Sciweavers

ICC
2009
IEEE
144views Communications» more  ICC 2009»
14 years 15 days ago
Power Allocation for Multi-Access Two-Way Relaying
—We consider a multi-access two-way relay network where multiple pairs of users exchange information with their pre-assigned partners with the assistance of an intermediate relay...
Min Chen, Aylin Yener
ICC
2009
IEEE
117views Communications» more  ICC 2009»
14 years 15 days ago
Spatial Statistics of Spectrum Usage: From Measurements to Spectrum Models
—Several measurement studies have found a large amount of underutilized radio spectrum. More flexible regulation employing dynamic spectrum access (DSA) has been proposed as sol...
Matthias Wellens, Janne Riihijärvi, Martin Go...
ICC
2009
IEEE
105views Communications» more  ICC 2009»
14 years 15 days ago
Decentralized Control and Optimization of Networks with QoS-Constrained Services
—We consider data networks in which real-time/near real-time applications require not only successful transmission of packets from source to destination, but also specific end-to...
Iraj Saniee
ICC
2009
IEEE
108views Communications» more  ICC 2009»
14 years 15 days ago
Scalable Alternatives to Virtual Output Queuing
—To avoid head of line blocking in switches, Virtual Output Queues (VOQs) are commonly used. However, the number of VOQs grows quadratically with the number of ports, making this...
Wladek Olesinski, Hans Eberle, Nils Gura
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 15 days ago
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
ICC
2009
IEEE
143views Communications» more  ICC 2009»
14 years 15 days ago
Investigation of H.264 Video Streaming over an IEEE 802.11e EDCA Wireless Testbed
— Although a number of investigations have been conducted using IEEE 802.11e enabled networks to stream class differentiated video, very few reports are available based on a real...
Richard Haywood, Saty Mukherjee, Xiao-Hong Peng
ICC
2009
IEEE
184views Communications» more  ICC 2009»
14 years 15 days ago
A 3-D Markov Chain Queueing Model of IEEE 802.11 DCF with Finite Buffer and Load
—We introduce a 3-dimensional Markov chain that integrates the IEEE 802.11 DCF contention resolution and queueing processes into one model. Important QoS measures, delay and loss...
Ren Ping Liu, Gordon Sutton, Iain B. Collings
ICC
2009
IEEE
122views Communications» more  ICC 2009»
14 years 15 days ago
Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks
—We consider multi-resolution storage, a technique for providing scalable adaptive data fidelity, necessary for many applications of large wireless sensor networks (WSNs). Altho...
Konrad Iwanicki, Maarten van Steen
ICC
2009
IEEE
127views Communications» more  ICC 2009»
14 years 15 days ago
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Abstract—Advances in mobile networks and positioning technologies have made location information a valuable asset in vehicular ad-hoc networks (VANETs). However, the availability...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 15 days ago
Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks
—Owing to the availability of low-cost and low-power CMOS cameras, Wireless Video Sensor Networks (WVSN) has recently become a reality. However video encoding is still a costly p...
Eren Gürses, Yuan Lin, Raouf Boutaba