- Image and Video Quality Assessment
- IoT Networks and Protocols
- Advanced Data Compression Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Network Traffic and Congestion Control
- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- IoT and Edge/Fog Computing
- Distributed Sensor Networks and Detection Algorithms
- Video Coding and Compression Technologies
- Advanced Queuing Theory Analysis
- Wireless Networks and Protocols
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Opportunistic and Delay-Tolerant Networks
- Peer-to-Peer Network Technologies
- Speech Recognition and Synthesis
- Target Tracking and Data Fusion in Sensor Networks
- Context-Aware Activity Recognition Systems
- Indoor and Outdoor Localization Technologies
- Cellular Automata and Applications
- Algorithms and Data Compression
- Multimedia Communication and Technology
- Bluetooth and Wireless Communication Technologies
- Wireless Body Area Networks
University of Padua
2015-2019
Telenor (Norway)
2017
The Internet of Things (IoT) is rapidly spreading, reaching a multitude different domains, including personal health care, environmental monitoring, home automation, smart mobility, and Industry 4.0. As consequence, more IoT devices are being deployed in variety public private environments, progressively becoming common objects everyday life. It hence apparent that, such scenario, cybersecurity becomes critical to avoid threats like leakage sensible information, denial service (DoS) attacks,...
Internet of Things devices communicate using a variety protocols, differing in many aspects, with the channel access method being one most important. Most transmission technologies explicitly designed for IoT and machine-to-machine communication use either an ALOHA-based or some type Listen Before Talk strategy, based on carrier sensing. In this article, we provide comparative overview uncoordinated methods technologies, namely schemes, relation to ETSI FCC regulatory frameworks....
The rapid growth of video traffic in cellular networks is a crucial issue to be addressed by mobile operators. An emerging and promising trend this regard the development solutions that aim at maximizing quality experience (QoE) end users. However, predicting QoE perceived users different conditions remains major challenge. In paper, we propose machine learning approach support QoE-based admission control resource management algorithms. More specifically, develop multi-stage system combines...
Building a general architecture for the Internet of Things (IoT) is very complex task, exacerbated by extremely large variety devices, link layer technologies, and services that may be involved in such system. In this paper, we identify main blocks generic IoT architecture, des
Monitoring applications are gaining a lot of momentum in the Internet Things (IoT), bolstered by availability cheap and easy-to-install sensors. Often, random access schemes preferred to coordinated ones because they more flexible have no synchronization overhead. The possibility collisions with other packets limited energy battery-powered nodes demand strategies reduce number transmissions. This, however, is counterbalanced need accurately monitor process interest, which requires sufficient...
The proliferation of heterogeneous data services and applications, with different communication requirements, has led to the design Quality Service (QoS) mechanisms provide service differentiation and, possibly, performance guarantee a range classes applications. In this paper, we propose data-driven media delivery framework for optimization multi-user wireless networks that differs from classic approaches in following aspects. First, it goes beyond QoS paradigm embrace Experience (QoE)...
The availability of cheap and easy-to-install sensors is bolstering the development monitoring applications in IoT scenarios. Although there a need for periodical measurements tracked signals to guarantee an accurate representation at receiver, choosing appropriate duration reporting window not trivial. In fact, energy restrictions many devices interference caused by other users call longer windows. However, this causes higher reconstruction error due lower sampling resolution, which may be...
Machine-To-Machine (M2M) traffic is expected to significantly increase in future wireless networks. In order study the effect of this type current and networks, there need for efficient effective models. The literature offers different models, but not general consensus on which them can better represent realistic M2M sources. paper, we contribute shed light aspect two ways: first, analyze some real-world data traces, provided by one biggest operators Europe, have a idea characteristics...
Machine-to-machine (M2M) traffic is variegate and finding a model which can cover wide range of M2M sources challenging. In this paper we address challenge by proposing an extension legacy renewal processes for modeling sources. To end, first describe the derive some performance parameters, as overall packet arrival distribution its moments. We then discuss packetgeneration process consider counting variable in atime interval, give mean Laplace transformof z-transform variable. Successively,...
Since video traffic has become the major source of generated mobile worldwide, there been a strong interest in new techniques to improve Quality Experience (QoE) users generating this traffic. Several efforts have made propose adaptive streaming algorithms on client side be able adjust quality downloaded segments current network conditions, taking advantage Dynamic Adaptive Streaming over HTTP (DASH) standard. This study uses knowledge pre-fetching proxy cache, placed at network's edge,...
In future cellular networks, the ability to predict network parameters such as cell load will be a key enabler of several proposed adaptation and resource allocation techniques. this study, we consider joint exploitation spatio-temporal data improve prediction accuracy standard regression methods. We test methods from literature on publicly available dataset document advantages approach.
ALOHA-based medium access control (MAC) protocols are very popular in long-range wireless networks, where carrier-sense mechanisms not much effective. In particular, pure or slotted ALOHA is used many technologies designed to support Machine-Type Communication (MTC), despite the well-known scalability limits of protocol. To mitigate problem, some MTC feature multiple transmission rates and, more importantly, advanced receivers that can detect modulation scheme a packet on fly, without need...
In this paper we consider a monitoring application where the process of interest is time integral measurements provided by some sensors, e.g., volume fluid crossing pipe, total amount fertilizer/insecticide dispersed onto certain cultivation area, and so on. context, tradeoff arises between accuracy obtained in energy consumption for transmission sensors' measurements, which critical since many devices are expected to be battery powered. scenario, propose an adaptive sampling random access...
The interest in asynchronous ALOHA protocols has recently been revived by the diffusion of low-power, long-range communication technologies proposed for Machine-to-Machine scenarios. This work focuses on ad hoc sensor networks where nodes communicate pairs generating mutual interference, and tackles fundamental yet still open question how to set transmission rate so as maximise throughput. Elaborating a previous stochastic geometry model, we consider SINR decoding threshold that depends...