Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephan Olariu is active.

Publication


Featured researches published by Stephan Olariu.


Discrete Applied Mathematics | 2000

Upper bounds to the clique width of graphs

Bruno Courcelle; Stephan Olariu

Abstract Hierarchical decompositions of graphs are interesting for algorithmic purposes. Many NP complete problems have linear complexity on graphs with tree-decompositions of bounded width. We investigate alternate hierarchical decompositions that apply to wider classes of graphs and still enjoy good algorithmic properties. These decompositions are motivated and inspired by the study of vertex-replacement context-free graph grammars. The complexity measure of graphs associated with these decompositions is called clique width . In this paper we bound the clique width of a graph in terms of its tree width on the one hand, and of the clique width of its edge complement on the other.


ieee international conference computer and communications | 2006

Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting

Stephan Olariu; Ivan Stojmenovic

This paper investigates theoretical aspects of the uneven energy depletion phenomenon recently noticed in sink-based wireless sensor networks. We consider uniformly distributed sensors, each sending roughly the same number of reports toward the closest sink. We assume an energy consumption model governed by the relation E = d +c where d, (d ≤ tx), is the transmission distance, α ≥ 2 is the power attenuation, c is a technology-dependent positive constant, and tx is the maximum transmission range of sensors. Our results are multifold. First, we show that for α > 2, all sensors whose distance to the sink is min{tx, ( 2c α−2 ) 1 α } should transmit directly to the sink. Interestingly, this limit does not depend on the size of the network, expressed as the largest distance R from a sensor to the closest sink. Next, we prove that in order to minimize the total amount of energy spent on routing along a path originating at a sensor in a corona and ending at the sink, all the coronas must have the same width, equal to the above expression. This choice, however, leads to uneven energy depletion and to the creation of energy holes. We show that for α > 2 the uneven energy depletion can be prevented by judicious system design, resulting in balanced energy expenditure across the network. We describe an iterative process for determining the sizes of coronas. Their optimal sizes (and corresponding transmission radii) and the number of coronas depend on R. As expected, the width of coronas in energy-balanced sensor network increases. Finally, we show that for α = 2, the uneven energy depletion phenomenon is intrinsic to the system and no routing strategy can avoid the creation of an energy hole around the sink.


Archive | 2009

Vehicular Networks: From Theory to Practice

Stephan Olariu; Michele C. Weigle

In spite of their importance and potential societal impact, there is currently no comprehensive source of information about vehicular ad hoc networks (VANETs). Cohesively integrating the state of the art in this emerging field, Vehicular Networks: From Theory to Practice elucidates many issues involved in vehicular networking, including traffic engineering, human factors studies, and novel computer science research. Divided into six broad sections, the book begins with an overview of traffic engineering issues, such as traffic monitoring and traffic flow modeling. It then introduces governmental and industrial efforts in the United States and Europe to set standards and perform field tests on the feasibility of vehicular networks. After highlighting innovative applications enabled by vehicular networks, the book discusses several networking-related issues, including routing and localization. The following section focuses on simulation, which is currently the primary method for evaluating vehicular networking systems. The final part explores the extent and impact of driver distraction with in-vehicle displays. Encompassing both introductory and advanced concepts, this guide covers the various areas that impact the design of applications for vehicular networks. It details key research challenges, offers guidance on developing future standards, and supplies valuable information on existing experimental studies.


Computer Communications | 2008

Providing VANET security through active position detection

Gongjun Yan; Stephan Olariu; Michele C. Weigle

Vehicle position is one of the most valuable pieces of information in a Vehicular Ad hoc Network (VANET). The main contribution of this work is a novel approach to enhancing position security in VANETs. We achieve local security by enlisting the help of on-board radar to detect neighboring vehicles and to confirm their announced coordinates. Local security is extended to achieve global security by using preset position-based groups to create a communication network and by using a dynamic challenging mechanism to confirm remote position information. Our solution is predicated on the widely accepted assumption that the vast majority of vehicles are honest and behave responsibly. Extensive simulations confirm the quality of the proposed solution by measuring how fast compromised vehicles can be detected under various conditions.


IEEE Transactions on Parallel and Distributed Systems | 2011

Enhancing VANET Performance by Joint Adaptation of Transmission Power and Contention Window Size

Danda B. Rawat; Dimitrie C. Popescu; Gongjun Yan; Stephan Olariu

In this paper, we present a new scheme for dynamic adaptation of transmission power and contention window (CW) size to enhance performance of information dissemination in Vehicular Ad-hoc Networks (VANETs). The proposed scheme incorporates the Enhanced Distributed Channel Access (EDCA) mechanism of 802.11e and uses a joint approach to adapt transmission power at the physical (PHY) layer and quality-of-service (QoS) parameters at the medium access control (MAC) layer. In our scheme, transmission power is adapted based on the estimated local vehicle density to change the transmission range dynamically, while the CW size is adapted according to the instantaneous collision rate to enable service differentiation. In the interest of promoting timely propagation of information, VANET advisories are prioritized according to their urgency and the EDCA mechanism is employed for their dissemination. The performance of the proposed joint adaptation scheme was evaluated using the ns-2 simulator with added EDCA support. Extensive simulations have demonstrated that our scheme features significantly better throughput and lower average end-to-end delay compared with a similar scheme with static parameters.


SIAM Journal on Discrete Mathematics | 1997

Asteroidal Triple-Free Graphs

Derek G. Corneil; Stephan Olariu; Lorna Stewart

An independent set of three vertices such that each pair is joined by a path that avoids the neighborhood of the third is called an asteroidal triple. A graph is asteroidal triple-free (AT-free) if it contains no asteroidal triples. The motivation for this investigation was provided, in part, by the fact that the AT-free graphs provide a common generalization of interval, permutation, trapezoid, and cocomparability graphs. The main contribution of this work is to investigate and reveal fundamental structural properties of AT-free graphs. Specifically, we show that every connected AT-free graph contains a dominating pair, that is, a pair of vertices such that every path joining them is a dominating set in the graph. We then provide characterizations of AT-free graphs in terms of dominating pairs and minimal triangulations. Subsequently, we state and prove a decomposition theorem for AT-free graphs. An assortment of other properties of AT-free graphs is also provided. These properties generalize known structural properties of interval, permutation, trapezoid, and cocomparability graphs.


IEEE Transactions on Intelligent Transportation Systems | 2013

Security challenges in vehicular cloud computing

Gongjun Yan; Ding Wen; Stephan Olariu; Michele C. Weigle

In a series of recent papers, Prof. Olariu and his co-workers have promoted the vision of vehicular clouds (VCs), a nontrivial extension, along several dimensions, of conventional cloud computing. In a VC, underutilized vehicular resources including computing power, storage, and Internet connectivity can be shared between drivers or rented out over the Internet to various customers. Clearly, if the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to be addressed. The main contribution of this work is to identify and analyze a number of security challenges and potential privacy threats in VCs. Although security issues have received attention in cloud computing and vehicular networks, we identify security challenges that are specific to VCs, e.g., challenges of authentication of high-mobility vehicles, scalability and single interface, tangled identities and locations, and the complexity of establishing trust relationships among multiple players caused by intermittent short-range communications. Additionally, we provide a security scheme that addresses several of the challenges discussed.


Mobile Networks and Applications | 2005

Training a wireless sensor network

Ashraf Wadaa; Stephan Olariu; Larry Wilson; Mohamed Eltoweissy; Kennie H. Jones

The networks considered in this paper consist of tiny energy-constrained commodity sensors massively deployed, along with one or more sink nodes providing interface to the outside world. Our contribution is to propose a scalable energy-efficient training protocol for nodes that are initially anonymous, asynchronous and unaware of their location. Our training protocol imposes a flexible and intuitive coordinate system onto the deployment area and partitions the anonymous nodes into clusters where data can be gathered from the environment and synthesized under local control. An important by-product of the training protocol is a simple and natural data fusion protocol as well as an energy-efficient protocol for routing data from clusters to the sink node. Being energy-efficient, our training protocol can be run on either a scheduled or ad-hoc basis to provide robustness and dynamic reconfiguration. We also outline a way of making the training protocol secure by using a parameterized variant of frequency hopping.


IEEE Transactions on Parallel and Distributed Systems | 2000

Randomized initialization protocols for ad hoc networks

Koji Nakano; Stephan Olariu

Ad hoc networks are self-organizing entities that are deployed on demand in support of various events including collaborative computing, multimedia classroom, disaster-relief, search-and-rescue, interactive mission planning, and law enforcement operations. One of the fundamental tasks that have to be addressed when setting up an ad hoc network (AHN, for short) is initialization. This involves assigning each of the n stations in the AHN a distinct ID number (e.g., a local IP address) in the range from 1 to n. Our main contribution is to propose efficient randomized initialization protocols for AHNs. We begin by showing that if the number n of stations is known beforehand, an n-station, single-channel AHN can be initialized with probability exceeding 1-(1/n), in en+O(/spl radic/(nlogn)) time slots, regardless of whether the AHN has collision detection capability. We then go on to show that even if n is not known in advance, an n-station, single-channel AHN with collision detection can be initialized with probability exceeding 1-(1/n), in (10n)/3+O(/spl radic/(n 1n n)) time slots. Using this protocol as a stepping stone, we then present an initialization protocol for the n-station, k-channel AHN with collision detection that terminates with probability exceeding 1-(1/n), in (10n)/(3k)+O(/spl radic/(n 1n n)/k) time slots. Finally, we look at the case where the collision detection capability is not present. Our first result in this direction is to show that the task of electing a leader in an n-station, single-channel AHN can be completed with probability exceeding 1-(1/n), in fewer than 11.37(iog n)/sup 2/+2.39 log n time slots. This leader election protocol allows us to design an initialization protocol for the n-station, single-channel AHN with no collision detection that terminates with probability exceeding 1-(1/n), in fewer than 5.67n+O(/spl radic/(n 1n n)) time slots, even if n is not known beforehand. We then discuss an initialization protocol for the n-station, k-channel AHN with no collision detection that terminates with probability exceeding 1-(1/n), in fewer than 5.67(n/k)+O(/spl radic/(n 1n n)/k) time slots, whenever k/spl les/n/((log n)/sup 3/).


ad hoc networks | 2010

Towards autonomous vehicular clouds

Mohamed Eltoweissy; Stephan Olariu; Mohamed F. Younis

The dawn of the 21st century has seen a growing interest in vehicular networking and its myriad potential applications. The initial view of practitioners and researchers was that radio-equipped vehicles could keep the drivers informed about potential safety risks and increase their awareness of road conditions. The view then expanded to include access to the Internet and associated services. This position paper proposes and promotes a novel and more comprehensive vision namely, that advances in vehicular networks, embedded devices, and cloud computing will enable the formation of autonomous clouds of vehicular computing, communication, sensing, power and physical resources. Hence, we coin the term, Autonomous Vehicular Clouds (AVCs). A key features distinguishing AVCs from conventional cloud computing is that mobile AVC resources can be pooled dynamically to serve authorized users and to enable autonomy in real-time service sharing and management on terrestrial, aerial, or aquatic pathways or theatres of operations. In addition to general-purpose AVCs, we also envision the emergence of specialized AVCs such as mobile analytics laboratories. Furthermore, we envision that the integration of AVCs with ubiquitous smart infrastructures including intelligent transportation systems, smart cities, and smart electric power grids, will have an enormous societal impact enabling ubiquitous utility cyber-physical services at the right place, right time, and with right-sized resources.

Collaboration


Dive into the Stephan Olariu's collaboration.

Top Co-Authors

Avatar

James L. Schwing

Central Washington University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Larry Wilson

Old Dominion University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rong Lin

State University of New York System

View shared research outputs
Top Co-Authors

Avatar

Shaharuddin Salleh

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Gongjun Yan

Indiana University Kokomo

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge