Sciweavers

WCNC
2008
IEEE
13 years 11 months ago
An Optimal Admission Control Policy for CDMA Multiple Antenna Systems with QoS Constraints
Abstract— An optimal admission control (AC) policy is proposed for a CDMA multiple antenna system, which can maximize the system throughput while simultaneously guaranteeing all ...
Wei Sheng, Steven D. Blostein
WCNC
2008
IEEE
13 years 11 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
WCNC
2008
IEEE
13 years 11 months ago
Relay-Assisted ARQ in Wireless Ad-Hoc Networks
— In this paper we study a simple protocol utilizing two-hop cooperative diversity augmented with “automatic repeat request” (ARQ) for multi-hop ad-hoc networks. This protoco...
Furuzan Atay Onat, Dan Avidor
WCNC
2008
IEEE
13 years 11 months ago
Decoding on Graphs: LDPC-Coded MISO Systems and Belief Propagation
— This paper proposes a new approach for decoding LDPC codes over MISO channels. Since in an nT × 1 MISO system with a modulation of alphabet size 2M, nT transmitted symbols are...
Amir H. Djahanshahi, Paul H. Siegel, Laurence B. M...
WCNC
2008
IEEE
13 years 11 months ago
Cooperative Communications Using Scalable, Medium Block-length LDPC Codes
Abstract— Cooperative communications has received increasing attention in recent years because of the ubiquity of wireless devices. Each year more mobile computing devices enter ...
Marjan Karkooti, Joseph R. Cavallaro
WCNC
2008
IEEE
13 years 11 months ago
An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks
—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...
Ala F. Khalifeh
WCNC
2008
IEEE
13 years 11 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
WCNC
2008
IEEE
13 years 11 months ago
Anonymous ID-Based Group Key Agreement for Wireless Networks
—Popularity of group-oriented applications motivates research on security and privacy protection for group communications. A number of group key agreement protocols exploiting ID...
Zhiguo Wan, Kui Ren, Wenjing Lou, Bart Preneel
WCNC
2008
IEEE
13 years 11 months ago
Hop-by-Hop Routing Strategy for Multihop Decode-and-Forward Cooperative Networks
Abstract— In this paper, focusing on multihop decode-andforward cooperative networks, a hop-by-hop routing strategy is designed to optimize the end-to-end outage performance when...
Lu Zhang 0005, Leonard J. Cimini Jr.
WCNC
2008
IEEE
13 years 11 months ago
Characterizing Link Importance in Multi-Channel, Multi-Radio, Multi-Rate Wireless Mesh Networks
Abstract— Modern day wireless networks are increasingly supporting various civilian applications that require high bandwidth for successful operation. In such cases, it is import...
Ranjan Pal, Chen-Nee Chuah