Sciweavers

ICC
2007
IEEE
13 years 12 months ago
Orthogonal En/Decoders for Truly Asynchronous Spectral Amplitude Encoded OCDMA
— In this paper, theoretical results are presented on the modular construction of tree and cascade encoders/decoders of any size for truly asynchronous and orthogonal spectral am...
Bas Huiszoon, Laurens Bakker, Huug de Waardt, Giok...
ICC
2007
IEEE
13 years 12 months ago
Optimality of the Second Order Metrics of the M/M/2 System with Heterogeneous Service Rates
—In a previous paper [4], we described an approach to improve the performance of the M/M/2 system by replacing its homogeneous servers with heterogeneous servers. Denoting by β ...
Xian Liu
ICC
2007
IEEE
171views Communications» more  ICC 2007»
13 years 12 months ago
On the Performance of the AAA Systems in 3G Cellular Networks
— This paper analyzes the performance of a system architecture for the Authentication, Authorization, and Accounting (AAA), in a scenario where 3G users generate traffic and invo...
Said Zaghloul, Admela Jukan
ICC
2007
IEEE
133views Communications» more  ICC 2007»
13 years 12 months ago
Application Composition in the SIP Servlet Environment
—The SIP servlet standard is a popular Java application programming interface (API) for developing and deploying Session Initiation Protocol (SIP) applications in Voice over IP (...
Eric Cheung, K. Hal Purdy
ICC
2007
IEEE
196views Communications» more  ICC 2007»
13 years 12 months ago
Opportunistic Network Coding for Wireless Networks
— We consider energy efficient network coding design in wireless networks with multiple unicast sessions. Our approach decomposes multiple unicast sessions into a superposition ...
Wei Chen, Khaled Ben Letaief, Zhigang Cao
ICC
2007
IEEE
13 years 12 months ago
Preventing Bandwidth Abuse at the Router through Sending Rate Estimate-Based Active Queue Management
— We propose a rigorous mathematical interpretation of a novel family of Active Queue Management schemes, called Sending Rate Estimate based Queue Management (SREQM) scheme, that...
Venkatesh Ramaswamy, Leticia Cuellar, Stephan Eide...
ICC
2007
IEEE
122views Communications» more  ICC 2007»
13 years 12 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
ICC
2007
IEEE
13 years 12 months ago
Detecting Node Misbehavior in Ad hoc Networks
—Ad hoc networks employ a decentralized unstructured networking model that relies on node cooperation for key network functionalities such as routing and medium access. In this p...
M. Tamer Refaei, Yanxia Rong, Luiz A. DaSilva, Hye...
ICC
2007
IEEE
13 years 12 months ago
Optimizing Power Allocation and Matching of Cooperative Diversity Systems
— In this paper, we study how to appropriately match users for two-user cooperative diversity systems that deploy optimal power allocation for an amplify and forward or a regener...
Veluppillai Mahinthan, Lin Cai, Jon W. Mark, Xuemi...