


default search action
GLOBECOM 2007: Washington, DC, USA
- Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. IEEE 2007

IP Networks Security
- Yang Chen, Abhishek Kumar

, Jun (Jim) Xu:
A New Design of Bloom Filter for Packet Inspection Speedup. 1-5 - Patrick Truong, Fabrice Guillemin

:
Dynamic Binary Tree for Hierarchical Clustering of IP Traffic. 6-10 - Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen Ho:

Performing Packet Content Inspection by Longest Prefix Matching Technology. 11-15 - Visvasuresh Victor Govindaswamy, Gergely V. Záruba, G. Balasekaran:

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks. 16-21 - Fulvio Risso

, Andrea Baldini, Flavio Bonomi:
Extending the NetPDL Language to Support Traffic Classification. 22-27 - Alessandro Amoroso:

AIDA: Responsive and Available Auctions Over the Internet. 28-32
Wireless Security - PHY and MAC
- Morten Lisborg Jørgensen, Boyan Radkov Yanakiev, Gunvor Elisabeth Kirkelund, Petar Popovski

, Hiroyuki Yomo, Torben Larsen
:
Shout to Secure: Physical-Layer Wireless Security with Known Interference. 33-38 - Yu Zhang, Zang Li, Wade Trappe:

Power-Modulated Challenge-Response Schemes for Verifying Location Claims. 39-43 - William Luh, Deepa Kundur:

Distributed Keyless Secret Sharing Over Noiseless Channels. 44-48 - Ming Lei, Xiaoyan Hong, Susan V. Vrbsky:

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. 49-53 - Sheng Xiao, Hossein Pishro-Nik, Weibo Gong:

Dense Parity Check Based Secrecy Sharing in Wireless Communications. 54-58 - Tong-Lee Lim, Tieyan Li:

Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme. 59-63
Overlay Routing and Topology
- Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle

, Heiko Niedermayer, Georg Carle:
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks. 64-69 - Takashi Tomimoto, Takuji Tachibana, Kenji Sugimoto:

Capability-Aware ID Assignment and Message Routing Based on Skip List in Large-Scale Heterogeneous P2P Networks. 70-74 - Ling Zhou, Arunabha Sen:

Topology Design of Service Overlay Network with a Generalized Cost Model. 75-80 - John F. Buford, Alan Brown, Mario Kolberg

:
Analysis of an Active Maintenance Algorithm for an O(1)-Hop Overlay. 81-86 - Srinivasan Seetharaman, Mostafa H. Ammar:

Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation. 87-92 - Juwei Shi, Yao Wang, Lanzhi Gu, Lichun Li, Wenjie Lin, Yinong Li, Yang Ji, Ping Zhang:

A Hierarchical Peer-to-Peer SIP System for Heterogeneous Overlays Interworking. 93-97
Service and Applications
- John G. Klincewicz

:
Assigning Telecommunications Nodes to Community of Interest Clusters. 98-102 - Haiyang Zhang, Huadong Ma:

Weighted Degree-Based Host Clustering Algorithm in Grid. 103-107 - Hiroyuki Ohnishi, Yoji Yamato, Masashi Kaneko, Takaaki Moriya, Miki Hirano, Hiroshi Sunaga:

Service Delivery Platform for Telecom-Enterprise-Internet Combined Services. 108-112 - Maitreya Natu, Adarshpal S. Sethi:

Probe Station Placement for Fault Diagnosis. 113-117 - Takaaki Moriya, Hiroyuki Ohnishi, Makoto Yoshida, Miki Hirano:

Dataflow Generation for Service Composition to Incorporate Web and Telecommunication. 118-123 - Zawar Shah

, Robert A. Malaney
, Trong Nghia Dao:
An Architecture for Location Tracking Using SIP. 124-128
Power Line Communications / Intelligent Transportation Systems
- Pawel Turcza, Lukasz Zbydniewski, Tomasz P. Zielinski

:
Circular Real Sine/Cosine Gabor Transform Modulator for Power Line Communication. 129-133 - Song Liu, Larry J. Greenstein:

Modeling and Interference Evaluation of Overhead Medium-Voltage Broadband Power Line (BPL) Systems. 134-139 - Lorenzo Guerrieri, Eleonora Guerrini, Daniele Veronesi, Paola Bisaglia, Gabriele Dell'Amico:

LLR-Based Bit-Loading Algorithm for the Turbo Coded HomePlug AV. 140-145 - Dario Fertonani, Giulio Colavolpe

:
Theoretical Limits and Practical Detection Schemes for Channels Affected by Class-A Impulse Noise. 146-150 - Xianbo Chen, Hazem H. Refai, Xiaomin Ma:

A QuantitativeApproach to Evaluate DSRC Highway Inter-Vehicle Safety Communication. 151-155 - Xiaohua Tian, Yu Cheng

, Rose Qingyang Hu, Yi Qian:
Service Oriented Architecture (SOA) for Integration of Field Bus Systems. 156-160
Cryptography and Key Management
- Jing Deng, Yunghsiang S. Han:

Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks. 161-165 - Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang

, Mung Chiang, Ruby B. Lee:
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. 166-171 - Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:

ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications. 172-176 - Daniel Bichler, Guido Stromberg, Mario Huemer:

Innovative Key Generation Approach to Encrypt Wireless Communication in Personal Area Networks. 177-181 - Tong-Lee Lim, Anantharaman Lakshminarayanan:

On the Performance of Certificate Validation Schemes Based on Pre-Computed Responses. 182-187 - Feng Bao, Robert H. Deng

:
Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. 188-192
Switch and Router Designs
- HoRang Jang, Nutthanon Leelathakul, Hyong S. Kim:

Hierarchical Self-Configuration of Large-Scale Ethernet Networks. 193-197 - Hitomi Tamura

, Yutaka Yahiro, Yutaka Fukuda, Kenji Kawahara, Yuji Oie:
Performance Analysis of Energy Saving Scheme with Extra Active Period for LAN Switches. 198-203 - Wladek Olesinski, Hans Eberle, Nils Gura:

OBIG: the Architecture of an Output Buffered Switch with Input Groups for Large Switches. 204-209 - Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong

, Lin Cai, Nirwan Ansari
:
Parallel Search Trie-Based Scheme for Fast IP Lookup. 210-214 - Lu Peng, Wencheng Lu, Lide Duan:

Power Efficient IP Lookup with Supernode Caching. 215-219 - Domenico Ficara, Stefano Giordano, Michele Pagano

, Fabio Vitucci, Federico Rossi:
AMBER Sched: An Analytical Model Based Resource Scheduler for Programmable Routers. 220-224
Streaming and Measurement
- Yang Guo, Saurabh Mathur, Kumar Ramaswamy, Shengchao Yu, Bankim Patel:

PONDER: Performance Aware P2P Video-on-Demand Service. 225-230 - Yi Cui, Liang Dai, Yuan Xue:

Optimizing P2P Streaming Throughput Under Peer Churning. 231-235 - Chao Liang, Yang Guo, Yong Liu

:
Hierarchically Clustered P2P Streaming System. 236-241 - John F. Buford, Angela Wang, Xiaojun Hei, Yong Liu

, Keith W. Ross:
Discovery of In-Band Streaming Services in Peer-to-Peer Overlays. 242-247 - Balasubramaneyam Maniymaran, Muthucumaru Maheswaran:

Bandwidth Landmarking: A Scalable Bandwidth Prediction Mechanism for Distributed Systems. 248-252 - Eng Keong Lua, Xiaoming Zhou:

Bos: Massive Scale Network-Aware Geometric Overlay Multicast Streaming Network. 253-258
Data Storage
- Xinde Hu, B. V. K. Vijaya Kumar

, Zongwang Li, Richard Barndt:
Error Floor Estimation of Long LDPC Codes on Partial Response Channels. 259-264 - Ruwan N. S. Ratnayake, Erich F. Haratsch, Gu-Yeon Wei:

A Bit-Node Centric Architecture for Low-Density Parity-Check Decoders. 265-270 - Yang Han, William E. Ryan:

Performance of a Structured IRA Code on a Perpendicular Recording Channel with Media Noise. 271-276 - Seungjune Jeon, B. V. K. Vijaya Kumar

:
Error Event Analysis of Partial Response Targets for Perpendicular Magnetic Recording. 277-282 - Fan Zhang, Henry D. Pfister

:
List-Message Passing Achieves Capacity on the q-ary Symmetric Channel for Large q. 283-287 - Abu Sebastian

, Aggeliki Pantazi
, Haralampos Pozidis:
Jitter Investigation and Performance Evaluation of a Small-Scale Probe Storage Device Prototype. 288-293
Wireless Communications and Networking
- Hiroshi Harada

, Homare Murakami, Kentaro Ishizu, Stanislav A. Filin, Yoshia Saito, Ha Nguyen Tran, Goh Miyamoto, Mikio Hasegawa
, Yoshitoshi Murata, Shuzo Kato:
A Software Defined Cognitive Radio System: Cognitive Wireless Cloud. 294-299 - Yao Ma, Robert Schober, Subbarayan Pasupathy:

Asymptotic Gains of Generalized Selection Combining Over Correlated Fading Channels. 300-304 - Xiaobo Long, Biplab Sikdar

:
Wavelet Based Detection of Shadow Fading in Wireless Networks. 305-309 - Mohammad Reza Zahabi, Vahid Meghdadi, Jean-Pierre Cances, Amir Saemi

:
Mixed Analog and Digital Matched-Filter Design for High Rate WLAN. 310-314 - Eitan Altaian, Konstantin Avrachenkov, Nicolas Bonneau, Mérouane Debbah, Rachid El Azouzi

, Daniel S. Menasché:
Constrained Stochastic Games in Wireless Networks. 315-320 - Tao Chen, Hagen Woesner, Yabin Ye, Imrich Chlamtac:

WiGEE: A Hybrid Optical/Wireless Gigabit WLAN. 321-326
Intrusion Detection and Reputation Based Systems
- Liran Ma

, Amin Y. Teymorian, Xiuzhen Cheng:
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks. 327-331 - Liming Hao, Shutang Yang, Songnian Lu, Gongliang Chen:

A Dynamic Anonymous P2P Reputation System Based on Trusted Computing Technology. 332-337 - Paulo F. Silva, Carlos Becker Westphall, Carla Merkle Westphall, Marcos Dias de Assunção

:
Design and Evaluation of a Grid Computing Based Architecture for Integrating Heterogeneous IDSs. 338-342 - N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jonathan Chao:

A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System. 343-348 - N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. Jonathan Chao:

Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware. 349-354 - Lanier A. Watkins

, Raheem A. Beyah
, Cherita L. Corbett:
A Passive Approach to Rogue Access Point Detection. 355-360
Wireless Channel and Coding Techniques
- Zhu Han, Yan Lindsay Sun:

Self-Learning Cooperative Transmission - Coping with Unreliability Due to Mobility, Channel Estimation Errors, and Untrustworthy Nodes. 361-365 - Muhammad A. Assad, Mohammad Heidari, Kaveh Pahlavan:

Effects of Channel Modeling on Performance Evaluation of WiFi RFID Localization Using a Laboratory Testbed. 366-370 - Xiaoxin Wu, Juejia Zhou, Guangjie Li, May Wu:

Low Overhead CQI Feedback in Multi-Carrier Systems. 371-375 - Zafar Q. Taha, Xian Liu:

An Adaptive Coding Technique For PAPR Reduction. 376-380 - Minas Gjoka, Christina Fragouli, Pegah Sattari, Athina Markopoulou

:
Loss Tomography in General Topologies with Network Coding. 381-386 - Mohammad Heidari, Ferit Ozan Akgül, Nayef A. Alsindi, Kaveh Pahlavan:

Neural Network Assisted Identification of the Absence of Direct Path in Indoor Localization. 387-392
P2P Traffic and Performance
- Guanghui He, Jennifer C. Hou, Wei-Peng Chen, Takeo Hamada:

One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic. 393-398 - Marcell Perényi, András Gefferth, Trang Dinh Dang, Sándor Molnár

:
Skype Traffic Identification. 399-404 - Cameron Dale, Jiangchuan Liu:

A Measurement Study of Piece Population in BitTorrent. 405-410 - Mengkun Yang, Zongming Fei:

Assigning Identifications to Nodes in Unstructured Peer-to-Peer Networks: A Novel Approach to Improving Search Efficiency. 411-415 - Yuh-Ming Chiu

, Do Young Eun
:
On the Performance of Download Strategies in a P2P Like Network. 416-420 - Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng, Xing Li:

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction. 421-426
Routing, Addressing, and Multicasting
- Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu:

Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks. 427-431 - Imène Chaieb, Jean-Louis Le Roux, Bernard Cousin

:
LSP Setup Arrival Reordering Approach for MPLS-TE Routing. 432-437 - Tricha Anjali, Gruia Calinescu

, Sanjiv Kapoor:
Approximation Algorithms For Multipath Setup. 438-442 - Chih-Chao Wen, Cheng-Shong Wu, Kim-Joan Chen:

Centralized Control and Management Architecture Design for PIM-SM Based IP/MPLS Multicast Networks. 443-447 - Stefano Giordano, Francesco Oppedisano, Gregorio Procissi

, Franco Russo:
A Novel High-Speed Micro-Flows Classification Algorithm Based on Perfect Hashing and Direct Addressing. 448-452 - Fan Wu, Sheng Zhong, Jiqiang Liu:

Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. 453-457
Security Protocols
- Kulasekaran A. Sivakumar, Mahalingam Ramkumar:

An Efficient Secure Route Discovery Protocol for DSR. 458-463 - Sungchul Heo, Zeen Kim, Kwangjo Kim:

Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. 464-468 - Sherry Wang, Harold Zheng, Wenye Wang:

Efficient Security Management for Ad Hoc Networks. 469-473 - Jinu Kurian, Kamil Saraç:

Provider Provisioned Overlay Networks and Their Utility in DoS Defense. 474-479 - Xiaodong Lin, Chenxi Zhang, Xiaoting Sun, Pin-Han Ho, Xuemin Shen

:
Performance Enhancement for Secure Vehicular Communications. 480-485 - Haojin Zhu

, Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen
:
Secure Localized Authentication and Billing for Wireless Mesh Networks. 486-491
Resource Management
- Xian Liu:

Capacity Assignment for Delay Bounded Packet Traffic. 492-496 - Ismet Sahin, Marwan A. Simaan

:
Flow Control in Communication Networks with Competing Teams of Cooperative Users. 497-501 - Ahmed Elmokashfi, Michael Kleis, Adrian Popescu:

NetForecast: A Delay Prediction Scheme for Provider Controlled Networks. 502-507 - Noriaki Kamiyama:

Network Topology Design Using Data Envelopment Analysis. 508-513 - Ming Lei, Susan V. Vrbsky, Yang Xiao

:
A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. 514-519 - Tuomas Tirronen, Jorma T. Virtamo:

Performance Analysis of Divided Random Linear Fountain. 520-526
General Symposium (Poster Session)
- Binbin Wu, Brian Marchant, Mohsen Kavehrad:

Dispersion Analysis of 1.55um Free-Space Optical Communications through a Heavy Fog Medium. 527-531 - Shigeo Shioda

, Kazuhiro Nakamura:
Scale-Free Property of Directed Networks with Two Intrinsic Node Weights. 532-537 - Xiangyang Luo, Daoshun Wang, Ping Wang, Fenlin Liu:

Secret Key Estimation for Image Sequential Steganograph in Transform Domain. 538-542 - Kun Xie, Yinghua Min, Dafang Zhang, Jigang Wen, Gaogang Xie:

A Scalable Bloom Filter for Membership Queries. 543-547 - Radivoje Zarubica, Stephen G. Wilson, Eric K. Hall:

Multi-Gbps FPGA-Based Low Density Parity Check (LDPC) Decoder Design. 548-552 - Zein Radwan, Camille Gaspard, Ayman I. Kayssi, Ali Chehab

:
XPRIDE: Policy-Driven Web Services Security Based on XML Content. 553-558 - Xiaohui Shi, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Zhijia Chen:

PMTA: Potential-Based Multicast Tree Algorithm with Connectivity Restricted Hosts. 559-564 - Shaoyu Yang, Yoo-Ah Kim, Bing Wang:

Designing Infrastructure-Based Overlay Networks for Delay-Sensitive Group Communications. 565-570 - Jiansong Chen, Xiaoli Yu, C.-C. Jay Kuo

:
V-BLAST Receiver for MIMO Relay Networks with Imperfect CSI. 571-575 - Kamal Deep Singh, David Ros:

Normalized Rate Guarantee Scheduler for High Speed Downlink Packet Access. 576-580
Energy Based and Cross-Layer Routing Based Protocols
- Do Van Giang, Tarik Taleb, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto:

A Fair and Lifetime-Maximum Routing Algorithm for Wireless Sensor Networks. 581-585 - Yean-Fu Wen, Frank Yeong-Sung Lin, Hung-Shi Wang:

A TDMA-based Scheduling and Routing Algorithm for Data-Centric Wireless Sensor Networks. 586-591 - Abderrahim Benslimane

, Cédric Ferraris, Abdelhakim Hafid:
EM2NET: An Energy-Saving Explicit Multicast Protocol for MANETs. 592-597 - Vahid Shah-Mansouri, Vincent W. S. Wong

:
Distributed Maximum Lifetime Routing in Wireless Sensor Networks Based on Regularization. 598-603 - Hon Sun Chiu, Kwan Lawrence Yeung, King-Shan Lui:

On Optimization of Joint Channel Assignment and Routing in Mobile Ad Hoc Networks. 604-608 - Ju-Lan Hsu, Izhak Rubin:

Cross-Layer Multi-Rate Routing Strategies in Wireless Multi-Hop Random Access Networks. 609-613
MAC Protocols and Performance Evaluation
- David Tung Chong Wong, Francois P. S. Chin, Mangalam Ramakrishnan Shajan, Yong Huat Chew:

Saturated Throughput of PCA with Hard DRPs in the Presence of Bit Error for WiMedia MAC. 614-619 - Masanori Takata, Masaki Bandai

, Takashi Watanabe
:
A MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks. 620-625 - Arindam Kumar Das, Sumit Roy, Abhijit Mahalanobis:

Analysis of the Contention Access Phase of a Reservation MAC Protocol for Wide-Area Data Intensive Sensor Networks. 626-630 - Kostas Stamatiou, John G. Proakis, James R. Zeidler:

Evaluation of MIMO Techniques in FH-MA Ad Hoc Networks. 631-635 - Haiming Yang, Hsin-Yi Shen, Biplab Sikdar

:
A MAC Protocol for Cooperative MIMO Transmissions in Sensor Networks. 636-640
Geographic and Cooperative Based Routing Protocols
- Daisuke Takahashi, Yang Xiao

, Fei Hu:
LTRT: Least Total-Route Temperature Routing for Embedded Biomedical Sensor Networks. 641-645 - Pedro Coronel, Robin Doss

, Wolfgang Schott:
Geographic Routing with Cooperative Relaying and Leapfrogging in Wireless Sensor Networks. 646-651 - Shaoqiang Dong, Prathima Agrawal, Krishna M. Sivalingam

:
Reinforcement Learning Based Geographic Routing Protocol for UWB Wireless Sensor Network. 652-656 - Federico Librino

, Marco Levorato, Michele Zorzi:
Distributed Cooperative Routing and Hybrid ARQ in MIMO-BLAST Ad Hoc Networks. 657-662 - Heping Wang, Xiaobo Zhang, Ashfaq A. Khokhar:

Efficient "Void" Handling in Contention-Based Geographic Routing for Wireless Sensor Networks. 663-667
Power Control and Collision Avoidance
- Alex Chia-Chun Hsu, David S. L. Wei, C.-C. Jay Kuo

, Norio Shiratori, Chung-Ju Chang:
Enhanced Adaptive Frequency Hopping for Wireless Personal Area Networks in a Coexistence Environment. 668-672 - Thomas Watteyne, Isabelle Augé-Blum, Mischa Dohler, Dominique Barthel:

Reducing Collision Probability in Wireless Sensor Network Backoff-Based Election Mechanisms. 673-677 - Jialing Zheng, Maode Ma:

A Utility-Based Joint Power and Rate Adaptive Algorithm for Wireless Ad Hoc Networks. 678-682 - Minghao Cui, Violet R. Syrotiuk:

Fair Variable Transmission Power Control. 683-687 - John H. Gibson, Geoffrey G. Xie, Yang Xiao

:
Performance Limits of Fair-Access in Sensor Networks with Linear and Selected Grid Topologies. 688-693 - Rekha Menon, Allen B. MacKenzie

, R. Michael Buehrer, Jeffrey H. Reed:
Joint Power Control and Waveform Adaptation for Distributed Networks. 694-699
Routing Protocols and Performance
- Loay Abusalah, Ashfaq A. Khokhar:

TARP Performance in a Mobile World. 700-704 - Daniel Câmara, Antonio Alfredo Ferreira Loureiro, Fethi Filali

:
Methodology for Formal Verification of Routing Protocols for Ad Hoc Wireless Networks. 705-709 - Mohammad Abdul Azim

, Abbas Jamalipour
:
Performance Evaluation of Optimized Forwarding Strategy for Flat Sensor Networks. 710-714 - Youndo Lee, Hojin Lee, Nakjung Choi, Yanghee Choi, Taekyoung Kwon:

Macro-Level and Micro-Level Routing (MMR) for Urban Vehicular Ad Hoc Networks. 715-719 - Shumao Ou, Kun Yang, Liang Hu:

CRoSS: A Combined Routing and Surrogate Selection Algorithm for Pervasive Service Offloading in Mobile Ad Hoc Environments. 720-725 - Saida Ziane, Abdelhamid Mellouk:

AMDR: A Reinforcement Adaptive Mean Delay Routing Algorithm for MANET. 726-730
Resource Allocation and QoS Provisioning
- Yik Hung Tam, Robert Benkoczi, Hossam S. Hassanein

, Selim G. Akl:
Optimal Channel Assignment in Multi-Hop Cellular Networks. 731-735 - Ashutosh Deepak Gore, Abhay Karandikar, Srikanth Jagabathula:

On High Spatial Reuse Link Scheduling in STDMA Wireless Ad Hoc Networks. 736-741 - Shahab Moradi, Amir Hamed Mohsenian Rad, Vincent W. S. Wong

:
A Novel Scheduling Algorithm for Video Traffic in High-Rate WPANs. 742-747 - Anna-Marie Silvester, Lutz H.-J. Lampe, Robert Schober:

Distributed Space-Time Transmission with CPM. 748-753 - Ayman Radwan

, Hossam S. Hassanein
:
QoS Provisioning in Multi-hop CDMA Networks through Rate Adaptation. 754-758 - Yi Qu, Chung-Horng Lung, Anand Srinivasan:

Network Layer Negotiation-Based Channel Assignment in Multi-Channel Wireless Networks. 759-763
Scheduling and Resource Management
- Andres Medina, Gonzalo R. Arce, Brian M. Sadler

:
Statistical Approach to Neighborhood Congestion Control in Ad Hoc Wireless Networks. 764-768 - Majid Khabbazian, Vijay K. Bhargava:

Reducing Broadcast Redundancy in Wireless Ad Hoc Networks. 769-774 - Mohamed Aly, Anandha Gopalan, Adel M. Youssef:

Load-Balancing Query Hotspots for Next-Generation Sensornet. 775-779 - Qing Chen, Fei Ye, Zhisheng Niu:

Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks. 780-784 - Xiaolin Li, Xinxin Liu, Hui Kang:

Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory. 785-789 - Peng Guan, Xiaolin Li:

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks. 790-794
Coding, Modulation, and Synchronization
- Stefan Berger, Armin Wittneben:

Impact of Noisy Carrier Phase Synchronization on Linear Amplify-and-Forward Relaying. 795-800 - Katsutoshi Kusume, Robert Vilzmann, Andreas Müller, Christian Hartmann, Gerhard Bauch:

A Multiuser Detection Perspective on Medium Access Control in Ad Hoc Networks. 801-806 - Xinbing Wang, Chen Zhuo, Youyun Xu, Ruhai Wang:

A New Stochastic Admission Control Scheme for Wireless Networks. 807-811 - Shengli Fu, Kejie Lu, Yi Qian, Murali R. Varanasi:

Cooperative Network Coding for Wireless Ad-Hoc Networks. 812-816 - Niky Riga, Ibrahim Matta

, Azer Bestavros
:
A Geometric Approach to Slot Alignment in Wireless Sensor Networks. 817-822 - Raja Jurdak

, Antonio G. Ruzzelli, Gregory M. P. O'Hare
, Cristina Videira Lopes:
Reliable Symbol Synchronization in Software-Driven Acoustic Sensor Networks. 823-827
Data Gathering and Data Mining
- Xiaobo Zhang, Heping Wang, Ashfaq A. Khokhar:

Distortion Analysis for Real-Time Data Gathering of Spatially-Temporally Correlated Fields in Sensor Networks. 828-832 - David Tacconi, Iacopo Carreras, Daniele Miorandi, Antonio Casile, Francesco Chiti

, Romano Fantacci
:
A System Architecture Supporting Mobile Applications in Disconnected Sensor Networks. 833-837 - Miao Zhao

, Ming Ma, Yuanyuan Yang
:
Mobile Data Gathering with Multiuser MIMO Technique in Wireless Sensor Networks. 838-842 - Anand Oka, Lutz H.-J. Lampe:

Distributed Filtering with Wireless Sensor Networks. 843-848 - Kihwan Kim, Toby Xu, Ying Cai:

ELIAS: Every Location Is A Storage. 849-853 - Fadi Abi Abdallah, Raymond Knopp:

Bounds on the Distortion for Distributed Sensing of Slowly-Varying Random Fields. 854-858
Modeling of Ad Hoc Networks
- Ping Chung Ng, David J. Edwards, Soung Chang Liew:

Colouring Link-Directional Interference Graphs in Wireless Ad Hoc Networks. 859-863 - Francesco Rossetto, Michele Zorzi:

Gaussian Approximations for Carrier Sense Modeling in Wireless Ad Hoc Networks. 864-869 - Nikhil Karamchandani, Massimo Franceschetti:

Scaling Laws for Delay Sensitive Traffic in Rayleigh Fading Networks. 870-874 - Murat Senel, Krishna Chintalapudi, Dhananjay Lal, Abtin Keshavarzian, Edward J. Coyle

:
A Kalman Filter Based Link Quality Estimation Scheme for Wireless Sensor Networks. 875-880 - Atef Abdrabou

, Weihua Zhuang
:
A Link-Layer Channel Model for IEEE 802.11 Ad Hoc Networks. 881-886 - Pan Li

, Nicola Scalabrino, Yuguang Fang
, Enrico Gregori, Imrich Chlamtac:
Channel Interference in IEEE 802.11b Systems. 887-891
Data Aggregation and Compression
- Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba:

Analysis of the Impact of the Number of Reporting Nodes on Sensor Networks Lifetime. 892-897 - Hsien-Cheng Weng, Hope Chan, Eric Hsiao-Kuang Wu, Gen-Huey Chen:

A 2-Approximation Double-Tree Algorithm for Correlated Data Gathering in Wireless Sensor Networks. 898-902 - Waleed A. Youssef, Mohamed F. Younis:

Intelligent Estimation of Gateways Count for Reduced Data Latency in Wireless Sensor Networks. 903-907 - Pu Wang

, Jun Zheng, Cheng Li
:
Data Aggregation Using Distributed Lossy Source Coding in Wireless Sensor Networks. 908-913 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID