scispace - formally typeset
Search or ask a question
Author

Bernard Cousin

Bio: Bernard Cousin is an academic researcher from University of Rennes. The author has contributed to research in topics: Multicast & Source-specific multicast. The author has an hindex of 20, co-authored 136 publications receiving 1239 citations. Previous affiliations of Bernard Cousin include Institut de Recherche en Informatique et Systèmes Aléatoires & University of Rennes 1.


Papers
More filters
Proceedings ArticleDOI
12 Nov 2014
TL;DR: The proposed heuristic aims to compute the transmit power level of the network BSs and associate users with these BSs in a way that jointly minimizes the total network power and thetotal network delay.
Abstract: In this paper, we formulate an optimization problem that jointly minimizes the network power consumption and transmission delay in broadband wireless networks. Power saving is achieved by adjusting the operation mode of the network Base Stations (BSs) from high transmit power levels to low transmit levels or switched-off. Minimizing the transmission delay is achieved by selecting the best user association with the BSs. We study the case of a realistic Long Term Evolution (LTE) Network where the challenge is the high computational complexity necessary to obtain the optimal solution. Therefore, we propose a simulated annealing based heuristic algorithm for the power-delay minimization problem. The proposed heuristic aims to compute the transmit power level of the network BSs and associate users with these BSs in a way that jointly minimizes the total network power and the total network delay. The simulation results show that the proposed algorithm has a low computational complexity which makes it advantageous compared with the optimal scheme. Moreover, the heuristic algorithm performs close to optimally and outperforms the existing approaches in realistic 4G deployments.

8 citations

Proceedings ArticleDOI
01 Dec 2014
TL;DR: Results show that the proposed RWTM (Receive Window Tuning Method) considerably improves the QoE; it improves the video stability, the fidelity to optimal video quality level selection and the convergence speed to the optimal videoquality level.
Abstract: In this paper, we describe a new method, called RWTM (Receive Window Tuning Method) that shapes HTTP adaptive streams. It employs the flow control in the gateway to improve the quality of experience (QoE) of users. Our use case is when two HTTP Adaptive streaming clients are competing for bandwidth in the same home network. Results show that our proposed method considerably improves the QoE; it improves the video stability, the fidelity to optimal video quality level selection and the convergence speed to the optimal video quality level.

8 citations

Journal ArticleDOI
TL;DR: RMQS-ua as discussed by the authors is a multipath routing protocol based on link quality and stability in urban areas, which is designed for an urban area that includes shadowing effect and background noise which deteriorates the link quality.

8 citations

Proceedings ArticleDOI
11 May 2015
TL;DR: Simulation results show that the proposed technique improves system capacity, and increases throughput fairness in comparison with reuse-1 model, FFR and SFR, and it does not require any cooperation between base stations of the LTE network.
Abstract: One major concern for operators of Long Term Evolution (LTE) networks is mitigating inter-cell interference problems. Inter-Cell Interference Coordination (ICIC) techniques are proposed to reduce performance degradation and to maximize system capacity. It is a joint resource allocation and power allocation problem that aims at controlling the trade-off between resource efficiency and user fairness. Traditional interference mitigation techniques are Fractional Frequency Reuse (FFR) and Soft Frequency Reuse (SFR). FFR statically divides the available spectrum into reuse-1 and reuse-3 portions in order to protect cell-edge users, while SFR reduces downlink transmission power allocated for cell-center resources to protect vulnerable users in the neighboring cells. However, these static techniques are not adapted to non-uniform user distribution scenarios, and they do not provide guarantees on throughput fairness between user equipments. In this paper, we introduce a non-cooperative dynamic ICIC technique that dynamically adjusts resource block allocation according to user demands in each zone. We investigate the impact of this technique on throughput distribution and user fairness under non-uniform user distributions, using an LTE downlink system level simulator. Simulation results show that the proposed technique improves system capacity, and increases throughput fairness in comparison with reuse-1 model, FFR and SFR. It does not require any cooperation between base stations of the LTE network.

8 citations

Proceedings ArticleDOI
10 Oct 2010
TL;DR: Two ILP formulations for a novel monitoring cost model that apply for both passive and active monitoring are come up with to jointly minimize the monitor location cost and the anomaly detection cost, thereby obtaining a monitoring solution that minimizes the total monitoring cost.
Abstract: Achieving cost-effective systems for network performance monitoring has been the subject of many research works over the last few years. Most of them adopt a two-step approach. The first step assigns optimal locations to monitors, whereas the second step selects a minimal set of paths to be monitored. However, such an approach does not consider the trade-off between the optimization objectives of each step, and hence may lead to sub-optimal usage of network resources and biased measurements. In this paper, we propose to evaluate and reduce this trade-off. Toward this end, we come up with two ILP formulations for a novel monitoring cost model that apply for both passive and active monitoring. The aim is to jointly minimize the monitor location cost and the anomaly detection cost, thereby obtaining a monitoring solution that minimizes the total monitoring cost. Simulation results illustrate the interplay between the optimization objectives and evaluate the quality of the obtained monitoring solution.

8 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: To support bursty traffic on the Internet (and especially WWW) efficiently, optical burst switching (OBS) is proposed as a way to streamline both protocols and hardware in building the future gener...
Abstract: To support bursty traffic on the Internet (and especially WWW) efficiently, optical burst switching (OBS) is proposed as a way to streamline both protocols and hardware in building the future gener...

674 citations

Book
01 Dec 1981

609 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on RA in HetNets for 5G communications is provided and two potential structures for 6G communications are provided, such as a learning-based RA structure and a control- based RA structure.
Abstract: In the fifth-generation (5G) mobile communication system, various service requirements of different communication environments are expected to be satisfied. As a new evolution network structure, heterogeneous network (HetNet) has been studied in recent years. Compared with homogeneous networks, HetNets can increase the opportunity in the spatial resource reuse and improve users’ quality of service by developing small cells into the coverage of macrocells. Since there is mutual interference among different users and the limited spectrum resource in HetNets, however, efficient resource allocation (RA) algorithms are vitally important to reduce the mutual interference and achieve spectrum sharing. In this article, we provide a comprehensive survey on RA in HetNets for 5G communications. Specifically, we first introduce the definition and different network scenarios of HetNets. Second, RA models are discussed. Then, we present a classification to analyze current RA algorithms for the existing works. Finally, some challenging issues and future research trends are discussed. Accordingly, we provide two potential structures for 6G communications to solve the RA problems of the next-generation HetNets, such as a learning-based RA structure and a control-based RA structure. The goal of this article is to provide important information on HetNets, which could be used to guide the development of more efficient techniques in this research area.

321 citations

Posted Content
TL;DR: In this article, the authors provide a comprehensive tutorial on the main concepts of machine learning, in general, and artificial neural networks (ANNs), in particular, and their potential applications in wireless communications.
Abstract: Next-generation wireless networks must support ultra-reliable, low-latency communication and intelligently manage a massive number of Internet of Things (IoT) devices in real-time, within a highly dynamic environment. This need for stringent communication quality-of-service (QoS) requirements as well as mobile edge and core intelligence can only be realized by integrating fundamental notions of artificial intelligence (AI) and machine learning across the wireless infrastructure and end-user devices. In this context, this paper provides a comprehensive tutorial that introduces the main concepts of machine learning, in general, and artificial neural networks (ANNs), in particular, and their potential applications in wireless communications. For this purpose, we present a comprehensive overview on a number of key types of neural networks that include feed-forward, recurrent, spiking, and deep neural networks. For each type of neural network, we present the basic architecture and training procedure, as well as the associated challenges and opportunities. Then, we provide an in-depth overview on the variety of wireless communication problems that can be addressed using ANNs, ranging from communication using unmanned aerial vehicles to virtual reality and edge caching.For each individual application, we present the main motivation for using ANNs along with the associated challenges while also providing a detailed example for a use case scenario and outlining future works that can be addressed using ANNs. In a nutshell, this article constitutes one of the first holistic tutorials on the development of machine learning techniques tailored to the needs of future wireless networks.

265 citations