Sciweavers

GLOBECOM
2007
IEEE
14 years 3 days ago
PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts
— A large number of overlay protocols have been developed, almost all of which assume each host has two-way communication capability. However, this does not hold as the deploymen...
Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, X...
GLOBECOM
2007
IEEE
14 years 3 days ago
Characterization and Comparison of Skype Behavior in Wired and Wireless Network Scenarios
Marc Cardenete-Suriol, Josep Mangues-Bafalluy, &Aa...
GLOBECOM
2007
IEEE
14 years 3 days ago
Distributed Space-Frequency Coding over Relay Channels
Karim G. Seddik, K. J. Ray Liu
GLOBECOM
2007
IEEE
14 years 3 days ago
DSR-Based Directional Routing Protocol for Ad Hoc Networks
Abstract— In this paper, a Dynamic Source Routing (DSR)based directional routing protocol is invoked for wireless ad hoc networks using directional antennas. This is designed to ...
Bin Hu, Hamid Gharavi
GLOBECOM
2007
IEEE
14 years 3 days ago
Analysis of MIMO Beamforming with Channel Response Variations Over the Frame Interval
Abstract— Important throughput improvements in multipleinput multiple-output (MIMO) fading channels can be obtained by merging beamforming at the transmitter and maximal ratio co...
Eduardo Martos-Naya, José F. Paris, Unai Fe...
GLOBECOM
2007
IEEE
14 years 3 days ago
Bit Rearrangement for MIMO Retransmissions
— In this paper, we propose a new hybrid automatic repeat request (H-ARQ) scheme in MIMO. The proposed scheme performs bit-level exchanges and modifications every retransmission...
Sung Ho Moon, Hyung Ho Park, Andrea J. Goldsmith, ...
GLOBECOM
2007
IEEE
14 years 3 days ago
Downlink MIMO Block Diagonalization in the Presence of Other-Cell Interference
— Block diagonalization is one approach for linear precoding in the multiple-input multiple-output broadcast channel that sends multiple interference free data streams to differe...
Seijoon Shim, Jin Sam Kwak, Robert W. Heath Jr., J...
GLOBECOM
2007
IEEE
14 years 3 days ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
GLOBECOM
2007
IEEE
14 years 3 days ago
Designing Infrastructure-Based Overlay Networks for Delay-Sensitive Group Communications
— Infrastructure-based overlay networks have been proposed to support the quality of service requirements of a wide range of applications. In this paper, we study using infrastru...
Shaoyu Yang, Yoo-Ah Kim, Bing Wang
GLOBECOM
2007
IEEE
14 years 3 days ago
On Signal Processing Methods for MIMO Relay Architectures
— Relay networks have received considerable attention recently, especially when limited size and power resources impose constraints on the number of antennas within a wireless se...
Alireza Shahan Behbahani, Ricardo Merched, Ahmed M...