions, such as mobility, arise. We illustrate the performance of such optimization methods for energy efficiency in wireless networks and propose some new directions for research in the area.
- Published
- 2005
- Full Text
- View/download PDF
7. Agile radio resource management for proactive wireless networking (Invited Paper)
- Author
-
L. Reggie Brothers, Samuel J. MacMullan, Kevin L. Brown, and James A. DeBardelaben
- Subjects
Engineering ,business.industry ,Wireless network ,Quality of service ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Throughput ,OSI model ,Resource allocation ,Resource management ,Radio resource management ,business ,Telecommunications ,Agile software development ,Computer network - Abstract
Current military operational effectiveness can degrade rapidly with increasing communications stresses such as heavy throughput and QoS demands from disadvantaged users exposed to severe channel impairments and communications threats. This paper proposes a distributed and agile radio resource management (RRM) system to maintain mission effectiveness even under significant communications stress. Agile RRM includes a well-coordinated cross-layer design with the introduction of new OSI layer features and interactions as well as methods to incorporate communications constraints and requirements in systems controlling mission planning and execution.
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.