Pouya Ostovari

Pouya Ostovari
  • PhD
  • Professor at Temple University

About

33
Publications
9,211
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
546
Citations
Introduction
I am an assistant professor at the Department of Computer and Information Sciences, Temple University. Currently I am working on priority-based data transmission in wireless networks using network coding.
Current institution
Temple University
Current position
  • Professor
Additional affiliations
September 2006 - May 2009
Amirkabir University of Technology
Position
  • Research Assistant
August 2010 - present
Temple University
Position
  • Research Assistant
January 2011 - present
Temple University
Position
  • Research Assistant
Education
August 2010 - December 2015
Temple University
Field of study
  • Computer & Information Sciences
August 2006 - June 2009
Amirkabir University of Technology
Field of study
  • Software Engineering
September 2000 - February 2005
Shahid Beheshti University
Field of study
  • Software Engineering

Publications

Publications (33)
Article
Full-text available
Recent advances in artificial intelligence, edge computing, and big data have enabled extensive reasoning capabilities at the edge of the network. Edge servers are now capable of extracting meaningful intelligence from IoT nodes, which can benefit a very diverse set of IoT applications, including smart carrier and distribution networks (power, peop...
Article
Full-text available
Internet of Things (IoT) is a novel paradigm, which not only facilitates a large number of devices to be ubiquitously connected over the Internet but also provides a mechanism to remotely control these devices. The IoT is pervasive and is almost an integral part of our daily life. These connected devices often obtain user's personal data and store...
Chapter
Full-text available
This survey summarizes the research on the applications and security challenges of network coding in wireless networks and Cyber-Physical Systems. Network coding technique generalizes the store-and-forward routing by mixing the received packets at the intermediate nodes to a single packet before forwarding them. Network coding has received a lot of...
Conference Paper
Full-text available
This paper addresses the coverage and workload-balancing requirements of worker recruiting in spatial crowd-sourcing. That is, the recruited workers should be able to visit all the crowdsourcing locations to satisfy a certain quality, e.g., traffic monitoring or climate forecast. In addition, each crowdsourcing operation has a cost, e.g., data traf...
Conference Paper
Full-text available
These days we are witnessing a tremendous increase in the popularity of wireless devices, e.g. smartphones and tablets. These devices are typically connected to the Internet through cellular connections, such as LTE/4G. Because of the popularity of the wireless devices, a large portion of the traffic on the Internet goes through the cellular base s...
Article
Full-text available
Having ubiquitous access to the Internet is becoming a necessity of life. Furthermore, we are witnessing a rapid increase in the amount of data requested by mobile users. Cooperative Internet access is a promising approach for addressing these demands, which gives the mobile devices the opportunity to receive help from other mobile devices in order...
Article
Full-text available
Video streaming generates a substantial fraction of the traffic on the Internet. The demands of video streaming also increase the workload on the video server, which in turn leads to substantial slowdowns. In order to resolve the slowdown problem, and to provide a scalable and robust infrastructure to support on-demand streaming, helper-assisted vi...
Conference Paper
Full-text available
One of the main challenges in wireless networks is addressing the unreliability of the wireless links, and providing reliable transmissions. Two important sources of errors in wireless transmissions are noise and interference. In order to address the errors due to noise, forward error correction methods can be used, in which redundancy is added to...
Conference Paper
Full-text available
Ubiquitous and resilient Internet connection access is becoming a necessity of life. Moreover, the amount of data requested by mobile users is increasing rapidly. Cooperative mobile Internet access is a promising approach to addressing these demands, by giving the mobile devices the opportunity to use the help of other devices to access the Interne...
Conference Paper
Full-text available
As the popularity of wireless devices (e.g. smartphones and tablets) increases, watching videos over the Internet is becoming a main device application. Two important challenges in wireless communications are the unreliability of the wireless links and the interference among the wireless links. In order to exploit reliable video multicast, forward...
Conference Paper
Full-text available
As the popularity of wireless devices (e.g. smart-phones and tablets) and watching videos over the Internet is increasing rapidly, delivering high quality videos to users over wireless links is becoming an important application. One of the main challenges of multicasting in wireless networks to multiple receivers is the diversity of the receivers....
Article
Full-text available
Feedback is an important control mechanism that provides re-liability in most wireless network protocols. However, feedback incurs some overhead, especially in lossy network environments. Many previous works on reliable communication neglect the cost of the feedback messages. In this paper, we study the problem of minimum-cost reliable transmission...
Chapter
Full-text available
Network coding is a technique where relay nodes mix packets using mathematical operations, which can increase the throughput. Network coding was first proposed for wired networks to solve the bottleneck in a single multicast session problem and to increase the throughput. However, the broadcast nature of wireless networks and the diversity of the l...
Conference Paper
Full-text available
Providing reliable transmission in wireless commu-nication networks is an important problem which is typically addressed using feedback and acknowledgment messages. In the networks where using feedbacks is not possible, such as real-time systems, an alternative approach is to maximize the possible gain that the destination nodes are expected to rec...
Conference Paper
Full-text available
Video streaming is one of the applications with the highest traffic on the Internet. This high traffic leads to a lot of workload on the video servers (data centers), and increases the energy consumption of the servers. Reducing energy consumption becomes more important in the case that the data centers use renewable energy. The cost of these serve...
Chapter
Full-text available
Network coding is a technique where relay nodes mix packets using mathemat-ical operations, which reduces the number of transmitted packets. Network coding was first proposed for wired networks to solve the bottleneck problem and to in-crease the throughput. However, the broadcast nature of wireless networks and the diversity of the links make netw...
Conference Paper
Full-text available
Video streaming is one of the dominant forms of traffic on the Internet. This increases workload on the video servers, which leads to substantial slowdowns. In order to resolve the slowdown problem, and to provide a scalable and robust infrastructure to support on-demand streaming, helper-assisted video-on-demand (VoD) systems have been introduced....
Conference Paper
Full-text available
Network Coding (NC) techniques have received a lot of attention from the research community for providing reliable broadcasting in error-prone wireless networks. The most common NC approach is segment coding, in which the packets are partitioned into segments, and linear NC is performed inside each segment. In order to increase the throughput of NC...
Article
Full-text available
Broadcasting with network coding mixes packets to minimize the number of transmissions, which improves the energy efficiency of wireless networks. On the other hand, delaying the transmissions increases coding opportunities at intermediate nodes, but increases the delay of packets. In this paper, we consider these two contradicting factors and stud...
Conference Paper
Full-text available
Providing reliable transmission over error-prone networks has received a lot of attention from the research community. In this paper, instead of using simple retransmissions to provide reliability, we consider a novel retransmission approach based on the importance of the bits (symbols). We study the problem of maximizing the total gain in the case...
Conference Paper
Full-text available
Video is one of the main causes of the dramatic increase in data traffic over cellular networks. Caching is an effective mechanism that decreases the download rate from base stations and, as a result, the load on the base station, by storing the most popular files or videos on the caches and providing them to the users. The problem of efficient con...
Conference Paper
Full-text available
Broadcasting with network coding mixes different packets to minimize the number of transmissions, which improves the energy efficiency of wireless networks. On the other hand, delaying the transmissions increases coding opportunities at the intermediate nodes, but increases the delay of the packets. In this paper, we consider these two contradictin...
Article
Full-text available
Energy limitation is one of the most important challenges in wireless networks. Reducing the number of transmissions is one of the most effective ways to reduce the energy consumption. For this purpose, network coding can be used to mix packets together to reduce the number of transmissions. In addition to the importance of energy efficiency, in ma...
Article
Full-text available
A practical way for maximizing the throughput of a wireless network is to decompose the network into a superposition of small two-hop networks such that network coding can be performed inside these small networks to resolve bottlenecks. We call these networks 2-hop relay networks. Therefore, studying the capacity of 2-hop relay networks is very imp...
Conference Paper
Full-text available
A practical way for maximizing the throughput of a wireless network is to decompose the network into a superposition of small two-hop networks such that network coding can be performed inside these small networks to resolve bottlenecks. We call these networks 2-hop relay networks. Therefore, studying the capacity of 2-hop relay networks is very imp...
Conference Paper
Full-text available
Energy limitation is one of the most critical chal- lenges in the area of sensor networks. Sleep scheduling mecha- nisms can reduce the energy consumption. Coverage mechanisms attempt to cover the area with the minimum possible number of sensors. There are many area coverage approaches which also consider the connectivity problem. However, in the a...

Network

Cited By