Adam Wolisz

Adam Wolisz
Technische Universität Berlin | TUB · Department of Telecommunication Systems

About

510
Publications
77,245
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
12,908
Citations

Publications

Publications (510)
Article
Full-text available
Performance of vehicle-to-vehicle (V2V) communications depends highly on the employed scheduling approach. While centralized network schedulers offer high V2V communication reliability, their operation is conventionally restricted to areas with full cellular network coverage. In contrast, in out-of-cellular-coverage areas, comparatively inefficient...
Preprint
Full-text available
Performance of vehicle-to-vehicle (V2V) communications depends highly on the employed scheduling approach. While centralized network schedulers offer high V2V communication reliability, their operation is conventionally restricted to areas with full cellular network coverage. In contrast, in out-of-cellular-coverage areas, comparatively inefficient...
Conference Paper
Full-text available
Fog Computing allows applications to address their latency and privacy requirements while coping with bandwidth limitations of Internet service providers (ISPs). Existing research on fog systems has so far mostly taken a very high-level view on the actual fog infrastructure. In this position paper, we identify and discuss the problem of having mult...
Preprint
Fog Computing allows applications to address their latency and privacy requirements while coping with bandwidth limitations of Internet service providers (ISPs). Existing research on fog systems has so far mostly taken a very high-level view on the actual fog infrastructure. In this position paper, we identify and discuss the problem of having mult...
Preprint
Full-text available
The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio Resource Control (RRC) states, the Mobile Network Operator (MNO) specific retransmission configurations, handovers trigg...
Article
The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio Resource Control (RRC) states, the Mobile Network Operator (MNO) specific retransmission configurations, handovers trigg...
Preprint
Full-text available
In this paper, we revisit the widely known performance anomaly that results in severe network utility degradation in WiFi networks when nodes use diverse modulation and coding schemes. The proportional-fair allocation was shown to mitigate this anomaly and provide a good throughput to the stations. It can be achieved through the selection of conten...
Preprint
Full-text available
In limiting the rapid spread of highly infectious diseases like Covid-19 means to immediately identify individuals who had been in contact with a newly diagnosed infected person have proven to be important. Such potential victims can go into quarantine until tested thus constraining further spread. This note describes a concept of mobile device (e....
Preprint
Full-text available
Despite exhibiting very high theoretical data rates, in practice, the performance of LTE-U/LAA and WiFi networks is severely limited under cross-technology coexistence scenarios in the unlicensed 5GHz band. As a remedy, recent research shows the need for collaboration and coordination among co-located networks. However, enabling such collaboration...
Article
Future cities are to be not only an intelligent and green living environment but also provide human-centered public services at a lower cost. The Internet of Things (IoT) and artificial intelligence (AI) are two cornerstone technologies enabling the smart city concept, which are fusing into an organic whole in recent years. Some particular joint po...
Article
Mobile network operators (MNO) can opportunistically use the licensed bands of the primary users (PU) provided that they monitor the spectrum and stop their transmission upon detection of the PU. As deploying spectrum sensors may be prohibitively expensive, the MNO can buy spectrum sensing service from sensing helpers in its proximity. However, suc...
Preprint
Full-text available
Vehicle-to-vehicle (V2V) communications have distinct challenges that need to be taken into account when scheduling the radio resources. Although centralized schedulers (e.g., located on base stations) could be utilized to deliver high scheduling performance, they cannot be employed in case of coverage gaps. To address the issue of reliable schedul...
Article
A recent proposal known as unlicensed LTE offers cost-effective capacity extension to the cellular network operators in which LTE operators bundle the unlicensed spectrum in 5GHz UNII bands with their licensed spectrum via carrier aggregation. But, unlicensed spectrum requires coexistence among the networks operating in the same spectrum, e.g., IEE...
Data
This document reports the main experimental results obtained by applying the proposed ViFi system in another testbed, referred to as w-iLab.t I, aiming to further validate the performance improvement of ViFi when compared to a traditional fingerprinting indoor positioning system. Reference Publication: "ViFi: Virtual Fingerprinting WiFi-based Ind...
Article
Full-text available
Widespread adoption of indoor positioning systems based on WiFi fingerprinting is at present hindered by the large efforts required for measurements collection during the offline phase. Two approaches were recently proposed to address such issue: crowdsourcing and RSS radiomap prediction, based on either interpolation or propagation channel model f...
Article
Full-text available
Practical location estimation is never ideal and each location estimate is burdened with a certain level of error. In many use-case scenarios, knowing the magnitude of these errors can significantly improve the usability of the location estimates. The localization errors for different localization approaches are currently assessed using static perf...
Preprint
Full-text available
Experimentation with computer networks under realistic conditions is a necessary step in debugging, profiling and validation towards real deployments and applications. Although the definition of relevant experimentation scenarios is usually relatively straightforward, their implementation and execution are unfortunately difficult and tedious. Gener...
Conference Paper
Radio resources in vehicle-to-vehicle (V2V) communication can be scheduled either by a centralized scheduler residing in the network (e.g., a base station in case of cellular systems) or a distributed scheduler, where the resources are autonomously selected by the vehicles. The former approach yields a considerably higher resource utilization in ca...
Conference Paper
Mobile network operators can expand their capacity by aggregating their licensed spectrum with the spectrum discovered opportunistically, i.e., spatiotemporally unused spectrum by other primary users. For an accurate identification of the spectral opportunities, the mobile network has to deploy multiple sensors or it can offload this task to nearby...
Preprint
The accelerating penetration of physical environments by objects with information processing and wireless communication capabilities requires approaches to find potential communication partners and discover services. In the present work, we focus on passive discovery approaches in multi-channel wireless networks based on overhearing periodic beacon...
Conference Paper
To avoid the foreseeable spectrum crunch, LTE operators have started to explore the option to directly use the underutilized unlicensed spectrum in 5 GHz UNII bands being mainly used by IEEE 802.11 (WiFi). However, as LTE is not designed with shared spectrum access in mind, it has a potential to seriously harm Wi-Fi. Currently suggested solutions f...
Technical Report
Full-text available
A major challenge in wide deployment of smart wireless devices, using different technologies and sharing the same 2.4 GHz spectrum, is to achieve coexistence across multiple technologies. The IEEE~802.11 (WLAN) and the IEEE 802.15.4e TSCH (WSN) where designed with different goals in mind and both play important roles for respective applications. Ho...
Conference Paper
The IEEE 802.11 and the IEEE 802.15.4e TSCH were designed with different goals in mind and both play important roles for respective applications. However, they suffer from mutual interference and experience degraded performance while operating in the same space and spectrum band. To improve this situation we propose an approach to enable a cooperat...
Article
Modern society has become increasingly reliant on mobile networks for their communication needs. Such networks are characterized by their dynamic, heterogeneous, complex, and data intensive nature, which makes them more amenable to automated mobile network optimization performed using “computational intelligence’’ (CI) techniques rather than tradit...
Conference Paper
Full-text available
Leveraging a relay for communication is a promising approach for improving throughput, coverage, and energy eeciency in wireless networks. A mobile relay that is capable of positioning itself at diierent locations opens the possibility for dynamic optimization of the path quality between the source and the nomadic destination. How to optimally posi...
Conference Paper
During the last years WLAN (IEEE 802.11) has become the primary wireless access technology. However, the fast evolution of peak data rates and the wide deployment of WLAN hotspots results in the backhaul connecting such small cells becoming a bottleneck. To provide a high capacity backhauling, we propose COUWBAT, a COgnitive Ultra-Wide BAckhaul Tra...
Conference Paper
Full-text available
Individual localization services seldom satisfy the requirements for accurate, robust, punctual, and seamless location information. To enhance the provisioning, a set of challenges has to be addressed, pertaining to handover, fusion, and integration of individual localization services. In the following, we advertise the Standardized Localization Se...
Technical Report
Full-text available
To avoid the foreseeable spectrum crunch, LTE operators have started to explore the option to directly use 5 GHz unlicensed spectrum band being used by IEEE 802.11 (WiFi). However, as LTE is not designed with shared spectrum access in mind, there is a major issue of coexistence with WiFi networks. Current coexistence schemes to be deployed at the L...
Article
Full-text available
To avoid the foreseeable spectrum crunch, LTE operators have started to explore the option to directly use 5 GHz unlicensed spectrum band being used by IEEE 802.11 (WiFi). However, as LTE is not designed with shared spectrum access in mind, there is a major issue of coexistence with WiFi networks. Current coexistence schemes to be deployed at the L...
Conference Paper
Full-text available
Ubiquitous Wi-Fi access points (APs) constantly send out beacon and probe response frames to inform potential stations (STAs) about their existence. Beacon and probe responses can be extended by adding additional information (so-called beacon stuffing) making it possible to deliver this information to mobile devices (e.g. smart-phones equipped with...
Conference Paper
Full-text available
Device-to-Device (D2D) communication has a high potential in reducing the amount of network traffic and improving the latency and energy efficiency of communication. Currently, D2D link establishment decisions are based on active probing between devices that wish to establish a D2D link. The main drawback of such approaches is a large overhead as d...
Conference Paper
Full-text available
With the abundance of mobile connected devices and coexisting networks, localization solutions are inevitably subject to interference. In this paper, effects of interference on the performance of Fingerprinting Localization Algorithms (FPS) are studied both theoretically and through experimentation. The previously introduced theoretical framework b...
Conference Paper
Full-text available
Location information of mobile devices is a foun-dational input to location-based services and a valuable source of context information in wireless networks. To maximize the value, we need location information that is accurate, robust, and promptly and seamlessly available. Unfortunately, individual localization services seldom satisfy all these re...
Conference Paper
Full-text available
Aggregation of location estimates from multiple services for provisioning of location information enhances the accuracy and robustness of the final location information. Recent Internet of Things (IoT)-based localization service architectures therefore envision a " manager " for selecting and invoking pro-visioning services and, in the later step,...
Article
Full-text available
Cross-technology communication (CTC) was proposed in recent literature as a way to exploit the opportunities of collaboration between heterogeneous wireless technologies. This paper presents LtFi, a system which enables to set-up a CTC between nodes of co-located LTE-U and WiFi networks. LtFi follows a two-step approach: using the air-interface LTE...
Conference Paper
The popularity of Internet-based video services has significantly increased over the past years. The de facto standard technology for Internet-based Video on Demand is HTTP-Based Adaptive Streaming (HAS), which is also increasingly used for live services. A core component of a HAS client is the adaptation algorithm, which dynamically adjusts the vi...
Conference Paper
Full-text available
The efficient management of radio resources in today's home or residential Wi-Fi networks is still an open research question. Due to the chaotic and unplanned deployment of Wi-Fi Access Points (APs) and the fact that all APs are managed individually by their owners, home Wi-Fi networks suffer from performance degradation due to contention and inter...
Conference Paper
Full-text available
Nowadays, the usage of multiple virtual wireless networks on top of one physical AP is very common in home Wi-Fi networks. Be it Hotspots of Internet Service Providers (ISPs) or Mobile Network Operators (MNOs) used for offloading their traffic, community networks or plain so-called " Guest-Networks ". Whereas the home user (AP owner) in the best ca...
Conference Paper
Full-text available
Despite the popularity of Fingerprinting Localization Algorithms (FPS), general theoretical frameworks for their performance studies have rarely been discussed in the literature. In this work, after setting up an abstract model for the FPS, we show that a fingerprinting-based localization problem can be cast as a Hypothesis Testing (HT) problem and...
Conference Paper
Full-text available
We propose WiPLUS – a system that enables WiFi to deal with the stealthy invasion of LTE-U into the frequency bands used by WiFi. Using solely MAC layer information extracted passively, during runtime, out of the hardware registers of the WiFi NIC at the WiFi access point, WiPLUS is able to: i) detect interfering LTE-U signals, ii) compute their du...
Conference Paper
Neighbor discovery is a fundamental task in wireless networks in order to find potential communication partners, discover services, and to efficiently access the wireless resource. In this paper we focus on the passive neighbor discovery in multi-channel environments. We present different discovery approaches with low computational complexity that...
Article
Full-text available
We propose WiPLUS -- a system that enables WiFi to deal with the stealthy invasion of LTE-U into the frequency bands used by WiFi. Using solely MAC layer information extracted passively, during runtime, out of the hardware registers of the WiFi NIC at the WiFi access point, WiPLUS is able to: i) detect interfering LTE-U signals, ii) compute their d...
Technical Report
Full-text available
We propose WiPLUS – a system that enables WiFi to deal with the stealthy invasion of LTE-U into the frequency bands used by WiFi. Using solely MAC layer information extracted passively, during runtime, out of the hardware registers of the WiFi NIC at the WiFi access point, WiPlus is able to: i) detect interferring LTE-U signals, ii) compute their d...
Chapter
Erratum to: I. Schieferdecker et al. (Eds.) Testing of Communicating Systems XIV DOI: 10.1007/978-0-387-35497-2
Article
Full-text available
We present our current work-in-progress on the design and implementation of a hybrid TDMA/CSMA medium access architecture, hereafter referred to as hMAC, which can be used on top of commercial IEEE 802.11 off-the-shelf hardware. The software only solution is based on the popular Linux ATH9K softMAC driver and hence can be used with standard Linux s...
Technical Report
Full-text available
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless systems co-existing in the same radio spectrum w...
Article
Full-text available
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless systems co-existing in the same radio spectrum w...
Conference Paper
Full-text available
The current approach to roll out large scale IoT systems is to outsource the crucial parts of the system to cloud based services, such as message brokerage, devices management, or sensor data storage and processing. One core protocol for messaging in those settings is the widely adopted publish/subscribe protocol MQTT. Pub/sub protocols, however, w...
Preprint
Full-text available
Despite popularity of Fingerprinting Localization Algorithms (FPS), general theoretical frameworks for their performance studies have rarely been discussed in the literature. In this work, after setting up an abstract model for the FPS, it is shown that fingerprinting-based localization problem can be cast as a Hypothesis Testing (HT) problem and t...
Conference Paper
Full-text available
Localization services available on today's mobile devices are proprietary and leverage a limited set of sources of location information. Integration of new location estimation methods is therefore cumbersome, requiring adaptation to the specific interfaces of the proprietary location service. In addition , location-based applications are tightly in...
Conference Paper
Full-text available
mmWave (millimeter-Wave) is a very promising technology for the future wireless communication. To mitigate its high attenuation characteristics, mmWave communication frequently employs directional beamforming for both transmission and reception. Localization commonly takes advantage of directionality in RF frequencies in urban and indoor environmen...
Conference Paper
Full-text available
This paper describes a major effort to collect smart-phone data useful for indoor localization. Data has been collected with four Android phones according to numerous scenarios in each of four large buildings. The data includes time-stamped traces of various environmental, position, and motion sensors available on a smartphone, Wi-Fi and cellular s...
Article
Full-text available
The internet of things (IoT) will enable a range of applications providing enhanced awareness and control of the physical environment. Current systems typically sense and actuate physical phenomena locally and then rely on a cloud-based publish/subscribe infrastructure for distribution of sensor and control data to end-users and external services....
Article
Full-text available
The increased usage of IEEE 802.11 Wireless LAN (WLAN) in residential environments by unexperienced users leads to dense, unplanned and chaotic residential WLAN deployments. Often WLAN Access Points (APs) are deployed unprofitable in terms of radio coverage and interference conditions. In many cases the usage of the neighbor's AP would be beneficia...
Article
We live in a world in which there is a great disparity between the lives of the rich and the poor. Information and communication technology (ICT) offers promise in bridging this digital divide through its focus on connecting human capacity with computing and informational content. It is well known that Internet access has the capability of fosterin...
Conference Paper
Full-text available
Smartphones are an important target platform for research and development of indoor localization solutions. Due to the large diversity of smartphone hardware and OS services, making general statements about the performance of indoor localization algorithms in different environments remains very challenging. In this work we present a comprehensive r...
Conference Paper
Omnipresent Wi-Fi access points (APs) periodically broadcast beacon frames to inform potential stations (STAs) about their existence. Beacon frames can be extended by adding additional information (so-called beacon stuffing) making it possible to deliver this information to mobile devices (smart-phones, tablets, etc. equipped with 802.11 interfaces...
Conference Paper
Wireless embedded systems are becoming an increasingly important part of our lives. Information from such systems is almost exclusively meaningful when it is coupled with location information, or the location information itself is the desired knowledge to obtain. In this paper we explore a special sub-problem of location discovery: determining rela...
Article
Industrial control systems have traditionally been built around dedicated wired solutions. The requirements of flexibility, mobility and cost have created a strong push towards wireless solutions, preferably solutions requiring low power. Simultaneously, the increased need for interoperability and integration with the wider Internet made a transiti...
Technical Report
Full-text available
Recently, HTTP-based adaptive streaming has become the de facto standard for video streaming over the Internet. It allows clients to dynamically adapt media characteristics to varying network conditions in order to ensure a high quality of experience, that is, minimize play-back interruptions, while maximizing video quality at a reasonable level of...
Article
Full-text available
The combination of an aging population and nursing staff shortages implies the need for more advanced systems in the healthcare industry. Many key enablers for the optimization of healthcare systems require provisioning of location awareness for patients (e.g. with dementia), nurses, doctors, assets, etc. Therefore, many Indoor Positioning Systems...
Conference Paper
Full-text available
Out of the plethora of approaches for indoor localization, WiFi-based fingerprinting offers attractive trade-off between deployment overheads and accuracy. This has motivated intense research interest resulting in many proposed algorithms which are typically evaluated only in a single or small number of discrete environments. When the end-user's en...
Article
Swarm is a heterogeneous distributed collection of cooperating things. It enables an extension of the info-sphere into the physical world. This work presents a framework architecture proposal to the Swarm. Envisioning the Swarm ecosystem, challenges and characteristics were identified and a control plane for the framework was proposed. In order to...
Article
Wireless radio communications systems form the basis for mobile network connections in the digital society. A limited amount of radio spectrum and a spatially densified use of wireless communications systems require a resource-efficient use of the spectrum. Mechanisms of cognitive radio may hold the key to a more efficient use of the available spec...
Conference Paper
Full-text available
The interest for RF-based indoor localization, and in particular for WiFi RSSI-based fingerprinting, is growing at a rapid pace. This is despite the existence of a trade-off between the accuracy of location estimation and the density of a laborious and time consuming survey for collecting training fingerprints. A generally accepted concept of incre...
Article
Full-text available
In dense deployments of residential WiFi networks individual users suffer performance degradation due to both contention and interference. While Radio Resource Management (RRM) is known to mitigate this effects its application in residential WiFi networks being by nature unplanned and individually managed creates a big challenge. We propose ResFi -...
Article
Full-text available
The growing popularity of indoor localisation research has resulted in a significant amount of research papers describing and evaluating innovative localisation solutions. Unfortunately, the results from most of these research papers cannot easily be compared since they are evaluated in different environments, use different evaluation criteria and...
Conference Paper
Full-text available
RF-based indoor localization is constantly gaining popularity, and WiFi-based fingerprinting algorithms belong to the most promising candidates due to their well-known advantages. While it is known that RF interference can adversely influence the accuracy of those algorithms, it is still unclear if this effect could be efficiently mitigated. To thi...
Conference Paper
Full-text available
Real-time Ethernet is expected to become the core technology of future in-car communication networks. Applications such as online diagnosis, data- and firmware updates over the air or data from the backend will introduce bursty high bandwidth communication to the sensitive core of the cars communication network. With this work we show that - even f...
Article
Full-text available
Over the last few years, the number of indoor localization solutions has grown exponentially, and a wide variety of different technologies and approaches are being explored. Unfortunately, there is currently no established standardized evaluation method for comparing their performance. As a result, each solution is evaluated in a different environm...
Conference Paper
Full-text available
Cognitive Radio (CR) is a promising approach to overcome the spectrum crunch faced by today's enterprise and residential WiFi (IEEE 802.11) due to rapid growth of wireless devices and traffic load. However, the expected high-density CR Networks (CRN) will suffer from similar problems as we see today with WiFi, i.e. any uncoordinated spectrum access...
Chapter
Full-text available
With the data traffic expected to grow nearly exponentially, concerns regarding excessive energy consumption in wireless networks have been also raised for home and enterprise environments. These two types of networks are discussed here jointly due to many similarities they exhibit, namely, similar propagation environments (dominantly indoor scenar...
Chapter
With the data traffic growing nearly exponentially, concerns regarding excessive energy consumption in wireless networks have been raised for home and enterprise environments. These two types of networks are discussed here jointly because of the many similarities they exhibit, namely, propagation environments (dominantly indoor scenarios, high dive...
Article
Full-text available
Cognitive Radio (CR) will enhance the efficiency in spectrum usage by re-using temporally unused licensed spectrum. A promising transmission scheme to utilize even very fragmented and fast changing spectrum is Non-Contiguous OFDM (NCOFDM). Unfortunately, NC-OFDM requires tight synchronization between sender and receiver, i.e. the receiver needs per...
Conference Paper
Full-text available
Wireless networks have recently evolved to very complex systems, due to the increasing diversity of competing radio technologies, applications and service providers which coexist in the same environments. In such a scenario, we argue that performance optimization cannot only rely on advanced hardware platforms and radio capabilities, but mainly dep...
Conference Paper
Full-text available
In the current practice, the performance evaluation of RF-based indoor localization solutions is typically realized in non-standardized environments and following ad-hoc procedures, which hampers objective comparison and does not provide clear insight into their intrinsic properties. Many evaluation procedures also neglect important environmental f...

Network

Cited By