Sciweavers

ICC
2009
IEEE
116views Communications» more  ICC 2009»
14 years 14 hour ago
Optimization for Fractional Cooperation in Multiple-Source Multiple-Relay Systems
Abstract—In fractional cooperation, many relays simultaneously assist the source, and each relay is responsible to relay only a fraction of the source transmission. In this paper...
Josephine P. K. Chu, Andrew W. Eckford, Raviraj Ad...
ICC
2009
IEEE
163views Communications» more  ICC 2009»
14 years 14 hour ago
Virtual Calibration for RSSI-Based Indoor Localization with IEEE 802.15.4
— Localization systems based on Received Signal Strength Indicator (RSSI) exploit fingerprinting (based on extensive signal strength measurements) to calibrate the system paramet...
Paolo Barsocchi, Stefano Lenzi, Stefano Chessa, Ga...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 14 hour ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
ICC
2009
IEEE
100views Communications» more  ICC 2009»
14 years 14 hour ago
Pollution Resilience for DNS Resolvers
Abstract—The DNS is a cornerstone of the Internet. Unfortunately, no matter how securely an organization provisions and guards its own DNS infrastructure, it is at the mercy of o...
Andrew J. Kalafut, Minaxi Gupta
ICC
2009
IEEE
169views Communications» more  ICC 2009»
14 years 14 hour ago
Protocols and Resource Allocation for the Two-Way Relay Channel with Half-Duplex Terminals
—The two-way relay channel (TWRC) describes the communication between two terminals sharing a common relay. In this work we compare different protocols for the TWRC with a half-d...
Adrian Agustin, Josep Vidal, Olga Muñoz
ICC
2009
IEEE
14 years 14 hour ago
Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas
— The benefit of multiple antenna communication is investigated in wireless ad hoc networks, and the primary finding is that throughput can be made to scale linearly with the n...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 14 hour ago
A Polite Cross-Layer Protocol for Contention-Based Home Power-Line Communications
—In typical home power-line communication (PLC) networks using contention-based access methods, providing Quality-of-service (QoS) to high-priority users often comes at the expen...
Aakanksha Chowdhery, Sumanth Jagannathan, John M. ...
ICC
2009
IEEE
106views Communications» more  ICC 2009»
14 years 14 hour ago
Distributed ECN-Based Congestion Control
—Following the design philosophy of XCP, VCP is a router-assisted congestion protocol that intends to balance the efficiency and the fairness control in high Bandwidth-Delay Pro...
Xiaolong Li, Homayoun Yousefi'zadeh
ICC
2009
IEEE
138views Communications» more  ICC 2009»
14 years 14 hour ago
Optimising Radio Access in a Heterogeneous Wireless Network Environment
—A variety of wireless network technologies have been developed and deployed, including GSM, UMTS, WiFi and WiMAX. The advantages of having an integrated heterogeneous wireless n...
Weizhi Luo, Eliane L. Bodanese
ICC
2009
IEEE
157views Communications» more  ICC 2009»
14 years 14 hour ago
Transmission Capacity of Wireless Ad Hoc Networks: Successive Interference Cancellation vs. Joint Detection
Abstract—The performance benefits of two interference cancellation methods, successive interference cancellation (SIC) and joint detection (JD), in wireless ad hoc networks are ...
Joseph Blomer, Nihar Jindal