Sciweavers

Share
JSAC
2006
85views more  JSAC 2006»
8 years 10 months ago
Iterative algebraic soft-decision list decoding of Reed-Solomon codes
In this paper, we present an iterative soft-decision decoding algorithm for Reed
Mostafa El-Khamy, Robert J. McEliece
JSAC
2006
156views more  JSAC 2006»
8 years 10 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
JSAC
2006
121views more  JSAC 2006»
8 years 10 months ago
Code-aided ML joint synchronization and channel estimation for downlink MC-CDMA
Abstract--In this paper, we present a novel code-aided joint synchronization and channel estimation algorithm for downlink multicarrier code-division multiple access. The expectati...
Mamoun Guenach, Henk Wymeersch, Heidi Steendam, Ma...
JSAC
2006
109views more  JSAC 2006»
8 years 10 months ago
Polarized MIMO channels in 3-D: models, measurements and mutual information
4G systems are expected to support data rates of the order of 100 Mbps in the outdoor environment and 1 Gbps in the indoor/stationary environment. In order to support such large p...
Mansoor Shafi, Min Zhang, Aris L. Moustakas, Peter...
JSAC
2006
149views more  JSAC 2006»
8 years 10 months ago
A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks
The optimal and distributed provisioning of high throughput in mesh networks is known as a fundamental but hard problem. The situation is exacerbated in a wireless setting due to t...
Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li
JSAC
2006
79views more  JSAC 2006»
8 years 10 months ago
On the performance of multicarrier DS-CDMA with imperfect power control and variable spreading factors
Multicarrier direct-sequence code-division multiple access (MC-DS-CDMA) becomes an attractive technique for the future fourth-generation (4G) wireless system because it can flexibl...
Li-Chun Wang, Chih-Wen Chang
JSAC
2006
127views more  JSAC 2006»
8 years 10 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
JSAC
2006
93views more  JSAC 2006»
8 years 10 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
JSAC
2006
86views more  JSAC 2006»
8 years 10 months ago
Performance characterization of multiband UWB communication systems using Poisson cluster arriving fading paths
This paper provides a novel performance analysis for ultra-wideband (UWB) systems that successfully captures the unique multipath-rich property and multipath-clustering phenomenon ...
W. Pam Siriwongpairat, Weifeng Su, K. J. Ray Liu
JSAC
2006
103views more  JSAC 2006»
8 years 10 months ago
Power line enhanced cooperative wireless communications
In this paper, we investigate the use of power line communication (PLC) to assist cooperative wireless relaying. We consider a communication scheme that uses the power line to init...
Marc Kuhn, Stefan Berger, Ingmar Hammerström,...
books