Sciweavers

Share
ICC
2007
IEEE
119views Communications» more  ICC 2007»
8 years 4 months ago
Efficient Data Access Algorithms for ITS-based Networks with Multi-Hop Wireless Links
Sangheon Pack, Humphrey Rutagemwa, Xuemin Shen, Jo...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
8 years 4 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ICC
2007
IEEE
186views Communications» more  ICC 2007»
8 years 6 months ago
On Channel Coding Selection in Time-Slotted ALOHA Packetized Multiple-Access Systems Over Rayleigh Fading Channels
— In this paper, we consider the time-slotted ALOHA packetized multiple-access system where the transmission channels obey i.i.d (independent identically distributed) Rayleigh fa...
Chen Wei, Pingyi Fan, Khaled Ben Letaief
ICC
2007
IEEE
210views Communications» more  ICC 2007»
8 years 6 months ago
Dirty-Paper Coding without Channel Information at the Transmitter and Imperfect Estimation at the Receiver
—In this paper, we examine the effects of imperfect channel estimation at the receiver and no channel knowledge at the transmitter on the capacity of the fading Costa’s channel...
Pablo Piantanida, Pierre Duhamel
ICC
2007
IEEE
157views Communications» more  ICC 2007»
8 years 6 months ago
On the Effectiveness of the 2-hop Routing Strategy in Mobile Ad Hoc Networks
— In this paper, we study the performance of the 2-hop routing scheme proposed for ad hoc wireless networks with mobile nodes, considering realistic node mobility patterns. First...
Michele Garetto, Paolo Giaccone, Emilio Leonardi
ICC
2007
IEEE
136views Communications» more  ICC 2007»
8 years 8 months ago
SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks
Overlay networks have shown tremendous potential in solving large scale data dissemination problem by employing peer-to-peer communication protocols. These networks, however, have ...
Waseem Ahmad, Ashfaq A. Khokhar
ICC
2007
IEEE
185views Communications» more  ICC 2007»
8 years 8 months ago
Systematic Modification of Parity-Check Matrices for Efficient Encoding of LDPC Codes
An algorithm for efficient encoding of LDPC codes is presented that does not impose any restrictions on the construction of the parity-check matrices. The algorithm modifies the pa...
Mohamed Shaqfeh, Norbert Görtz
ICC
2007
IEEE
127views Communications» more  ICC 2007»
8 years 8 months ago
Spectral Efficiency of Channel-Aware Schedulers in Non-Identical Composite Links with Interference
Accurate system planning and performance evaluation requires knowledge of the joint impact of scheduling, interference, and fading. However, current analyses either require costly...
Jingxian Wu, Neelesh B. Mehta, Andreas F. Molisch,...
ICC
2007
IEEE
116views Communications» more  ICC 2007»
8 years 8 months ago
User Selection for SDMA Beamforming with Imperfect CSI in MIMO-OFDM Systems
Timothy A. Thomas, Bishwarup Mondal, Kevin L. Baum...
books