Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ICC
2009
IEEE
139views Communications» more  ICC 2009»
10 years 9 months ago
Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks
Abstract--Intrusion detection remains an important and challenging task in current and next generation networks (NGN). Emerging technologies such as multi-core processors and virtu...
Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang
ICC
2009
IEEE
10 years 9 months ago
Second Order Statistics of Non-Isotropic Mobile-to-Mobile Ricean Fading Channels
This paper develops a generic geometry-based stochastic model for mobile-to-mobile (M2M) Ricean fading channels. From the generic model, the level crossing rate (LCR) and average f...
Xiang Cheng, Cheng-Xiang Wang, David I. Laurenson,...
ICC
2009
IEEE
160views Communications» more  ICC 2009»
10 years 9 months ago
Reliability and Efficiency Analysis of Distributed Source Coding in Wireless Sensor Networks
We propose a comprehensive theoretical framework to evaluate reliability and energy consumption of distributed source coding (DSC) in wireless sensor networks (WSNs) applications. ...
Carlo Fischione, Stefano Tennina, Fortunato Santuc...
ICC
2009
IEEE
116views Communications» more  ICC 2009»
10 years 9 months ago
Network Coding Does Not Change the Multicast throughput Order of Wireless Ad Hoc Networks
We demonstrate that the gain attained by network coding (NC) on the multicast capacity of random wireless ad hoc networks is bounded by a constant factor. We consider a network wit...
Shirish S. Karande, Zheng Wang, Hamid R. Sadjadpou...
ICC
2009
IEEE
152views Communications» more  ICC 2009»
10 years 9 months ago
Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks
Video-on-demand service in wireless networks is one important step to achieving the goal of providing video services anywhere anytime. Typically, carrier mobile networks are used t...
Tai T. Do, Kien A. Hua, Alexander J. Aved, Fuyu Li...
ICC
2009
IEEE
101views Communications» more  ICC 2009»
10 years 9 months ago
Adaptive Bitrate and Resource Allocation for Relay-Assisted ARQ Transmissions
Automatic repeat request (ARQ) protocols deal with the situations where the selected data rate is not supported by the current channel realization. The inappropriate selection is m...
Adrian Agustin, Josep Vidal, Olga Muñoz
ICC
2009
IEEE
10 years 9 months ago
Selecting Concurrent Network Architectures at Runtime
The current Internet architecture nicely structures functionality into layers of protocols. While this reduces complexity, many tweaks have emerged because of the architecture'...
Lars Völker, Denis Martin, Christoph Werle, M...
ICC
2009
IEEE
118views Communications» more  ICC 2009»
10 years 9 months ago
Downlink Resource Allocation for OFDMA-Based Multiservice Networks with Imperfect CSI
Abstract--This paper addresses practical implementation issues of resource allocation in OFDMA networks: inaccuracy of channel state information (CSI) available to the resource all...
Mohamad Khattar Awad, Veluppillai Mahinthan, Mehri...
ICC
2009
IEEE
139views Communications» more  ICC 2009»
10 years 9 months ago
A Fluid Background Traffic Model
Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the background traffic can be extremely time consuming i...
Ting Li, Jason Liu
books