Sciweavers

ICCCN
2007
IEEE
13 years 11 months ago
A SpaceTime Oriented Macroprogramming Paradigm for Push-Pull Hybrid Sensor Networking
This paper proposes a spatio-temporal macroprogramming paradigm for push-pull hybrid wireless sensor networks (WSNs). The proposed paradigm, called SpaceTime Oriented Programming ...
Hiroshi Wada, Pruet Boonma, Junichi Suzuki
ICCCN
2007
IEEE
13 years 11 months ago
Serial Sum-Product Architecture for Low-Density Parity-Check Codes
—A serial sum-product architecture for low-density parity-check (LDPC) codes is presented. In the proposed architecture, a standard bit node processing unit computes the bit to c...
Ruwan N. S. Ratnayake, Erich F. Haratsch, Gu-Yeon ...
ICCCN
2007
IEEE
13 years 11 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
ICCCN
2007
IEEE
13 years 11 months ago
Interleaving Techniques for W-CDMA Linear Equalization Receivers
—This paper focuses on the use of specific interleaving techniques for use in W-CDMA (Wideband Code Division Multiple Access). The linear equalization algorithm usually performs ...
João Carlos Silva, Rui Dinis, Nuno Souto, F...
ICCCN
2007
IEEE
13 years 11 months ago
Context Awareness through Cross-Layer Network Architecture
—Layered architectures are not sufficiently flexible to cope with the dynamics of wireless-dominated next generation communications. Cross-layer approaches may provide a better s...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
ICCCN
2007
IEEE
13 years 11 months ago
A Performance Evaluation of Vertical Handoff Scheme between Mobile-WiMax and Cellular Networks
- In multi-access network environments, interworking technologies has become a very important issue these days. This interworking would deliver optimized services to users and also...
SeongSoo Park, Jaehwang Yu, JongTae Ihm
ICCCN
2007
IEEE
13 years 11 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
ICCCN
2007
IEEE
13 years 11 months ago
Multi-channel Jamming Attacks using Cognitive Radios
To improve spectrum efficiency, future wireless devices will use cognitive radios to dynamically access spectrum. While offering great flexibility and softwarereconfigurability...
Ashwin Sampath, Hui Dai, Haitao Zheng, Ben Y. Zhao
ICCCN
2007
IEEE
13 years 11 months ago
An Energy-Efficient Scheduling Algorithm Using Dynamic Voltage Scaling for Parallel Applications on Clusters
In the past decade cluster computing platforms have been widely applied to support a variety of scientific and commercial applications, many of which are parallel in nature. Howev...
Xiaojun Ruan, Xiao Qin, Ziliang Zong, Kiranmai Bel...
ICCCN
2007
IEEE
13 years 11 months ago
An Efficient Detection Technique for SC-FDE Systems with Multiple Packet Collisions
- Usually, packets involved in a collision are lost, requiring the retransmission of all packets. However, if we do not discard collided packets and we use proper retransmissions w...
Rui Dinis, Marco Serrazina, Paulo Carvalho