Sciweavers

JSAC
2006
152views more  JSAC 2006»
13 years 4 months ago
A Distributed End-to-End Reservation Protocol for IEEE 802.11-Based Wireless Mesh Networks
Abstract--This paper presents an end-to-end reservation protocol for quality-of-service (QoS) support in the medium access control layer of wireless multihop mesh networks. It rese...
E. Carlson, Christian Prehofer, Christian Bettstet...
JSAC
2006
112views more  JSAC 2006»
13 years 4 months ago
Optimal Bandwidth Allocation in a Delay Channel
In this paper, we consider the problem of allocating bandwidth to two queues with arbitrary arrival processes, so as to minimize the total expected packet holding cost over a finit...
Navid Ehsan, Mingyan Liu
JSAC
2006
103views more  JSAC 2006»
13 years 4 months ago
Circuit modeling methodology for UWB omnidirectional small antennas
S. B. T. Wang, Ali M. Niknejad, Robert W. Broderse...
JSAC
2006
133views more  JSAC 2006»
13 years 4 months ago
Code-aided joint channel and frequency offset estimation for DS-CDMA
This paper deals with joint data detection, synchronization and channel parameter estimation for Direct-Sequence Code Division Multiple Access (DS-CDMA) systems over frequency sel...
Mamoun Guenach, Frederik Simoens, Henk Wymeersch, ...
JSAC
2006
93views more  JSAC 2006»
13 years 4 months ago
Performance Enhancement of On-Board Communication Networks Using Outage Prediction
Abstract--A research area that has become increasingly important in recent years is that of on-board mobile communication, where users on a vehicle are connected to a local network...
Adeel Baig, Lavy Libman, Mahbub Hassan
JSAC
2006
131views more  JSAC 2006»
13 years 4 months ago
On Dynamic Optimization of Packet Matching in High-Speed Firewalls
Abstract--Packet matching plays a critical role in the performance of many network devices and a tremendous amount of research has already been invested to come up with better opti...
Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
JSAC
2006
111views more  JSAC 2006»
13 years 4 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JSAC
2006
186views more  JSAC 2006»
13 years 4 months ago
Joint Congestion Control, Routing, and MAC for Stability and Fairness in Wireless Networks
Abstract--In this paper, we describe and analyze a joint scheduling, routing and congestion control mechanism for wireless networks, that asymptotically guarantees stability of the...
Atilla Eryilmaz, R. Srikant
JSAC
2006
108views more  JSAC 2006»
13 years 4 months ago
A simple baseband transmission scheme for power line channels
We propose a simple pulse-amplitude modulation (PAM)-based coded modulation scheme that overcomes two major constraints of power line channels, viz., severe insertion-loss and impu...
Raju Hormis, Inaki Berenguer, Xiaodong Wang
JSAC
2006
101views more  JSAC 2006»
13 years 4 months ago
Distributed space-time coding for multihop transmission in power line communication networks
In this paper, we consider transmission in relatively wide-stretched power line communication (PLC) networks, where repeaters are required to bridge the source-to-destination dista...
Lutz H.-J. Lampe, Robert Schober, Simon Yiu