By Topic

2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05)

14-17 Aug. 2005

Filter Results

Displaying Results 1 - 25 of 79
  • 2005 Systems Communications - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (212 KB)
    Freely Available from IEEE
  • 2005 Systems Communications - Title Page

    Publication Year: 2005, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • 2005 Systems Communications - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • 2005 Systems Communications - Table of contents

    Publication Year: 2005, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (56 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (15 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committees

    Publication Year: 2005, Page(s):xii - xvi
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • A swarm intelligent scheme for routing in mobile ad hoc networks

    Publication Year: 2005, Page(s):2 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    The highly dynamic topology of ad hoc networks and their limited bandwidth made the routing task more difficult. Actually, various kinds of sources (such as voice, video, or data) with diverse traffic characteristics and quality of service requirements (QoS) are multiplexed at very high rates, leads to significant traffic problems such as packet losses, transmission delays, delay variations, etc, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for supporting QoS in MAC layer over MANETs

    Publication Year: 2005, Page(s):7 - 12
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB) | HTML iconHTML

    Currently, the emergence of nomadic applications has raised intense research interest in providing quality of service (QoS) in mobile ad hoc networks (MANETs). An ad hoc network can be considered as an autonomous distributed system that consists of a set of identical mobile nodes that move independently and freely. Each node uses wireless links to communicate with other nodes that reside within it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized cluster-based re-routing and resource reservation in mobile ad hoc networks

    Publication Year: 2005, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Routing is one of the most important reasons behind clustering in MANETs. However, the frequent changes of the clusterheads affect the performance of the routing protocol. The route between two nodes changes constantly as the clusterhead set changes. Maintaining and minimizing the routes interruptions are two ways of keeping the stability of the network. We claim that the lifetime of a particular ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localization in Vehicular Ad Hoc Networks

    Publication Year: 2005, Page(s):19 - 25
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (131 KB) | HTML iconHTML

    Communications between vehicles constitute a Vehicular Ad hoc Network (VANET). Contrary to MANET in VANET nodes which are vehicles can move with high speed and generally must communicate quickly and reliably. When an accident occurs in a road or highway, alarm messages must be disseminated, instead of ad-hoc routed, to inform all other vehicles. To position a broken vehicle (or vehicle in danger) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS path selection exploiting minimum link delays in MPLS-based networks

    Publication Year: 2005, Page(s):27 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    Real-time multimedia is typically associated with various quality of service (QoS) requirements. Several QoS routing schemes have been proposed to determine a path which has sufficient bandwidth to achieve the desired QoS requirements. Some of these schemes flood nodes with advertisements to obtain information about congestion on the links. Consequently, protocol overhead is of concern in such cas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS and energy consumption in wireless sensor networks using CSMA/CA

    Publication Year: 2005, Page(s):33 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    The greatest current challenge in wireless sensor networks consists in building a completely adaptive network without fixed infrastructures and with the smallest energy resources. Applications built upon such networks are various: from telemetry to medical follow-up and from intrusion detection to infrastructure maintenance. Nevertheless, their design requires a large effort to guarantee quasi unl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient handoff decision algorithm using differential RSSI in MPLS-based mobile IP network

    Publication Year: 2005, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    This paper proposes an efficient handoff decision algorithm using differential received signal strength indicator (RSSI) in MPLS-based mobile IP network. MPLS-based mobile IP integrates mobile IP and MPLS. The differential RSSI value is efficient to decide handoff because this value could represent the movement direction of mobile node (MN). In our algorithm, a base station tracks the differential... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SNR investigation of beam forming in IS-95 CDMA base station receiver

    Publication Year: 2005, Page(s):45 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper presents analytical derivations and simulation results for signal-to-noise ratio (SNR) when a linear array antenna is used in a CDMA base station with beam forming (BF) algorithms. The roles of two design factors effecting performance, the direction selectivity of an array antenna and the direction-of-arrival (DOA) accuracy in the BF algorithm, are examined not only for SNR but also to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced mobility models for ad hoc network simulations

    Publication Year: 2005, Page(s):50 - 55
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    It is well known that mobility modeling plays an important role when assessing the performance of MANET protocols during a simulation test. This paper presents a tool to generate realistic mobility traces for MANET simulations. A new mobility model called AMADEOS was developed as an extension for the CANUMobisim framework. To model mobility for simulation environments, a new mobility model was cre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling of fault-tolerant mobile agents execution in distributed systems

    Publication Year: 2005, Page(s):56 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    The reliable execution of a mobile agent is a very important design issue to build a mobile agent system and many fault-tolerant schemes have been proposed. Hence, in this paper, we present FATOMAS, a java based fault-tolerant mobile agent system based on an algorithm presented in an earlier paper. In contrary to the standard "place-dependent" architectural approach, FATOMAS uses the novel agent-d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed mobility control for fault-tolerant mobile networks

    Publication Year: 2005, Page(s):61 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    Large-scale networks of mobile agents autonomously performing long-term sensing and communication tasks will be foreseeable in the near future. Since nodes in such a system communicate in a multi-hop fashion and the environment may be constantly changing due to the mobility, it is important for such a system to be able to tolerate temporary node failures. Moreover it would be ideal if the communic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of Secure Ad Hoc Sensor Networks Utilizing IEEE802.11b WEP

    Publication Year: 2005, Page(s):68 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB) | HTML iconHTML

    This paper presents a QoS research study on ad hoc sensor networks from a delay point of view when WEP (wired equivalent privacy) security is enabled or disabled. A queuing model with one queue and two servers is used to estimate the security delays in the traffic between ad hoc sensor nodes. An algorithm is designed to estimate the service time delay and the security time delay based on measured ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new tuning maximum congestion window for improving TCP performance in MANET

    Publication Year: 2005, Page(s):73 - 78
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    In terms of improving TCP performance in Mobile Ad Hoc-NETwork (MANET), it is well known that small congestion window size of TCP connection improves TCP performance. We propose a new TCP algorithm to improve TCP performance in MANET. The basic idea of our approach is that TCP receiver estimates the optimum window size and then sets congestion window limit to an optimal value by the advertised win... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wireless monitoring system for pulse-oximetry sensors

    Publication Year: 2005, Page(s):79 - 84
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    This paper presents a wireless medical monitoring system. The system permits to receive and process in a single concentrator node (e.g. a laptop or a simple handheld device) the pulse-oximetry signals from one ore several monitored patients without using any wired infrastructure. The system, which is based on a piconet of Bluetooth sensors, can retransmit the medical signals by WLAN and GPRS. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation framework for evaluating Internet pricing mechanisms

    Publication Year: 2005, Page(s):86 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (560 KB) | HTML iconHTML

    For several years, researchers in the Internet pricing research area have been proposing various pricing mechanisms. To analyze and evaluate their proposals, they usually make use of analytical based approaches with different assumptions on the environment (sometimes simplistic assumptions); this makes it difficult, or rather impossible, to compare proposals using the same realistic assumptions on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IDEM: an Internet delay emulator approach for assessing VoIP quality

    Publication Year: 2005, Page(s):92 - 97
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    Network emulations are imitations of real-time network behavior that help in testing and assessing protocols, and other network related applications in a controlled hardware and software environment. Most of the emulators existing today are hardware implemented emulators. There is a rising demand to emulate the network behavior using a software tool. Our Internet delay emulator (IDEM) is a softwar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative study of MPNT topological models

    Publication Year: 2005, Page(s):98 - 103
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB) | HTML iconHTML

    MPNT (Multicast Proxies NeTwork) is an overlay architecture that provides multicast services to unicast or multicast clients. It is multimedia-oriented, as it implements RTP, RTCP and SIP protocols. Nevertheless, it can be used to broadcast any type of data. MPNT is proxy-based, i.e. its nodes are not end-users but proxies: they act like relays for end-users, providing them standard unicast or mul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BAP sparsing: a novel approach to MPEG-4 body animation parameter compression

    Publication Year: 2005, Page(s):104 - 109
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    The MPEG-4 standard includes support not only for natural video and audio, but also for synthetic graphics and sounds. In the MPEG-4 specifications, body animation parameters (BAPs) and body definition parameters (BDPs) allow virtual bodies and their animation to be compressed using a standard compression pipeline comprising of quantization, predictive encoding and arithmetic coding of these param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unequal error protection for ROI coded images over fading channels

    Publication Year: 2005, Page(s):111 - 115
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2632 KB) | HTML iconHTML

    Region of interest (ROI) coding is a feature supported by the Joint Photographic Experts Group 2000 (JPEG 2000) image compression standard and allows particular regions of interest within an image to be compressed at a higher quality than the rest of the image. In this paper, unequal error protection (UEP) is proposed for ROI coded JPEG 2000 images as a technique for providing increased resilience... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.