Scheduled Maintenance on May 23rd, 2017:
IEEE Xplore will undergo an upgrade from 1:00 - 4:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Symposium, 2005 Wireless Telecommunications

April 28-30, 2005

Filter Results

Displaying Results 1 - 25 of 53
  • ReWINS: a distributed multi-RF sensor control network for industrial automation

    Publication Year: 2005, Page(s):24 - 33
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    Remote "Monitor and Control" systems are being increasingly used in various areas including security, transportation, manufacturing, supply chain, healthcare, biomedical, etc. A unit system with hardware and software components, sans network support, for providing limited monitoring and control for industrial automation was proposed in our earlier work. In this paper, we extend that architecture t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transient MAC address scheme for untraceability and DoS attack resiliency on wireless network

    Publication Year: 2005, Page(s):15 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (433 KB) | HTML iconHTML

    Recent advances in wireless networks have raised various security threats, among those tracing and denial of service (DoS) attack on mobile devices. Both threats exploit the existence of fixed hardware addresses of mobile devices. This paper provides a transient media access control (MAC) address-TMAC-scheme that enables mobile devices to escape from tracing and DoS attack. The TMAC scheme is base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From personal area networks to ubiquitous computing: preparing for a paradigm shift in the workplace

    Publication Year: 2005, Page(s):225 - 233
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    The integration of different mobile communications technologies is providing a new capability, personal area networking (PAN) that considers different needs for time-and space-related information and has the potential to significantly change the way we work. Mobile telephony combining satellite and terrestrial cellular systems has already transformed the way people work by allowing "anytime, anywh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Project WISQY: a measurement-based end-to-end application-level performance comparison of 2.5G and 3G networks

    Publication Year: 2005, Page(s):9 - 14
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    The imminent transition from 2.5G to 3G networks is generally considered to be a keystone for the future economic success of mobile telecommunications. This paper presents a practical comparison of GRPS and UMTS network performance, based on measurements in the live network of Mobilkom Austria and comparing the results to dedicated lab trials. Starting from raw TCP/IP download and upload transfer ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the reliability-aware geographic routing

    Publication Year: 2005, Page(s):74 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    Reliable communication is achieved when most reliable route is chosen from source to destination in ad hoc networks. The design of efficient routing protocols for dynamically changing network topologies is a crucial part of building power-efficient and scalable ad hoc wireless networks. If position information is available due to GPS or some kind of relative positioning technique, a promising appr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards music download and radio broadcast convergence in mobile communications networks

    Publication Year: 2005, Page(s):218 - 224
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (363 KB) | HTML iconHTML

    The transition from physical to digital music distribution is bound to have profound implications on the music industry. So far, most of the activity related to digital music distribution has been centred on the fixed Internet. In the meantime, mobile operators have been making significant investments in extending their network capabilities to support data services. This paper includes an analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech-enabled mobile learning application

    Publication Year: 2005, Page(s):1 - 8
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    Mobile devices have recently gained global popularity for business and commercial uses like alerts and instant messaging. Yet, not much has been done to extend the usage of these devices in electronic learning. This paper explores the extension of e-learning into wireless/handheld (W/H) computing devices via speech-enabled discussion forum application. Discussion forums (or boards) are widely used... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel statistical approach to ISI mitigation

    Publication Year: 2005, Page(s):155 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Any communications signal suffers some degree of distortion during transmission. In high speed data communications, a significant portion of the distortion is ascribed to the presence of inter-symbol interference (ISI). Generally, an ISI channel can be modeled as a FIR filter. The ISI effect can thus be removed by inverse filtering the distorted signal at the receiver. The method presented in this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight packet authentication in IEEE 802.11

    Publication Year: 2005, Page(s):268 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Due to the lack of security in IEEE 802.11b, IEEE 802.11i that can provide strong security is proposed. However, most users use WLAN (wireless local area networks) to do Web-surfing so that IEEE 802.11i has needless delays and computational overheads and even though the node authentication is performed in wireless domain between station (STA) and access point (AP) in IEEE 802.11, the malicious nod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative MIMO gateways: a promising technique for fast handoff

    Publication Year: 2005, Page(s):49 - 54
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    The multi-input multi-output (MIMO) technique has been portrayed as the next revolution for wireless technologies. The MIMO technique is an effective mechanism to increase capacity and reliability of wireless communications by taking advantage of its spatial multiplexing gain or diversity gain. However, conventional MIMO is expensive: the form factor of the radio is large, multiple RF front ends a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic eigenvalue moments in large chip-synchronous CDMA

    Publication Year: 2005, Page(s):67 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In this paper, the asymptotic eigenvalue distribution of the correlation matrix in a random spreading symbol-asynchronous but chip-synchronous CDMA system is studied. It is shown that, the asymptotic eigenvalue moments in a chip-synchronous system are equal to those of a symbol-synchronous system when the observation window is wider than a threshold. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of the interference rejection capability of a uniform circular array in CDMA systems

    Publication Year: 2005, Page(s):143 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    The interference rejection capability of an antenna array at base station of a CDMA communications system results in improvement in the signal-to-interference ratio (SIR). In general, this figure of merit depends strongly on the array configuration and is a function of the direction of arrival of the desired signal, the number of antenna elements, and their spacing. In this paper, we consider a un... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A key pre-distribution scheme for wireless sensor networks

    Publication Year: 2005, Page(s):253 - 260
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Key technological advances in wireless communications, micro electro mechanical systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor networks and provides authentication and key ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Economic model for 2-hop relaying cellular networks

    Publication Year: 2005, Page(s):184 - 189
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    This paper discusses the economic model for two hop relaying cellular networks. The benefit and cost of relaying is modeled in term of a utility function, which is based on error free data transmission. The benefit takes into account the power spent while the relay is carrying. Use of relays lowers the power in the cellular system, thereby lowering the signal to interference ratio. The benefit als... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel telemammography scheme across ad hoc networks

    Publication Year: 2005, Page(s):211 - 217
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (390 KB) | HTML iconHTML

    One of the goals of the National Cancer Institute (NCI) cancer control program to reach more than 80% of the eligible women in mammography screening by the year 2000 yet remains as a challenge. That is primarily due to 1) the fact that examination process is a complex and lengthy one and 2) it is not available to the majority of women who live in remote and urban sites. This problem can be solved ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bayesian parameter estimation for time and frequency synchronization

    Publication Year: 2005, Page(s):126 - 130
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    Bayesian estimation techniques are applied to the problem of time and frequency offset estimation for modern communications systems. The estimation technique employs Markov chain Monte Carlo (MCMC) to estimate unknown system parameters for a receiver with multiple antennae. A global parameter search is used to initialize time and frequency offsets. Tracking is achieved using a Metropolis-Hastings ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Framework architecture for Internet content adaptation system and vertical handover management on 4G networks

    Publication Year: 2005, Page(s):34 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (589 KB) | HTML iconHTML

    Fourth generation (4G) mobile devices and services will transform wireless communications into a realtime connectivity. Our paper aims to present twofold solutions, a proposal architecture for the Internet content adaptation for the mobile and heterogeneous environments. We aim to provide adapted Internet contents to the users of various devices by considering the whole of the context constraints ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring and management solutions for 3G/4G wireless mobile networks

    Publication Year: 2005, Page(s):234 - 239
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    The complexity of the physical and logical structures of the 3/4G network and service environment demand more sophisticated and complicated tools to be fully controllable and well managed. One of the main problems is the traditional telemanagement model that does not suit for managing fast and constantly changing network and system environment. The present way using nonreal time off-line tools to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless load sharing with heterogeneous services and adaptive placement

    Publication Year: 2005, Page(s):79 - 84
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Load sharing between wireless networks can lead to increased performance and flexibility in network engineering. This simulation study demonstrates the performance of load sharing diverse services (circuit- and packet-oriented services) across heterogeneous wireless networks, when the flexibility rate, network size, and queue size for packet services varies. The simulation is verified using a Gaus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture of security control in sensor networks

    Publication Year: 2005, Page(s):274 - 280
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Sensor networking has gained intensive attention recently. It has been a challenge to develop an effective security control strategy for sensor systems. In the present work, we propose an approach to promote security control under a middleware framework. The methodology is based on the third generation (3G) of security control strategies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novel pilot-free adaptive modulation for wireless OFDM systems

    Publication Year: 2005, Page(s):55 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    Orthogonal frequency division multiplexing (OFDM) is the contemporary technology adopted for digital audio/video broadcasting as well as wireless local-area and metropolitan-area networks. Since the wireless multimedia services often have different quality-of-service requirements and their performance is sensitive to the channel conditions, the conventional fixed OFDM modulation scheme might not b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust frequency offset estimation with a single symbol for FH-OFDMA

    Publication Year: 2005, Page(s):149 - 154
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    An initial carrier frequency offset estimation algorithm is proposed for a multi-user frequency hopping orthogonal frequency division modulation-frequency division multiple access (FH-OFDMA) system with a single preamble symbol. Since a multi-user OFDMA system is sensitive to carrier frequency offset which causes interferences among users, data loaded in subcarriers are easily damaged by the frequ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless network security - a discussion from a business perspective

    Publication Year: 2005, Page(s):261 - 267
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB) | HTML iconHTML

    Computer networks have come a long way since their inception, and wireless networks are the new trend in the IT market. However, every new technology comes with several advantages and disadvantages. This paper addresses some of the key advances and some of the shortcomings of wireless networks security. It reviews various types of security levels currently offered by standard wireless networks, su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new service discovery architecture for sensor networks

    Publication Year: 2005, Page(s):190 - 196
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    Because wireless sensor networks (WSNs) as ad hoc networks allow devices to communicate dynamically without fixed infrastructure and centralized administration, they pose unique challenges on how informations collected by and stored within the network could be queried and accessed while saving devices power consumption. In this paper, we present a new distributed architecture for service location ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of asynchronous carrier interferometry/MC-CDMA uplink with interference cancellation techniques

    Publication Year: 2005, Page(s):131 - 135
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (274 KB) | HTML iconHTML

    In this paper, we analyze the uplink performance of an asynchronous carrier interferometry/MC-CDMA, with nonlinear parallel and serial interference cancellation techniques. Specifically, we employ the new variant of parallel interference cancellation known as block-PIC and demonstrate significant performance (10 dB) improvement relative to conventional PIC. We also study the effect of order of can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.