Sciweavers

CIC
2006
124views Communications» more  CIC 2006»
13 years 6 months ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
CIC
2006
119views Communications» more  CIC 2006»
13 years 6 months ago
IP Queuing Analysis
Victor A. Clincy, Ajay Sitaram
CIC
2006
184views Communications» more  CIC 2006»
13 years 6 months ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...
CIC
2006
101views Communications» more  CIC 2006»
13 years 6 months ago
Non Blocking OVSF Codes Influence The Performance Of WCDMA System
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Shailendra Mishra, Nipur
CIC
2006
114views Communications» more  CIC 2006»
13 years 6 months ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CIC
2006
103views Communications» more  CIC 2006»
13 years 6 months ago
Performance Analysis of Punctured Turbo Code under An AWGN Channel
Turbo code is a coding technique that enhances a reliable data transmission. Because of special structure of encoder and iterative decoder, it could obtain 1dB at low EbN0 db that...
Ya-Fen Chen, Cheng-Ying Yang
CIC
2006
13 years 6 months ago
IIOP Failover in Dynamic Clusters
Abstract-Requirement: Clients should experience high-availability when accessing network services. Availability should be transparent and not require altering programs. Problem: Av...
Harold Carr, Ken Cavanaugh
CIC
2006
115views Communications» more  CIC 2006»
13 years 6 months ago
A Tone Dual-Channel DMAC Protocol in Location Unaware Ad Hoc Networks
- Directional antennas are used to improve spatial reuse, but have the problem of deafness. The DUDMAC protocol [9] uses the ORTS, OCTS, DDATA, and DACK mechanisms and a blocking a...
Eun-Ju Lee, Chang-Nam Kang, DoHyung Han, Doo-Yeong...
CIC
2006
111views Communications» more  CIC 2006»
13 years 6 months ago
A New Tree-based Tag Anti-collision Protocol for RFID Systems
Abstract-- This paper proposes a tree-based anti-collision protocol for tags in the UHF (ultra high frequency, 300MHz
Sung Hyun Kim, Min Kyo Shin, PooGyeon Park