scispace - formally typeset
Search or ask a question
Institution

Huawei

CompanyShenzhen, China
About: Huawei is a company organization based out in Shenzhen, China. It is known for research contribution in the topics: Terminal (electronics) & Signal. The organization has 41417 authors who have published 44698 publications receiving 343496 citations. The organization is also known as: Huawei Technologies & Huawei Technologies Co., Ltd..


Papers
More filters
Patent
Bo Lei1, Youqian Xiao1, Zheng Zhao1, Bo Liu1, Ou Jin1 
05 Mar 2008
TL;DR: In this paper, a system for automatically monitoring and managing network performance is presented, which consists of a mobile phone, adapted to have a monitoring function for providing monitoring information and communications regarding monitoring and management of network performance; and a mobile communication network, providing mobile communication services to the mobile phone.
Abstract: A system for automatically monitoring and managing network performance. The system comprises a mobile phone, adapted to have a monitoring function for providing monitoring information and communications regarding monitoring and management of network performance; and a mobile communication network, providing mobile communication services to the mobile phone. The mobile communication network comprises a Mobile Measurement Agent (MMA), adapted to control performing of the monitoring function of the mobile phone, and to communicate with the mobile phone; a data server, adapted to store information comprising the monitoring information; and a component for processing the information stored in the data server, wherein a processing result of the information is used in performance monitoring and management of the mobile communication network.

82 citations

Journal ArticleDOI
TL;DR: This work considers a multilayer architecture, in which the optical layer can be realized either with a Wavelength Division Multiplexing (WDM) network or an Elastic Optical Network (EON) network, and focuses on the design and operation stages.
Abstract: A detailed survey of approaches reducing energy consumption of core networks is presented in this paper. We consider a multilayer architecture, in which the optical layer can be realized either with a Wavelength Division Multiplexing (WDM) network or an Elastic Optical Network (EON). We focus on the design and operation stages, i.e., deciding which devices to install in the network during the former step, and choosing which devices to put into sleep mode during the latter one. A taxonomy for classifying the surveyed approaches is provided in order to compare the works covering energy efficiency in core networks (in terms of both optimal formulations and heuristic solutions). Moreover, our work provides a global view of the traffic assumptions, the topologies, and the power consumption models in the literature. The need of further investigations in this field clearly emerges. We envision future works targeting: (1) more effective standardization efforts to practically realize sleep modes; (2) the evaluation of the impact of sleep mode on the device lifetime; (3) the extensive adoption of new paradigms like Software Defined Networking (SDN) and EON; and (4) a radical improvement in the testbed implementations.

81 citations

Proceedings ArticleDOI
09 Jan 2010
TL;DR: This paper investigates how a CR user senses multiple channels and determine the optimal transmission duration and power allocation and finds a closed-form solution for transmission duration for chosen channels.
Abstract: Cognitive radio (CR) networks are designed to utilize the licensed spectrum when it is not llsed by the primary (licensed) users. In this paper, we investigate how a CR user senses multiple channels and determine the optimal transmission duration and power allocation. When performing optimization, we take energy efficiency, throughput, and interference with the primary users into consideration and find a closed-form solution for transmission duration for chosen channels. It is shown that the proposed optimization approach significantly improves energy efficiency and throughput of CR networks.

81 citations

Proceedings ArticleDOI
13 Apr 2015
TL;DR: This work devise a centrality-based greedy algorithm and assess its validity by comparing it with the ILP optimal solution on a real data set, and analyze the scalability of the heuristic by applying it to larger random networks of up to 100 nodes, showing the network structure and the costs strongly influence time performance.
Abstract: Network Functions Virtualization (NFV) is transforming how networks are architected and network services delivered. The network is more flexible and adaptable, it can scale with traffic demands. To manage video traffic in the network, or get protection from cyber-attacks, Deep Packet Inspection is increasingly deployed at specific locations in the network. The virtual Deep Packet Inspection (vDPI) engines can be dynamically deployed as software on commodity servers within emerging NFV infrastructures. For a network operator, deploying a set of vDPIs over the network is a matter of finding the appropriate placement that meets the traffic management or cyber-security targets (such as the number of inspected flows) and operational cost constraints (license fees, network efficiency or power consumption). In this work, we formulate the vDPI placement problem as a cost minimization problem. The cost captures the different objectives the operator is pursuing. A placement of vDPIs on the network nodes realizes a trade-off between these possibly conflicting goals. We cast the problem as a multi-commodity flow problem and solve it as an Integer Linear Program (ILP). We then devise a centrality-based greedy algorithm and assess its validity by comparing it with the ILP optimal solution on a real data set (GEANT network with 22 nodes and real traffic matrix). We further analyze the scalability of the heuristic by applying it to larger random networks of up to 100 nodes. The results show the network structure and the costs strongly influence time performance. They also show that after a size limit (between 40 to 80 nodes in our case), the execution time increases exponentially due to combinatorial issues. Finally, they demonstrate that the heuristic well approximate the optimal on smaller problem instances.

81 citations

Journal ArticleDOI
TL;DR: In this paper, an adaptive secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single antenna receiver, was proposed to deal with beamformer quantization errors and unknown eavesdropper channel characteristics.
Abstract: We present an optimized secure multi-antenna transmission approach based on artificial-noise-aided beamforming, with limited feedback from a desired single-antenna receiver. To deal with beamformer quantization errors as well as unknown eavesdropper channel characteristics, our approach is aimed at maximizing throughput under dual performance constraints—a connection outage constraint on the desired communication channel and a secrecy outage constraint to guard against eavesdropping. We propose an adaptive transmission strategy that judiciously selects the wiretap coding parameters, as well as the power allocation between the artificial noise and the information signal. This optimized solution reveals several important differences with respect to solutions designed previously under the assumption of perfect feedback. We also investigate the problem of how to most efficiently utilize the feedback bits. The simulation results indicate that a good design strategy is to use approximately 20% of these bits to quantize the channel gain information, with the remainder to quantize the channel direction, and this allocation is largely insensitive to the secrecy outage constraint imposed. In addition, we find that 8 feedback bits per transmit antenna is sufficient to achieve approximately 90% of the throughput attainable with perfect feedback.

81 citations


Authors

Showing all 41483 results

NameH-indexPapersCitations
Yu Huang136149289209
Xiaoou Tang13255394555
Xiaogang Wang12845273740
Shaobin Wang12687252463
Qiang Yang112111771540
Wei Lu111197361911
Xuemin Shen106122144959
Li Chen105173255996
Lajos Hanzo101204054380
Luca Benini101145347862
Lei Liu98204151163
Tao Wang97272055280
Mohamed-Slim Alouini96178862290
Qi Tian96103041010
Merouane Debbah9665241140
Network Information
Related Institutions (5)
Alcatel-Lucent
53.3K papers, 1.4M citations

90% related

Bell Labs
59.8K papers, 3.1M citations

88% related

Hewlett-Packard
59.8K papers, 1.4M citations

87% related

Microsoft
86.9K papers, 4.1M citations

87% related

Intel
68.8K papers, 1.6M citations

87% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202319
202266
20212,069
20203,277
20194,570
20184,476