By Topic

Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE

Date 11-14 May 2008

Filter Results

Displaying Results 1 - 25 of 631
  • [Title page]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Welcome from the General Chairs

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (99 KB)
    Freely Available from IEEE
  • Welcome from the TPC Chairs

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Message from the Publications Chair

    Publication Year: 2008, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • Message from the President

    Publication Year: 2008, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Steering-Organizing Committee

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE
  • Track Chairs

    Publication Year: 2008, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2008, Page(s):ix - xvii
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2008, Page(s):xviii - xxxix
    Request permission for commercial reuse | PDF file iconPDF (572 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2008, Page(s): xl
    Request permission for commercial reuse | PDF file iconPDF (1699 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):xli - lxvii
    Request permission for commercial reuse | PDF file iconPDF (400 KB)
    Freely Available from IEEE
  • An Enhanced Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks

    Publication Year: 2008, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    In this paper we propose an enhanced relay-enabled distributed coordination function (rDCF) for wireless ad hoc networks. The idea of rDCF is to use high data rate nodes to work as relays for the low data rate nodes. The relay helps to increase the throughput and lower overall blocking time of nodes due to faster dual-hop transmission. rDCF achieves higher throughput over IEEE 802.11 distributed c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EUROPCOM - An Ultra-WideBand (UWB)-Based Ad Hoc Network for Emergency Applications

    Publication Year: 2008, Page(s):6 - 10
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    The Information Society Technologies (IST) EUROPCOM project designs and develops an Ultra-WideBand (UWB)-based ad hoc network for search and rescue operations in disaster zones, especially indoors. The primary application of the EUROPCOM system is to provide position tracking of rescue personnel within the disaster zone. Currently no such technologies or systems exist, which can provide the envisa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of a Cooperative Relay-Based Auto-Rate MAC Protocol for Wireless Ad Hoc Networks

    Publication Year: 2008, Page(s):11 - 15
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Cooperative communication is becoming a promising technology for wireless networks by exploiting multipath fading instead of mitigating its impact. To integrate cooperative diversity into practical systems, efficient protocols are needed across the entire protocol stack. This paper presents a Cooperative Relay-Based Auto-Rate MAC protocol (CRBAR) to enhance the multi-rate capability along a long l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness and QoS in Ad-Hoc Networks

    Publication Year: 2008, Page(s):16 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    IEEE 802.11 is a standard for wireless local area networks. Recent works show that this standard has bad performances in ad-hoc mode. In this paper, we analyze the algorithm used by the standard to manage contentions and propose an alternative algorithm to resolve fairness issues observed in the Hidden terminal scenario. Using NS-2 simulator we show that our algorithm has better throughput managem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Performance of Biologically-Inspired Slot Synchronization in Multicarrier Ad Hoc Networks

    Publication Year: 2008, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Decentralized slot synchronization protocols inspired from nature have recently gained considerable interest. By adjusting the internal time reference of a node in response to the detected timing of a received synchronization word, and by following simple rules, synchronization emerges from an initially completely uncoordinated situation. However these protocols typically assume that synchronizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach of Link Availability Estimation for Mobile Ad Hoc Networks

    Publication Year: 2008, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Mobile Ad Hoc Networks have inherently dynamic topologies. Due to the distributed, multi-hop nature of these networks, random mobility of nodes affects not only the availability of radio links between particular node pairs, but also impedes the reliability of communication paths. Therefore, to optimize the performance of existing network protocols, it is important to be able to give an accurate pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Data Forwarding against Denial of Service Attack Using Trust Based Evolutionary Game

    Publication Year: 2008, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (206 KB) | HTML iconHTML

    Self-policing networks such as wireless ad hoc and sensor networks face a number of problems to retain trustworthiness and cooperation of the network. This paper presents an approach to build trust through an effective, dynamic and distributed framework using evolutionary game theory. Noncooperative and evolutionary game theory has been utilized to model the dynamic behavior of selfish nodes in an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Efficient Broadcasting in Wireless Ad Hoc Networks Using Directional Antennas

    Publication Year: 2008, Page(s):36 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    We consider the problem of energy efficient broadcasting in wireless ad hoc network where nodes have limited energy resources. We investigate the scope of using directional antennas for energy efficient broadcast routing in stationary networks and consider the case where wireless nodes can dynamically adjust their transmission power for each broadcast session. Minimum spanning tree (MST) has an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Ad Hoc Networks Capacity and Connectivity Using Dynamic Blind Beamforming

    Publication Year: 2008, Page(s):41 - 45
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    We propose a dynamic blind beamforming scheme which allows to benefit from antenna directivity in large mobile ad hoc networks while avoiding heavy feedback to track mobile nodes localization. By orienting its directional antenna successively in all directions, a source surely but blindly hits its destination without knowing its exact position. Performance is analyzed in terms of total network thr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MACA-MN: A MACA-Based MAC Protocol for Underwater Acoustic Networks with Packet Train for Multiple Neighbors

    Publication Year: 2008, Page(s):46 - 50
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    Unlike the terrestrial wireless networks that utilize the radio channel, underwater networks use the acoustic channel, which poses research challenges in the medium access control (MAC) protocol design due to its low bandwidth and high propagation delay characteristics. Since most of the MAC protocols for wireless terrestrial networks have been designed with negligible propagation delay in mind, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Coding for Information Exchange between Multiple Nodes in Wireless Networks

    Publication Year: 2008, Page(s):51 - 55
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    In this paper we show that mutual exchange of independent information between multiple nodes in a wireless network can be efficiently performed by using network coding. Furthering this conclusion, we propose a mechanism for network coding based multi-node information exchange in large wireless mesh networks. We also provide a series of techniques for applying this mechanism in practical environmen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of the TDD Underlay Concept to Home NodeB Scenario

    Publication Year: 2008, Page(s):56 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    This paper presents a spectrum sharing approach which exploits the clustered distribution of users as would be expected in a typical home with several communicating devices (also known as a femto-cell) or in public places such as airports, malls, etc. From each cluster, a mobile station (MS), known as a gateway mobile (GM), acts as a relay between the other users of the cluster and the base statio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multiplicative and Constant Modulus Signal Based Network Coding Method Applied to CB-Relaying

    Publication Year: 2008, Page(s):61 - 65
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (167 KB) | HTML iconHTML

    In this paper, a new and simple arithmetic operation for network coding (NC) in wireless communication is proposed. It is built on the assumption of constant modulus signals with phase conveyed information such as PSK and employs, in contrast to classical NC finite field additions, a multiplicative NC operation. The benefit of the method is that it decouples the NC operation from forward error cor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.