Sciweavers

ICC
2008
IEEE
106views Communications» more  ICC 2008»
13 years 11 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe
ICC
2008
IEEE
141views Communications» more  ICC 2008»
13 years 11 months ago
Delay Optimization in Cooperative Relaying with Cyclic Delay Diversity
— Cooperative relaying has recently been recognized as an alternative to MIMO in a typical multi cellular environment. Inserting random delays at the non-regenerative fixed rela...
S. Ben Slimane, Xuesong Li, Bo Zhou, Nauroze Syed,...
ICC
2008
IEEE
121views Communications» more  ICC 2008»
13 years 11 months ago
Improving Videophone Transmission over Multi-Rate IEEE 802.11e Networks
— In this paper, we propose an adaptive system for improving videophone transmission over EDCA. We consider that a videophone contains a constant bit rate (CBR) voice source and ...
Tiantian Guo, Jianfei Cai, Chuan Heng Foh, Yu Zhan...
ICC
2008
IEEE
115views Communications» more  ICC 2008»
13 years 11 months ago
Connectivity Model for Wireless Mesh Networks
—This paper presents a novel methodology for finding the network connectivity in wireless mesh networks while taking into account dependencies existing between links of geometri...
Mohamed Abou El Saoud, Hussein Al-Zubaidy, Samy Ma...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
13 years 11 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
ICC
2008
IEEE
121views Communications» more  ICC 2008»
13 years 11 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen
ICC
2008
IEEE
13 years 11 months ago
Forward Message Passing Detector for Probe Storage
Thomas P. Parnell, Haralampos Pozidis, Oleg V. Zab...
ICC
2008
IEEE
116views Communications» more  ICC 2008»
13 years 11 months ago
Intelligent Weather Aware Scheme for Satellite Systems
— Rain, snow, gaseous, cloud, fog, scintillation and other atmospheric properties can have a distorting effect on signal fidelity of Ku and Ka bands, thus resulting in excessive ...
Kamal Harb, Changcheng Huang, Anand Srinivasan, Br...
ICC
2008
IEEE
13 years 11 months ago
On the Investigation of Path Preference in End-to-End Network Measurements
— Overlay applications have used various tools to measure path properties in order to construct efficient overlay networks. Typical examples include delay measurement, connectiv...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
ICC
2008
IEEE
115views Communications» more  ICC 2008»
13 years 11 months ago
Oblivious Routing for Wireless Mesh Networks
—Wireless mesh networks have attracted increasing attention and deployment as a high-performance and low-cost solution to last-mile broadband Internet access. Traffic routing pl...
Jonathan Wellons, Yuan Xue