Sciweavers

GLOBECOM
2009
IEEE
13 years 11 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
GLOBECOM
2009
IEEE
13 years 11 months ago
A Fresh Look at Multicanonical Monte Carlo from a Telecom Perspective
—The Multicanonical Monte Carlo (MMC) technique is a new form of adaptive importance sampling (IS). Thanks to its blind adaptation algorithm, it does not require an in-depth syst...
Alberto Bononi, Leslie A. Rusch, Amirhossein Ghazi...
GLOBECOM
2009
IEEE
13 years 11 months ago
Information Dissemination Control for Cooperative Active Safety Applications in Vehicular Ad-Hoc Networks
Abstract—Vehicular Ad-Hoc networks (VANETs) play a critical role in enabling important active safety applications such as collision warning and vehicle tracking. The most pressin...
Ching-Ling Huang, Yaser P. Fallah, Raja Sengupta, ...
GLOBECOM
2009
IEEE
13 years 11 months ago
Multiple Repeater Placement for Assisting Long-Range LOS MIMO Links
— A wireless MIMO link is considered in a LOS configuration with multiple SISO wireless repeaters assisting. A theoretical analysis is presented in which repeater positions are c...
Brett T. Walkenhorst, Mary Ann Ingram
GLOBECOM
2009
IEEE
13 years 11 months ago
The Gaussian Interference Relay Channel with a Potent Relay
—We consider the Gaussian interference channel with an intermediate relay. The relay is assumed to have abundant power and is named potent for that reason. A main reason to consi...
Ye Tian, Aylin Yener
GLOBECOM
2009
IEEE
13 years 11 months ago
Fusion and Diversity Trade-Offs in Cooperative Estimation over Fading Channels
—In this paper we consider a network of distributed sensors that are trying to measure a parameter of interest cooperatively, by exchanging their acquired information repeatedly ...
Mehrzad Malmirchegini, Yasamin Mostofi
GLOBECOM
2009
IEEE
13 years 11 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
GLOBECOM
2009
IEEE
13 years 11 months ago
Evaluating DoS Attacks against Sip-Based VoIP Systems
Abstract—The multimedia communication is rapidly converging towards Voice over Internet – commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SI...
M. Zubair Rafique, M. Ali Akbar, Muddassar Farooq
GLOBECOM
2009
IEEE
13 years 11 months ago
Multiple Target Localization Using Compressive Sensing
Abstract— In this paper, a novel multiple target localization approach is proposed by exploiting the compressive sensing theory, which indicates that sparse or compressible signa...
Chen Feng, Shahrokh Valaee, Zhenhui Tan
GLOBECOM
2009
IEEE
13 years 11 months ago
A Logic Distance-Based Method for Deploying Probing Sources in the Topology Discovery
Abstract—Internet topology plays a vital role in studying network’s internal structure and properties. Currently traceroutebased topology discovery is the main approach to map ...
Xin Zou, Zhongliang Qiao, Gang Zhou, Ke Xu