By Topic

Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006. Proceedings of the First

Date 17-20 Sept. 2006

Filter Results

Displaying Results 1 - 25 of 52
  • [Front cover]

    Publication Year: 2006, Page(s): C1
    IEEE is not the copyright holder of this material | PDF file iconPDF (141 KB)
    Freely Available from IEEE
  • Program

    Publication Year: 2006, Page(s):nil1 - nil10
    IEEE is not the copyright holder of this material | PDF file iconPDF (2879 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2006, Page(s): nil11
    IEEE is not the copyright holder of this material | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • MCWC 2006 Reviewers

    Publication Year: 2006, Page(s):nil12 - nil14
    IEEE is not the copyright holder of this material | PDF file iconPDF (490 KB)
    Freely Available from IEEE
  • MCWC 2006 Technical Program Committee

    Publication Year: 2006, Page(s): nil15
    IEEE is not the copyright holder of this material | PDF file iconPDF (379 KB)
    Freely Available from IEEE
  • General Chairman's Message

    Publication Year: 2006, Page(s): nil16
    Request permission for commercial reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizer's Message

    Publication Year: 2006, Page(s): nil17
    Request permission for commercial reuse | PDF file iconPDF (42 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): nil18
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Milestones in Communications

    Publication Year: 2006, Page(s): 1
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (26 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 1

    Publication Year: 2006, Page(s):nil19 - nil22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (142 KB) | HTML iconHTML

    Provides an abstract of the presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 2

    Publication Year: 2006, Page(s):nil23 - nil28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1191 KB) | HTML iconHTML

    Provides an abstract of the presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2006, Page(s): nil29
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Party: Pastry-Like Multi-hop Routing Protocol for Wireless Self-Organizing Networks

    Publication Year: 2006, Page(s):2 - 7
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3227 KB) | HTML iconHTML

    In this paper we propose Party, a new routing protocol for wireless Self-Organizing Networks. This protocol is intended to be applied in environments with large number of nodes where the scalability of the routing protocols plays an important issue; it is well known that the current ad hoc routing protocols do not scale to work efficiently in networks of more than a few hundred nodes. In Party, no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-OPEP: An On-Demand Group Key Agreement Protocol for MANETs

    Publication Year: 2006, Page(s):8 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2180 KB) | HTML iconHTML

    Securing a multicast architecture is a basic procedure in order to avoid attacks and guarantee the communication integrity and confidentiality. This becomes more vital when dealing with ad hoc network. The lack of physical and administrative infrastructure and the dynamic topology, make the ad-hoc network more arduous to be secured. In this paper, we propose a key management protocol to secure ad-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Power-Aware Routing in OLSR Protocol

    Publication Year: 2006, Page(s):14 - 19
    Cited by:  Papers (13)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1416 KB) | HTML iconHTML

    In ad hoc networks, where there is no infrastructure, batteries lifetime are scare resource. However, many routing protocols in ad hoc networks have been proposed to provide and maintain routes without taking into account energy consumption. Recently, power control in mobile ad-hoc networks has been the focus of extensive research. In this paper, we propose a new scheme to make energy aware routin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Load Balanced Ad Hoc Routing Protocol

    Publication Year: 2006, Page(s):20 - 26
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1107 KB) | HTML iconHTML

    Most of the routing algorithms in mobile ad hoc networks are based on the shortest path metric, which results in using the same path for several sessions. Consequently, nodes will lose their power, and their paths will eventually become invalid. This paper presents a new method for achieving better load balancing in mobile ad hoc networks. It targets load balancing at the routing layer of the Dyna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyses Authentication and KeyAgreement (AKA) Protocol for UMTS Mobile Networks

    Publication Year: 2006, Page(s):27 - 31
    Cited by:  Papers (1)  |  Patents (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2390 KB) | HTML iconHTML

    This paper analyses the authentication and key agreement (AKA) protocol for UMTS mobile networks, where a new authentication protocol which is able to reduce the network traffic and signaling message between entities, and consequently the bottleneck at authentication centre is avoided, this is achieved by reducing the number of messages between mobile and authentication centre, and then red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimised resource management for NEMO mobile networks

    Publication Year: 2006, Page(s):32 - 37
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (2185 KB) | HTML iconHTML

    In NEMO (NEwork Mobility) context, service degradation or forced call termination may occur because of frequent handoffs. In this paper, we propose and evaluate a new scheme for quality of service guaranty support. This scheme called Time-based Bandwidth Reservation (TBR) is adapted to NEMO specifications and consists in sending reservation requests to the neighboring cells based on real-time meas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vertical Handover Support for Multimode Mobile Terminal using Multi-Homed MIPv4

    Publication Year: 2006, Page(s):38 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (535 KB) | HTML iconHTML

    Basic mobile IPv4 (MIPv4) operation constraints applications bound to the same home address (HoA) to use the same physical interface because traffic is only tunneled towards a single care-of-address (CoA) by the home agent (HA). This prevents different applications from using different physical interfaces. Solutions to address this problem have been proposed that require configuration of filters i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Management Mechanism for routing in Ad-Hoc Wireless Networks

    Publication Year: 2006, Page(s):44 - 49
    Cited by:  Patents (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    Power control techniques are used in wireless communications to reduce interference and save energy. This strategy has particularly interesting applications in a multihop MANET(mobile ad-hoc networks), because the transmission power required for the communication between two nodes is increased exponentially with their distance, and the total power required to transmit a packet via multihop may be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System Level Model for the Wireless Channel Unreliability in Mobile Cellular Networks

    Publication Year: 2006, Page(s):50 - 55
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (4095 KB) | HTML iconHTML

    In this paper, a new system level approach for the wireless channel unreliability modeling is proposed. Firstly, in order to characterize the call interruption process due to the wireless channel unreliability, the Gilbert-Elliot model is used to obtain the probability distribution of the interruption time. Then, it is shown that link unreliability can be adequately modeled by considering a Poisso... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M-PSK Modulation using Mod-M Turbo Codes

    Publication Year: 2006, Page(s):56 - 61
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1203 KB) | HTML iconHTML

    In most communication systems, power and bandwidth are limited. To achieve more reliability with consuming less power, turbo codes can be used as a powerful coding technique. On the other hand, to overcome the bandwidth constraint, a higher order modulation, such as M-PSK, may be needed. Heuristically it seems natural to use an encoding scheme whose symbol size is equal to the size of modulation s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and equalization of delay in asynchronous CDMA system using unscented filtering

    Publication Year: 2006, Page(s):62 - 66
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1756 KB) | HTML iconHTML

    In this paper, we present analysis and equalization for asynchronous received signals in a code-division- multiple-access (CDMA) system. The equalization is performed using the unscented filer (UF). This equalization helps the multiuser detector to estimate the desired signal in asynchronous system without the need of estimating the delays of the asynchronous users. Simulations are presented to sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BER for M-QAM with Space Diversity and MRC in Rician Fading Channels

    Publication Year: 2006, Page(s):67 - 72
    Cited by:  Papers (2)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1547 KB) | HTML iconHTML

    This paper presents simple bit error rate results for M-ary quadrature amplitude modulation (M-QAM) transmitted over slow, flat, identically independently distributed (i.i.d) Rician fading channels and using space diversity to enhance coverage and capacity. A single exponential function is used to approximate the bit error rates (BER) for M-QAM modulation over a Gaussian channel. This approximatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supported Active Users in a MC-CDMA System Under Intercell Interference

    Publication Year: 2006, Page(s):73 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3098 KB) | HTML iconHTML

    In this proposal the sensitivity and the impact of an interfering base station based on a MC-CDMA system is investigated and analyzed. The maximum number of active users in an MC-CDMA system is analyzed using conventional channel coding, turbo code and iterative de-mapping processes with different values of signal interference ratio, under an intercell interference environment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.