Skip to main content

Showing 1–37 of 37 results for author: Kralevska, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07850  [pdf, other

    cs.NI

    Knowledge Graph Embedding in Intent-Based Networking

    Authors: Kashif Mehmood, Katina Kralevska, David Palma

    Abstract: This paper presents a novel approach to network management by integrating intent-based networking (IBN) with knowledge graphs (KGs), creating a more intuitive and efficient pipeline for service orchestration. By map** high-level business intents onto network configurations using KGs, the system dynamically adapts to network changes and service demands, ensuring optimal performance and resource a… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Accepted at WIN 2024 (IEEE NetSoft24)

  2. arXiv:2405.01808  [pdf, other

    cs.IT cs.NI

    GRAND Massive Parallel Decoding Framework for Low Latency in Beyond 5G

    Authors: Danilo Gligoroski, Sahana Sridhar, Katina Kralevska

    Abstract: We propose a massive parallel decoding GRAND framework. The framework introduces two novelties: 1. A likelihood function for $M$-QAM demodulated signals that effectively reduces the symbol error pattern space from $\mathcal{O}(5^{N/\log_2 M})$ down to $\mathcal{O}(4^{N/\log_2 M})$; and 2. A massively parallel matrix-vector multiplication for matrices of size $K\times N$ ($K \leq N$) that performs… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: Accepted at 15th International Conference on Ubiquitous and Future Networks (ICUFN 2024)

  3. arXiv:2401.08341  [pdf, other

    cs.NI

    Direct-Conflict Resolution in Intent-Driven Autonomous Networks

    Authors: Idris Cinmere, Kashif Mehmood, Katina Kralevska, Toktam Mahmoodi

    Abstract: As network systems evolve, there is an escalating demand for automated tools to facilitate efficient management and configuration. This paper explores conflict resolution in Intent-Based Network (IBN) management, an innovative approach that holds promise for effective network administration, especially within radio access domain. Nevertheless, when multiple intents are in operation concurrently, c… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: Accepted and presented at 28th European Wireless Conference 2023

  4. arXiv:2302.08544  [pdf, other

    cs.NI

    Knowledge-based Intent Modeling for Next Generation Cellular Networks

    Authors: Kashif Mehmood, Katina Kralevska, David Palma

    Abstract: Intent-based networking (IBN) facilitates the representation of consumer expectations in a declarative and domain-independent form. However, map** intents to service and resource models remains an open challenge. IBN requires handling existing system data in a structured yet flexible structure way. Knowledge graphs provide an efficient conceptual framework for constructing contexts and organizin… ▽ More

    Submitted 24 July, 2023; v1 submitted 16 February, 2023; originally announced February 2023.

    Comments: Accepted at MeditCom 2023

  5. arXiv:2207.12471  [pdf, other

    cs.NI

    Secure Service Implementation with Slice Isolation and WireGuard

    Authors: Sondre Kielland, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski

    Abstract: Network slicing enables the provision of services for different verticals over a shared infrastructure. Nevertheless, security is still one of the main challenges when sharing resources. In this paper, we study how WireGuard can provide an encrypted Virtual Private Network (VPN) tunnel as a service between network functions in 5G setting. The open source management and orchestration entity deploys… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: Accepted for publication in 2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)

  6. arXiv:2205.03932  [pdf, other

    cs.NI

    Mission-Critical Public Safety Networking: An Intent-Driven Service Orchestration Perspective

    Authors: Kashif Mehmood, David Palma, Katina Kralevska

    Abstract: Intent-based networking (IBN) provides a promising approach for managing networks and orchestrating services in beyond 5G (B5G) deployments using modern service-based architectures. Public safety (PS) services form the basis of kee** society functional, owing to the responsiveness and availability throughout the network. The provisioning of these services requires efficient and agile network man… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: Accepted for Publication at WIN2022 (under IEEE NetSoft 2022 Conference)

  7. arXiv:2112.00147  [pdf, other

    cs.NI cs.IT

    Slicing Scheduling for Supporting Critical Traffic in Beyond 5G

    Authors: Ali Esmaeily, Katina Kralevska, Toktam Mahmoodi

    Abstract: One of the most challenging services fifth-generation (5G) mobile network is designed to support, is the critical services in-need of very low latency, and/or high reliability. It is now clear that such critical services will also be at the core of beyond 5G (B5G) networks. While 5G radio design accommodates such supports by introducing more flexibility in timing, how efficiently those services co… ▽ More

    Submitted 6 December, 2021; v1 submitted 30 November, 2021; originally announced December 2021.

    Comments: The paper has been accepted at CCNC 2022

  8. arXiv:2111.07884  [pdf, other

    cs.DC cs.IT

    Functional Broadcast Repair of Multiple Partial Failures in Wireless Distributed Storage Systems

    Authors: Nitish Mital, Katina Kralevska, Cong Ling, Deniz Gunduz

    Abstract: We consider a distributed storage system with $n$ nodes, where a user can recover the stored file from any $k$ nodes, and study the problem of repairing $r$ partially failed nodes. We consider \textit{broadcast repair}, that is, $d$ surviving nodes transmit broadcast messages on an error-free wireless channel to the $r$ nodes being repaired, which are then used, together with the surviving data in… ▽ More

    Submitted 10 November, 2021; originally announced November 2021.

    Comments: 20 pages, 2 figures, 3 tables, to appear in IEEE JSAIT. arXiv admin note: text overlap with arXiv:1807.00220

  9. arXiv:2111.03255  [pdf, ps, other

    cs.NI

    Transient Performance Modelling of 5G Slicing with Mixed Numerologies for Smart Grid Traffic

    Authors: H. V. Kalpanie Mendis, Poul E. Heegaard, Vicente Casares-Giner, Frank Y. Li, Katina Kralevska

    Abstract: Network slicing enabled by fifth generation (5G) systems has the potential to satisfy diversified service requirements from different vertical industries. As a typical vertical industry, smart distribution grid poses new challenges to communication networks. This paper investigates the behavior of network slicing for smart grid applications in 5G radio access networks with heterogeneous traffic. T… ▽ More

    Submitted 5 November, 2021; originally announced November 2021.

  10. Intent-driven autonomous network and service management in future cellular networks: A structured literature review

    Authors: Kashif Mehmood, Katina Kralevska, David Palma

    Abstract: Intent-driven networks are an essential step** stone in the evolution of network and service management towards a truly autonomous paradigm. User centric intents provide an abstracted means of impacting the design, provisioning, deployment and assurance of network infrastructure and services with the help of service level agreements and minimum network capability exposure. The concept of Intent… ▽ More

    Submitted 9 May, 2023; v1 submitted 10 August, 2021; originally announced August 2021.

  11. arXiv:2105.05594  [pdf, other

    cs.NI

    Intent-based Network Management and Orchestration for Smart Distribution Grids

    Authors: Kashif Mehmood, H. V. Kalpanie Mendis, Katina Kralevska, Poul E. Heegaard

    Abstract: 5G technology complements the enabling of communication services for different vertical industries such as smart distribution grids. Automation is an integral and necessary part of the power distribution grid operation and management. This paper postulates a framework by which the smart distribution grid can obtain service-oriented communication services using 5G network slicing and intent-based n… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

    Comments: This paper has been accepted for presentation at the 28th International Conference on Telecommunications (ICT 21)

  12. arXiv:2104.08834  [pdf, other

    cs.NI

    Small-Scale 5G Testbeds for Network Slicing Deployment: A Systematic Review

    Authors: Ali Esmaeily, Katina Kralevska

    Abstract: Develo** specialized cloud-based and open-source testbeds is a practical approach to investigate network slicing functionalities in the fifth-generation (5G) mobile networks. This paper provides a comprehensive review of most of the existing cost-efficient and small-scale testbeds that partially or fully deploy network slicing. First, we present relevant software packages for the three main func… ▽ More

    Submitted 18 April, 2021; originally announced April 2021.

    Comments: Accepted for publication in Wireless Communications and Mobile Computing, 2021

  13. arXiv:2010.03849  [pdf, other

    cs.NI cs.CR

    5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept

    Authors: Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski

    Abstract: The fifth-generation (5G) mobile networks aim to host different types of services on the same physical infrastructure. Network slicing is considered as the key enabler for achieving this goal. Although there is some progress in applying and implementing network slicing in the context of 5G, the security and performance of network slicing still have many open research questions. In this paper, we p… ▽ More

    Submitted 8 October, 2020; originally announced October 2020.

    Comments: Accepted for presentation at IEEE NFV-SDN 2020

  14. arXiv:2009.12913  [pdf, other

    cs.CR cs.CY cs.SI

    GDPR Compliance for Blockchain Applications in Healthcare

    Authors: Anton Hasselgren, Paul Kengfai Wan, Margareth Horn, Katina Kralevska, Danilo Gligoroski, Arild Faxvaag

    Abstract: The transparent and decentralized characteristics associated with blockchain can be both appealing and problematic when applied to a healthcare use-case. As health data is highly sensitive, it is also highly regulated to ensure the privacy of patients. At the same time, access to health data and interoperability is in high demand. Regulatory frameworks such as GDPR and HIPAA are, amongst other obj… ▽ More

    Submitted 27 September, 2020; originally announced September 2020.

  15. arXiv:2005.08804  [pdf, other

    cs.CR cs.NI

    VerifyMed -- A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept

    Authors: Jens-Andreas Hanssen Rensaa, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, Arild Faxvaag

    Abstract: Patients living in a digitized world can now interact with medical professionals through online services such as chat applications, video conferencing or indirectly through consulting services. These applications need to tackle several fundamental trust issues: 1. Checking and confirming that the person they are interacting with is a real person; 2. Validating that the healthcare professional has… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: Accepted for publication at Blockchain and Internet of Things Conference (BIOTC 2020)

  16. arXiv:2004.10455  [pdf, other

    cs.NI

    A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G

    Authors: Ali Esmaeily, Katina Kralevska, Danilo Gligoroski

    Abstract: Network slicing aims to shape 5G as a flexible, scalable, and demand-oriented network. Research communities deploy small-scale and cost-efficient testbeds in order to evaluate network slicing functionalities. We introduce a novel testbed, called 5GIIK, that provides implementation, management, and orchestration of network slices across all network domains and different access technologies. Our met… ▽ More

    Submitted 14 May, 2020; v1 submitted 22 April, 2020; originally announced April 2020.

    Comments: This paper has been accepted for publication at IEEE NetSoft 2020

  17. arXiv:1912.02585  [pdf, ps, other

    cs.NI

    Local Voting: A New Distributed Bandwidth Reservation Algorithm for 6TiSCH Networks

    Authors: Dimitrios J. Vergados, Katina Kralevska, Yuming Jiang, Angelos Michalas

    Abstract: The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** (TSCH) with IPv6. IEEE 802.15.4e TSCH defines only the communication between nodes through a schedule but it does no… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

  18. SoK of Used Cryptography in Blockchain

    Authors: Mayank Raikwar, Danilo Gligoroski, Katina Kralevska

    Abstract: The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used… ▽ More

    Submitted 2 September, 2019; v1 submitted 20 June, 2019; originally announced June 2019.

    Journal ref: IEEE Access 7 (2019) 148550 - 148575

  19. Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G

    Authors: Danilo Gligoroski, Katina Kralevska

    Abstract: The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into an end-to-end network slice instance. In this paper, we propose a mathematical model for network slicing based on combinatorial designs such as Latin squares and rectangles and the… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: Accepted for publication in IEEE Access

    Report number: Published in IEEE Access, vol. 7, pp. 54879--54887, 2019

    Journal ref: https://ieeexplore.ieee.org/document/8698758 2019

  20. arXiv:1904.07273  [pdf, other

    cs.IT

    Practical Functional Regenerating Codes for Broadcast Repair of Multiple Nodes

    Authors: Nitish Mital, Katina Kralevska, Cong Ling, Deniz Gunduz

    Abstract: A code construction and repair scheme for optimal functional regeneration of multiple node failures is presented, which is based on stitching together short MDS codes on carefully chosen sets of points lying on a linearized polynomial. The nodes are connected wirelessly, hence all transmissions by helper nodes during a repair round are available to all the nodes being repaired. The scheme is simpl… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: 5 pages, ISIT 2019

  21. Evaluation of HTTP/DASH Adaptation Algorithms on Vehicular Networks

    Authors: Dimitrios J. Vergados, Angelos Michalas, Katina Kralevska, Dimitrios D. Vergados

    Abstract: Video streaming currently accounts for the majority of Internet traffic. One factor that enables video streaming is HTTP Adaptive Streaming (HAS), that allows the users to stream video using a bit rate that closely matches the available bandwidth from the server to the client. MPEG Dynamic Adaptive Streaming over HTTP (DASH) is a widely used standard, that allows the clients to select the resoluti… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Report number: Published in Global Information Infrastructure and Networking Symposium (GIIS 2018)

    Journal ref: https://ieeexplore.ieee.org/document/8635721 2018

  22. arXiv:1807.00220  [pdf, ps, other

    cs.DC cs.IT

    Storage-Repair Bandwidth Trade-off for Wireless Caching with Partial Failure and Broadcast Repair

    Authors: Nitish Mital, Katina Kralevska, Deniz Gunduz, Cong Ling

    Abstract: Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in t… ▽ More

    Submitted 30 June, 2018; originally announced July 2018.

    Comments: Conference version of this paper has been submitted for review in ITW 2018. This submission includes the proof of theorem 1

  23. An Explicit Construction of Systematic MDS Codes with Small Sub-packetization for All-Node Repair

    Authors: Katina Kralevska, Danilo Gligoroski

    Abstract: An explicit construction of systematic MDS codes, called HashTag+ codes, with arbitrary sub-packetization level for all-node repair is proposed. It is shown that even for small sub-packetization levels, HashTag+ codes achieve the optimal MSR point for repair of any parity node, while the repair bandwidth for a single systematic node depends on the sub-packetization level. Compared to other codes i… ▽ More

    Submitted 25 June, 2018; v1 submitted 8 June, 2018; originally announced June 2018.

    Report number: Published in IEEE DataCom 2018

    Journal ref: https://ieeexplore.ieee.org/document/8512021 2018

  24. Network Traffic Driven Storage Repair

    Authors: Danilo Gligoroski, Katina Kralevska, Rune E. Jensen, Per Simonsen

    Abstract: Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with bot… ▽ More

    Submitted 25 June, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: arXiv admin note: text overlap with arXiv:1701.06664

    Report number: Published in International Journal of Big Data Intelligence, 2018

  25. arXiv:1803.01358  [pdf, other

    cs.IT cs.DC

    Applied Erasure Coding in Networks and Distributed Storage

    Authors: Katina Kralevska

    Abstract: The amount of digital data is rapidly growing. There is an increasing use of a wide range of computer systems, from mobile devices to large-scale data centers, and important for reliable operation of all computer systems is mitigating the occurrence and the impact of errors in digital data. The demand for new ultra-fast and highly reliable coding techniques for data at rest and for data in transit… ▽ More

    Submitted 4 March, 2018; originally announced March 2018.

  26. arXiv:1801.06736  [pdf, other

    cs.IT cs.CR cs.DM

    On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields

    Authors: Danilo Gligoroski, Kristian Gjosteen, Katina Kralevska

    Abstract: Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. The practical benefits of using orthogonal matrices come from the fact that the computation of inverse matrices is avoided, by simply using the transpose of the orthogonal matrix. In this paper… ▽ More

    Submitted 20 January, 2018; originally announced January 2018.

  27. A Load Balancing Algorithm for Resource Allocation in IEEE 802.15.4e Networks

    Authors: Katina Kralevska, Dimitrios J. Vergados, Yuming Jiang, Angelos Michalas

    Abstract: The recently created IETF 6TiSCH working group combines the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hop** with IPv6 for industrial Internet of Things. We propose a distributed link scheduling algorithm, called Local Voting, for 6TiSCH networks that adapts the schedule to the network conditions. The algorithm tries to equalize the link load (defined as t… ▽ More

    Submitted 24 January, 2018; v1 submitted 20 September, 2017; originally announced September 2017.

    Journal ref: Published in 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)

  28. Local Voting: Optimal Distributed Node Scheduling Algorithm for Multihop Wireless Networks

    Authors: Dimitrios J. Vergados, Natalia Amelina, Yuming Jiang, Katina Kralevska, Oleg Granichin

    Abstract: An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of… ▽ More

    Submitted 2 March, 2017; originally announced March 2017.

    Comments: Accepted at 2017 INFOCOM Poster and Demo

    Journal ref: Published in 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

  29. arXiv:1701.09010  [pdf, ps, other

    cs.NI

    Towards Optimal Distributed Node Scheduling in a Multihop Wireless Network through Local Voting

    Authors: Dimitrios J. Vergados, Natalia Amelina, Yuming Jiang, Katina Kralevska, Oleg Granichin

    Abstract: In a multihop wireless network, it is crucial but challenging to schedule transmissions in an efficient and fair manner. In this paper, a novel distributed node scheduling algorithm, called Local Voting, is proposed. This algorithm tries to semi-equalize the load (defined as the ratio of the queue length over the number of allocated slots) through slot reallocation based on local information excha… ▽ More

    Submitted 15 September, 2017; v1 submitted 31 January, 2017; originally announced January 2017.

  30. Repair Duality with Locally Repairable and Locally Regenerating Codes

    Authors: Danilo Gligoroski, Katina Kralevska, Rune E. Jensen, Per Simonsen

    Abstract: We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level)… ▽ More

    Submitted 30 August, 2017; v1 submitted 23 January, 2017; originally announced January 2017.

    Comments: Accepted as a full paper for publication at IEEE DataCom 2017

    Journal ref: 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 979-984

  31. Families of Optimal Binary Non-MDS Erasure Codes

    Authors: Danilo Gligoroski, Katina Kralevska

    Abstract: We introduce a definition for \emph{Families of Optimal Binary Non-MDS Erasure Codes} for $[n, k]$ codes over $GF(2)$, and propose an algorithm for finding those families by using hill climbing techniques over Balanced XOR codes. Due to the hill climbing search, those families of codes have always better decoding probability than the codes generated in a typical Random Linear Network Coding scenar… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.

    Comments: presented at ISIT 2014

    Report number: Published in 2014 IEEE International Symposium on Information Theory

  32. HashTag Erasure Codes: From Theory to Practice

    Authors: Katina Kralevska, Danilo Gligoroski, Rune E. Jensen, Harald Øverby

    Abstract: Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS co… ▽ More

    Submitted 3 July, 2017; v1 submitted 8 September, 2016; originally announced September 2016.

    Comments: Submitted to IEEE Transactions on Big Data

    Journal ref: Published in: IEEE Transactions on Big Data Volume: 4 , Issue: 4 , Dec. 1 2018

  33. Balanced Locally Repairable Codes

    Authors: Katina Kralevska, Danilo Gligoroski, Harald Øverby

    Abstract: We introduce a family of balanced locally repairable codes (BLRCs) $[n, k, d]$ for arbitrary values of $n$, $k$ and $d$. Similar to other locally repairable codes (LRCs), the presented codes are suitable for applications that require a low repair locality. The novelty that we introduce in our construction is that we relax the strict requirement the repair locality to be a fixed small number $l$, a… ▽ More

    Submitted 3 July, 2017; v1 submitted 14 July, 2016; originally announced July 2016.

    Comments: Accepted for presentation at International Symposium on Turbo Codes and Iterative Information Processing 2016

    Journal ref: Published in: 2016 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC)

  34. General Sub-packetized Access-Optimal Regenerating Codes

    Authors: Katina Kralevska, Danilo Gligoroski, Harald Øverby

    Abstract: This paper presents a novel construction of $(n,k,d=n-1)$ access-optimal regenerating codes for an arbitrary sub-packetization level $α$ for exact repair of any systematic node. We refer to these codes as general sub-packetized because we provide an algorithm for constructing codes for any $α$ less than or equal to $r^{\lceil \frac{k}{r} \rceil}$ where $\frac{k}{r}$ is not necessarily an integer.… ▽ More

    Submitted 14 July, 2016; originally announced July 2016.

    Journal ref: IEEE Communications Letters, Vol. 20, No. 7, July 2016

  35. Coded Packet Transport for Optical Packet/Burst Switched Networks

    Authors: Katina Kralevska, Harald Oeverby, Danilo Gligoroski

    Abstract: This paper presents the Coded Packet Transport (CPT) scheme, a novel transport mechanism for Optical Packet/Burst Switched (OPS/OBS) networks. The CPT scheme exploits the combined benefits of source coding by erasure codes and path diversity to provide efficient means for recovering from packet loss due to contentions and path failures, and to provide non-cryptographic secrecy. In the CPT scheme,… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: IEEE Globecom 2015

    Journal ref: Published in 2015 IEEE Global Communications Conference (GLOBECOM)

  36. Minimal Header Overhead for Random Linear Network Coding

    Authors: Danilo Gligoroski, Katina Kralevska, Harald Oeverby

    Abstract: The energy used to transmit a single bit of data between the devices in wireless networks is equal to the energy for performing hundreds of instructions in those devices. Thus the reduction of the data necessary to transmit, while kee** the same functionality of the employed algorithms is a formidable and challenging scientific task. We describe an algorithm called Small Set of Allowed Coefficie… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

    Comments: IEEE International Conference on Communication Workshop (ICCW), 2015

    Journal ref: Published in 2015 IEEE International Conference on Communication Workshop (ICCW)

  37. Balanced XOR-ed Coding

    Authors: Katina Kralevska, Danilo Gligoroski, Harald Oeverby

    Abstract: This paper concerns with the construction of codes over $GF(2)$ which reach the max-flow for single source multicast acyclic networks with delay. The coding is always a bitwise XOR of packets with equal lengths, and is based on highly symmetrical and balanced designs. For certain setups and parameters, our approach offers additional plausible security properties: an adversary needs to eavesdrop at… ▽ More

    Submitted 23 January, 2016; originally announced January 2016.

    Comments: Advances in Communication Networking Volume 8115 of the series Lecture Notes in Computer Science pp 161-172

    Journal ref: Lecture Notes in Computer Science, vol. 8115, pp. 161-172, 2013