By Topic

Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007. WiOpt 2007. 5th International Symposium on

Date 16-20 April 2007

Filter Results

Displaying Results 1 - 25 of 118
  • [Front cover]

    Publication Year: 2007, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (477 KB)
    Freely Available from IEEE
  • Proceedings of the Fifth International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks

    Publication Year: 2007, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2007, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): nil3
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): nil4
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007, Page(s): nil5
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • SpaSWiN Workshop Technical Program Committee

    Publication Year: 2007, Page(s): nil6
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • RAWNET Workshop Technical Program Committee

    Publication Year: 2007, Page(s): nil7
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • WNC^3 Workshop Technical Program Committee

    Publication Year: 2007, Page(s): nil8
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • WiNMee/WiTMeMo Workshop Technical Program Committee

    Publication Year: 2007, Page(s): nil9
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • ConCom Workshop Technical Program Committee

    Publication Year: 2007, Page(s): nil10
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • WiOpt 2007 - Message from the General Chair

    Publication Year: 2007, Page(s): nil11
    Request permission for commercial reuse | PDF file iconPDF (54 KB) | HTML iconHTML
    Freely Available from IEEE
  • WiOpt 2007 - Message from the Technical Program Chairs

    Publication Year: 2007, Page(s): nil12
    Request permission for commercial reuse | PDF file iconPDF (59 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote Speaker

    Publication Year: 2007, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    Entropic Vectors, Convex Optimization and Wireless Networks Information theory is well poised to have an impact on the manner in which future networks are designed and maintained, both because wired networks are ripe for applications such as network coding and also because wireless networks cannot be satisfactorily dealt with using conventional networking tools. The challenge is that most network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (48 KB) | HTML iconHTML

    Power Control in Cellular Networks Power control has been an intellectually challenging and practically important subject in the design of all generations of digital cellular networks. This is a survey talk on the wide range of results and methodologies in the last 15 years of research in this area. It will highlight a unifying framework, a taxonomy of problem space, and several recent results, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (51 KB) | HTML iconHTML

    Multiple Antenna Downlink Channels: From Theory to Practice The multiple antenna (MIMO) downlink channel has recently been the subject of tremendous interest, primarily because MIMO (spatial multiplexing) benefits can be realized on this channel even if mobiles are not equipped with multiple antennas. Realization of these benefits could have a tremendous impact on a number of wireless systems (e.g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    Robust Feedback Control vs Uncertainty Model Complexity: from Information Theory to Networked Control We develop a framework for designing controllers for general, partially observed nonlinear systems which are robust with respect to uncertainties. Most significantly we include both parametric as well as structural model uncertainties. A general deterministic model for uncertainties is introduced,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (26 KB) | HTML iconHTML

    Distributed Algorithms for Resource Allocation in Wireless Networks We will review recent developments in the design of distributed resource allocation algorithms for wireless networks. We will start with an optimization-based formulation of the resource allocation problem and present a solution which suggests a network architecture consisting of congestion control at the end-users and a back-pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote Speaker

    Publication Year: 2007, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB) | HTML iconHTML

    An Introduction to Network Coding Network coding is an emerging area that re-examines fundamental principles of network information flow. The main idea is that we allow intermediate nodes in a network to not only forward but also to process the incoming information flows. The network code is the set of the operations that intermediate nodes perform. This simple idea promises to have a significant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007, Page(s): nil13
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE
  • Link Lifetime as a Function of Node Mobility in MANETs with Restricted Mobility: Modeling and Applications

    Publication Year: 2007, Page(s):1 - 10
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4165 KB) | HTML iconHTML

    We present statistical models to accurately evaluate the distribution of the lifetime of a wireless link in a mobile ad hoc network (MANET) in which nodes move randomly within constrained areas. We show that link lifetime can be computed through a two-state Markov model and further apply the computed statistics to the optimization of segmentation schemes of information stream. Summarizing all thes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coding Achieves the Optimal Delay-Throughput Trade-off in Mobile Ad-Hoc Networks: Two-Dimensional I.I.D. Mobility Model with Fast Mobiles

    Publication Year: 2007, Page(s):1 - 10
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB) | HTML iconHTML

    In this paper, we investigate the delay-throughput trade-off in mobile ad-hoc networks under two-dimensional i.i.d. mobility model with fast mobiles, and show that the optimal trade-off can be achieved using rate-less codes. Given a delay constraint D, we first prove that the maximum throughput per source-destination (S-D) pair is O(radic(D/n)) , and then propose a joint coding-scheduling algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carpooling in Mobile Ad Hoc Networks: the Case of Multiple-Target Route Discovery

    Publication Year: 2007, Page(s):1 - 9
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1193 KB) | HTML iconHTML

    Carpooling is an efficient transportation option in real life because it reduces traffic and cost. We apply this idea to MANETs and propose multiple-target route discovery (MTRD) for on-demand routing protocols. MTRD aggregates multiple route requests into one RREQ message and discovers multiple targets simultaneously. When a node has to find a route to a destination, instead of immediately inject... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of two-hop message spreading in DTNs

    Publication Year: 2007, Page(s):1 - 8
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1601 KB) | HTML iconHTML

    In this paper, a delay tolerant network environment is considered where the source is in full control of the two-hop spreading mechanism by setting key parameters such as the number of copies allowed to be spread in the network and the delay bound of the messages. The analysis allows for a differentiation between the source of the message and the intermediate nodes (in terms of e.g. transmission p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Publication Year: 2007, Page(s): nil14
    Request permission for commercial reuse | PDF file iconPDF (10 KB)
    Freely Available from IEEE