IEEE.org  |  IEEE Xplore Digital Library  |  IEEE Communications Society  |  IEEE Spectrum Online  |  More IEEE Sites                  
       HOME             COMMITTEE         CALL FOR SUBMISSIONS           AUTHORS          PROGRAM        REGISTRATION        TRAVEL          PATRONS
       
   
Tutorial T1: Road to 5G Wireless Systems: Challenges Ahead vis-à-vis Progress Made
Date & Time: December 15th 2015, 9.30 a.m.-1.00 p.m.
Speakers: Dr. Amitava Mukherjee, IBM India Private Limited, Kolkata, India and Prof. Debashis Saha, Indian Institute of Management-Calcutta (IIMC), Joka, Kolkata, India.

Tutorial T2: Large-Scale Optimization: Meta-heuristics and Decomposition Techniques
Date & Time: December 15th 2015, 9.30 a.m.-1.00 p.m.
Speaker: Prof. Brigitte Jaumard, Concordia University, Canada.


Tutorial T3: Social Media - The Good, Bad and Ugly: A Tutorial on Computational Social Network Analysis
Date & Time: December 15th 2015, 2.00-5.30 p.m.
Speaker: Prof. Nitin Agarwal, University of Arkansas at Little Rock, USA.


Tutorial T4: Stochastic Geometry for the Analysis of Cellular Networks
Date & Time: December 15th 2015, 2.00-5.30 p.m
Speaker: Prof. Radha Krishna Ganti, IIT Madras, India.


Tea Break (TB1): 11.00 a.m.-11.15 a.m.
Tea Break (TB2): 3.15 p.m.-3.30 p.m.

 

Tutorial T1: Road to 5G Wireless Systems: Challenges Ahead vis-à-vis Progress Made

Abstract: The underlying theme of this half-day tutorial is twofold: (i) to explore imminent as well as prospective challenges opened up by the evolution and revolution happening in the domain of wireless mobile communication which is poised to enter into its fifth generation (5G), and (ii) to weigh the advancements made till date towards B4G/5G against those challenges, satisfying all the new emerging requirements.
Today’s world experiences mass deployment of a plethora of wireless and mobile technologies, such as GSM, CDMA, UMTS, cdma2000, IEEE 802.11x (WLAN), IEEE 802.16x (WiMAX), LTE-4G etc. Worldwide almost 6 billion people own mobile phones ranging from 1st generation (1G) to 4th generation (4G). The numbers are increasing every day, and very soon we shall reach a “disruptive” situation, where (a) diverse, bandwidth-hungry services appear and vanish pervasively, (b) augmented reality and real-time interaction will be common as devices are embedded into areas of social life and industry (cyber-physicalsocial systems), (c) devices, particularly smartphones, become even more powerful to become gateways (for other devices) to access services from the cloud, (d) tiny devices access the Internet (Internet of Things), and M2M communication uses broadband services, and (e) per-user storage and processing requirements will further increase. Very soon we will encounter convergence of multiple mobile devices (instead of just mobile phone), 1000 times increase in mobile data traffic volume, 100 times increase in number of connected devices, 100 times rise in typical end user data rate, and at least 10 times increase in device/network lifetime (10x battery).
With this background, the tutorial begins with a historical perspective of the growth of the cellular wireless communication from now-defunct 1G through current 4G in terms of enabling technologies, architectures followed, compliant standards, services offered and capabilities achieved. This exercise helps us understand the kind of services users will expect from the 5G deemed to be rolled out from 2020.
Presumably, 5G will have five major characteristics: (a) “Amazingly fast” – high data-rates for mobile broadband users (nearly 100 times higher than typical user data rates available today), (b) “Great service in a crowd” – broadband experience even in the most crowded areas and conditions (about 1000 times higher mobile data volume per area), (c) “Best experience follows you” – end-users on the move with high levels of quality of experience (QoE), (d) “Super real-time and reliable connections” – new applications and use cases with very strict requirements on latency and reliability, and (e) “Ubiquitous things communicating” – efficient handling of a very large number of devices (10 times to 100 times higher number of connected devices including sensors and IoT) with widely varying capabilities. In order to accommodate these emerging demands, next generation 5G systems and applications need to be further evolved based on fundamental and innovative rethinking of the conventional mobile and wireless communications and technologies. To be honest, a few paradigm shifts are required to deal with challenges on explosively growing requirements in user-centric mobile applications (instead of traditional carrier-centric), and truly personal communications (instead of traditional cellular mobile services).
Towards this end, the tutorial primarily focusses on the following aspects:
• Device-Centric Architectures: the cell-centric architecture would evolve into a device-centric one: a given device (human or machine) should be able to communicate by exchanging multiple information flows through several possible sets of heterogeneous nodes. This meant that the set of network nodes providing connectivity to a given device and the functions of these nodes in a particular communication session should be tailored to that specific device and session. The concepts of uplink/downlink and control/data channel should be rethought. The architectural changes are often the drivers of major technological discontinuities that might have a major influence on the development of 5G.
• Millimeter (Mm) Wave Communication: It appears that doubling the current cellular bandwidth is the best case scenario at microwave frequencies. Alternatively, there is an enormous amount of spectrum at mmWave frequencies ranging from 3 to 300 GHz. The several tens of gigahertz could become available for 5G, offering well over an order of magnitude increase over what is available at present. Several tens of gigahertz could become available for 5G, offering well over an order of magnitude increase over what is available at present.
• Massive MIMO: The adoption of massive MIMO for 5G could represent a major leap with respect to today’s state of the art in system and component design. The massive MIMO proponents should further work on solving the challenges emphasized above and showing realistic performance improvements by means of theoretical studies, simulation campaigns, and testbed experiments.
• Smarter Devices: Earlier generations of cellular systems were built on the design premise of having complete control at the infrastructure side. Some of the possibilities can be unleashed by allowing the devices to play a more active role and then how 5G’s design should account for an increase in device smartness.
• Native Support for M2M Communication: Wireless communication is becoming a commodity, just like electricity or water. This commoditization, in turn, is giving rise to a large class of emerging services with new types of requirements. Few examples: A massive number of connected devices: Examples include metering, sensors, smart grid components, and other enablers of services targeting wide area coverage Very high link reliability: Examples are critical control, safety, or production systems
Low latency and real-time operation: An example is vehicle-to-X connectivity, whereby traffic safety can be improved through the timely delivery of critical messages (e.g., alert and control).
The native support of M2M in 5G requires radical changes at both the node and architecture levels. Major research work remains to be done to come up with concrete and interworking solutions enabling M2M inside 5G systems.
Accordingly, the tutorial addresses the systems, architectures, protocols, infrastructure, standards, policies, and research efforts required for realizing the 5G services as envisioned in the literature. Finally, it concludes with an overview of the available candidate technologies plus the current major initiatives towards implementing 5G in near future at least in experimental level.

Short Biographies: Dr. Amitava Mukherjee is Senior Manager of IBM India from Oct 2002. And has over 33 years of experience in leading and managing competencies in IBM GBS India, and Application/Implementation and R&D projects for Domestic/International Clients. Amitava had been on sabbatical from IBM India (Jan 2003-Mar 2005), and visited University of New South Wales, Sydney as visiting Professor (2003-2004) and Royal Institute of Technology, Stockholm as Senior Researcher (2004-2005). He was Senior and Principal Consultant at PwC India from May 1995 to Jun 1999 and Jul 1999 to Sep 2002 respectively. From 1983 to 1995, he was with the Department of Electronics and Telecommunication Engineering, Jadavpur University, Calcutta, India in research and teaching positions. His contribution in research include the areas of nano communication network, 5G wireless network, controllability of complex network, cognitive radio network, wireless communication, sensor network, pervasive computing, mobile computing and communication, optical networks, combinatorial optimization and distributed system. He has around 150 published papers in journals and conference proceedings of international repute, three patents, five books and two book chapters in pervasive computing, wireless communication, societal engineering, nano communication network and controllability of complex network respectively. He is a Senior Member of IEEE Communications Society and member of ACM. He is serving currently as a member of 1906.1 IEEE Standard WG on Nano networking, the emerging field of research. He was the Vice-Chairman of IEEE Communication Society, Calcutta and a member of ACM. Amitava was one of experts of Program Analysis Task Force (PATF) of IEEE Communication Society, Head Quarter, New York. Amitava had received Ph. D degree in Computer Science from Jadavpur University, Kolkata, India.

Prof. Debashis Saha received the B.E. (Hons) degree from Jadavpur University, Kolkata, India, and the M.Tech. and Ph. D. degrees from the Indian Institute of Technology (IIT), Kharagpur, all in electronics and communication engineering. He is currently a Full Professor with the MIS and Computer Science Group, Indian Institute of Management (IIM) Calcutta. Previously, he was with Computer Science & Engg. (CSE) Dept., Jadavpur University, Kolkata, India. His research interests include pervasive communication and computing, wireless networking and mobile computing, WDM optical networking, e-commerce, ICT for development, and network economics. He has co-supervised 14 doctoral theses and published about 270 research papers in various conferences and journals, and directed four funded projects on networking. He has coauthored several book chapters, a monograph and five books including Networking Infrastructure for Pervasive Computing: Enabling Technologies and Systems (Norwell, MA: Kluwer, 2002) and Location Management and Routing in Mobile Wireless Networks (Boston, MA: Artech House, 2003). He was the Co-Editor-in-Chief of the International Journal of Business Data Communications & Networking (IJBDCN) [2009-2013], had served on the editorial board of international journals, was a member of the organizing/program committee of several international conferences, and is a regular reviewer of several international journals. Dr. Saha is the recipient of the prestigious Career Award for Young Teachers from AICTE, Government of India, and is a SERC Visiting Fellow with the Department of Science and Technology (DST), Government of India. He is a Fellow of West Bengal Academy of Science and Technology (WAST), Senior Life Member of Computer Society of India, Senior Member of IEEE, and a member of ACM, a member of AIS, a member of the International Federation of Information Processing (IFIP) Working Group’s 6.8 and 6.10. He was the co-Vice-Chair of IEEE Calcutta Section (2010-2011) and was the founder chair of Calcutta Chapter of IEEE Communications Society (2003-2008), which won the ‘Best Chapter of the World’ award in 2008.
 
Tutorial T1: Large-Scale Optimization: Meta-heuristics and Decomposition Techniques

Abstract: Large scale optimization techniques offer powerful tools in order to address the complex system-wide design and operations problems arising in several facets of communication networks. The last several decades have seen an explosion in the application breadth and efficiency of optimization algorithms, due to a combination of new developments in computing technologies, and the optimization theory that serves in as a foundation for these algorithms.
Many real-world optimization applications require very large mathematical programming models for which classical optimization techniques require too much time or memory to solve to optimality or near to optimality, due to a prohibitively large number of variables or constraints. In such cases, we can attempt to exploit the characteristics of the structure of those mathematical programming problems by using large scale optimization methods.
The objective of the tutorial is to describe the key ideas of some of those methods in an accessible manner, while presenting some of the recent successful applications related to the optimization of optical networks. 
We will review one of the most popular decomposition techniques, namely column generation, also called Dantzig-Wolfe decomposition as well as an overview and a conceptual comparison of meta-heuristics (Tabu search, Simulated Annealing, Scatter Search, Ants Colony, etc).
Among the applications that will be presented, we will discuss the design of a survivable virtual/VPN topology over a service provider network, as well as how to apply decomposition techniques in order to solve the classical routing and wavelength assignment (RWA) and routing and spectrum assignment (RSA) problems in order to attempt to solve large data sets. We will next illustrate how the meta-heuristics can help to either solve directly those problems, or enhance the decomposition techniques in order to get approximate solutions with some information of their accuracy.

Short Biography: Prof. Brigitte Jaumard holds a Concordia University Research Chair, Tier 1, on the Optimization of Communication Networks in the Computer Science and Software Engineering (CSE) Department at Concordia University. Her research focuses on mathematical modeling and algorithm design for large-scale optimization problems arising in communication networks, transportation networks and artificial intelligence. Recent studies include the design of the most efficient algorithms for the design and dimensioning of logical survivable topologies against single or multiple failures (e.g., survivable VPN topology over a service provider network). Other recent studies deal with dimensioning, provisioning and scheduling algorithms in optical grids or clouds, in broadband wireless networks and in passive optical networks. In Artificial Intelligence, contributions include the development of efficient optimization algorithms for probabilistic logic (reasoning under uncertainty) and for automated mechanical design in social networks (design of trust estimator tools). In transportation, her recent contributions include new algorithms for freight train scheduling and locomotive assignment subject to energy minimization. B. Jaumard has published over 300 papers in international journals in Operations Research and in Telecommunications.



Tutorial T3: Social Media - The Good, Bad and Ugly: A Tutorial on Computational Social Network Analysis

Abstract: Social media platforms have profoundly impacted the behavior and the lifestyle of humans revealing novel sociotechnical behaviors, e.g., citizen journalism, “tweetcasting”, hashtag activism, crowdsourcing, crowd sensing, flash mobs, etc. Furthermore, rapid advancements in the information technology, including smart handheld/mobile devices and increased bandwidths by wireless and cellular service providers have only accelerated the evolution of such sociotechnical behaviors. Although these behaviors have been widely observed, they lack scientific understanding. We examine these behaviors afforded by the social cyber systems, leveraging a truly interdisciplinary research with deep roots in social science theories and computational underpinnings. While, digital communication tools have largely been considered as positive vehicles of change, the power of social media has been harnessed by extremists and terrorist groups to spread propaganda, conduct disinformation campaigns, and influence mass thinking. The tutorial will focus on understanding and developing socio-computational models to shed insights on such deviant behaviors.

This tutorial will introduce current and state-of-the-art research trends in social computing, review key tools and methodologies, and provide helpful resources for researchers and practitioners for getting started (or getting an advanced/in-depth understanding) in this domain.

Short Biography: Dr. Nitin Agarwal (nxagarwal@ualr.edu) is the Jerry L. Maulden-Entergy Chair Professor of Information Science at the University of Arkansas at Little Rock (UALR). His research interests lie in the areas of social computing; data mining and knowledge discovery in social media; modeling social dynamics; big “social” data analytics; and privacy. Toward this direction, he has developed an interdisciplinary research program on social computing at UALR with foundational as well as applicational contributions. Foundational contributions are made to computational social network analysis; social science theories such as collective action, collective behavior, and homophily; data mining; influence, trust, and privacy; and virtual organizations. The applicational contributions include, but not limited to, event analysis, monitoring cyberthreats through social media, smart health and wellbeing, social media in learning environments, networks and communication, and socially aware mobile networks.
Dr. Agarwal’s research has been published in several venues including prestigious journals, book chapters, encyclopedia entries, conference proceedings, and 5 books. The research studies have resulted in Best Information System Publication of 2012 Award recognized by the AIS Senior Scholar Consortium, few Best Paper Awards, and several best paper nominees. In 2012, he was recognized as one of The New Influentials: 20 In Their 20s by Arkansas Business for being among creative and talented individuals who have found not only early success in their profession but also show future potential to step up as a leader. He was recognized with the University Faculty Excellence Award and College Excellence Award in Research and Creative Endeavors in 2015.
Dr. Agarwal has guest edited special issues on social computing for Elsevier Journal of Systems and Software, Oxford’s The Computer Journal, Springer’s Lecture Notes in Social Networks, IEEE Communications Magazine, Elsevier Journal of Computational Science, and IEEE Internet Computing. He is currently editing special issues on ‘social media and security’ for the Journal of Digital Forensics, Security, and Law and IGI International Journal of Interactive Communication Systems and Technologies (IJICST).
Dr. Agarwal’s research lab is supported by grants from the U.S. National Science Foundation (NSF), U.S. Office of Naval Research (ONR), U.S. Air Force Research Lab (AFRL), and U.S. Army Research Office (ARO). Agarwal has a Ph.D. in Computer Science from Arizona State University with outstanding dissertation recognition. He obtained his Bachelors of Technology from Indian Institute of Information Technology, Allahabad. For more details please visit, http://ualr.edu/nxagarwal/.
 

Tutorial T4: Stochastic geometry for the analysis of cellular networks
 
Abstract: The modelling of base station locations in a cellular network is critical in the analysis of performance metrics like coverage and rate. Current cellular networks are complex heterogeneous systems and the emerging cellular networks are becoming unplanned and decentralized. This is particularly true with the advent of picocells and femtocells. The random node locations in these networks coupled with their decentralized nature provide us with unique challenges in terms of the analysis of interference and network performance.

 Point processes are increasingly being used to model the spatial randomness in wireless networks. In this tutorial, the basic tools from stochastic geometry and point processes required for the analysis of interference in cellular networks will be introduced. Based upon these techniques, the analysis of interference in cellular networks, and multi-tier cellular networks (femtocells) will be discussed.

Short Biography: Dr. Radha Krishna Ganti is an Assistant Professor at the Indian Institute of Technology Madras, Chennai, India. He was a Postdoctoral researcher in the Wireless Networking and Communications Group at UT Austin from 2009-11. He received his B. Tech. and M. Tech. in EE from the Indian Institute of Technology, Madras, and a Masters in Applied Mathematics and a Ph.D. in EE from the University of Notre Dame in 2009. His doctoral work focused on the spatial analysis of interference networks using tools from stochastic geometry. He is a co-author of the monograph Interference in Large Wireless Networks (NOW Publishers, 2008). He received the 2014 IEEE Stephen O. Rice Prize, the 2014 IEEE Leonard G. Abraham Prize and the 2015 IEEE Communications society  young author best paper award.
 
       
     
  PROGRAM >>

TUTORIALS >>

KEYNOTES >>

INVITED TALKS >>

TECHNICAL PROGRAM >>
 
isical Infinera Dell Intel Cisco Springer alphion wipro tcs
               
          HOME   COMMITTEE    CALL FOR SUBMISSIONS   AUTHORS     PROGRAM     REGISTRATION    TRAVEL     PATRONS      NON-DISCRIMINTATION POLICY                  © 2015 IEEE Communications Society