By Topic

2008 Third International Conference on Systems and Networks Communications

26-31 Oct. 2008

Filter Results

Displaying Results 1 - 25 of 79
  • [Front cover]

    Publication Year: 2008, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2008, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (18 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2008, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2008, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • ICSNC 2008 Preface

    Publication Year: 2008, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (73 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICSNC 2008 Committees

    Publication Year: 2008, Page(s):xiii - xxiv
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • I-CENTRIC 2008 Preface

    Publication Year: 2008, Page(s): xxv
    Request permission for commercial reuse | PDF file iconPDF (72 KB) | HTML iconHTML
    Freely Available from IEEE
  • I-CENTRIC 2008 Technical Program Committee

    Publication Year: 2008, Page(s):xxvi - xxviii
    Request permission for commercial reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Multi-user Frequency Pre-filtering Technique for MIMO SFBC MC-CDMA Systems

    Publication Year: 2008, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper deals with downlink space-frequency block coding (SFBC) with a multi-user pre-filtering technique for MIMO MC-CDMA systems. We consider the use of an antenna array at both the base station (BS) and the user terminal (UT). The space-frequency block codes allow that the spatial diversity be efficiently exploited and the linear multi-user frequency pre-filtering technique modulates the tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impacts of Transmission Range in Homogeneous Wireless Networks

    Publication Year: 2008, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (850 KB) | HTML iconHTML

    In this paper the issue of transmission range in homogeneous wireless networks (HWNs) is addressed. In such networks, wireless mobile nodes are assumed to use the same transmission ranges. In HWNs, higher transmission ranges reduce the number of hops that packets need to reach their destinations, but they also increase the number of nodes that locally compete for the medium access. On the other ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design, Simulation and Implementation of a Channel Equalizer for DVB-T On-channel Repeaters

    Publication Year: 2008, Page(s):11 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (982 KB) | HTML iconHTML

    This article describes the design and implementation of a channel equalizer for a terrestrial digital television (digital video broadcasting-terrestrial, DVB-T) on-channel repeater, namely gap-filler. Two are the benefits of including this equalizer in a repeater setup: on one hand, the transmitted signal requires a lower dynamic range and its degradation becomes smaller at the output amplifiers, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fairness in a Static Wireless Network

    Publication Year: 2008, Page(s):17 - 22
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    In a wireless network the communication works in half duplex mode and nodes that can interfere together. In this context, fairness is not obvious. This paper will focus on fairness in the received packets by each node. Fairness is evaluated for a static network topology called Star Network. Some simulations are used to illustrate a way to get fairness in the network by controlling the flow rates o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion Detection: A Survey

    Publication Year: 2008, Page(s):23 - 26
    Cited by:  Papers (23)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    The rapid proliferation of computer networks has changed the prospect of network security. An easy accessibility condition cause computer networkpsilas vulnerable against several threats from hackers. Threats to networks are numerous and potentially devastating. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of User Experience of Access Selection in Multi-operator Environments

    Publication Year: 2008, Page(s):27 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    In future wireless systems can ambient networks technology enable the users to utilize a multitude of networks. Frequent roaming between networks will be a key characteristic of mobile services and the terms "home" and "visited" networks will be common also at local and national level. In this paper we will investigate cooperation between operators and what benefits the end users can expect. Ambie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Design of a Novel Backward-Wave Scanning-Beam Antenna Based on Negative Refractive Index Material Structures

    Publication Year: 2008, Page(s):33 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    A new field of physics has appeared with the emergence of materials known as "Left handed materials" (LHM) or "metamaterials". These materials show very particular characteristics. Their index of refraction has a negative value, which results in the reversal of Snell's law. Whereas, in traditional material the Poynting vector S always forms a right- handed triplet with E and H (S = E Lambda H). In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Management Model for Wireless Broadband Networks

    Publication Year: 2008, Page(s):38 - 43
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (323 KB) | HTML iconHTML

    Currently, due to questions of financial order, the Internet Service Providers do not invest in rural areas, because the investment does not pay. This fact originates, more and more, the appearance of the so called WBN (Wireless Broadband Networks), that are going to supply Internet access to the populations, discriminated by this circumstance. The aspects related to the management of these networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Employing of Clustering Algorithm CWN-PAM in Mobile Network Planning

    Publication Year: 2008, Page(s):44 - 49
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (492 KB) | HTML iconHTML

    With the rapid development in mobile network we need effective network planning tool to satisfy the need of customers. However, deciding upon the optimum placement for the base stations (BS) to achieve best services while reducing the cost is a complex task requiring vast computational resource. This paper addresses antenna placement problem or the cell planning problem, involves locating and conf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survivability Quantification of Real-Sized Networks Including End-to-End Delay Distributions

    Publication Year: 2008, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1101 KB) | HTML iconHTML

    In a telecommunication network it is essential to provide virtual connections between peering nodes with performance guarantees such as minimum throughput, maximum delay or loss. Critical services in telecommunication network should be continuously provided even when undesirable events like sabotage, natural disasters, or network failures happen. The design, construction and management of network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing and Performance Analysis of Double-Buffered Omega Networks Supporting Multi-class Priority Traffic

    Publication Year: 2008, Page(s):56 - 63
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    In this paper the modeling of Omega Networks supporting multi-class routing traffic is presented and their performance is analyzed. We compare the performance of multi-class priority mechanism against the single priority one, by gathering metrics for the two most important network performance factors, namely packet throughput and delay under uniform traffic conditions and various offered loads, us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Joint Coded Two-Step Interference Cancellation Technique for a Multiuser MIMO-SC-FDE System

    Publication Year: 2008, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    In this paper, we present a transceiver design for a broadband multiuser-MIMO communication system, where the co-channel users are equipped with multiple transmit and multiple receive antennas. In particular, we propose a joint coded two-step interference cancellation scheme which effectively combats the effect of co-channel interference (CCI) and inter-symbol interference (ISI) in multipath chann... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic Demand Derivation in IP-Based Multi Service Class Environment

    Publication Year: 2008, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Multimedia communication services over multi-domain heterogeneous network infrastructure need end to end (E2E) guarantees for quality of services (QoS). In this context, the proper network dimensioning and traffic engineering of each network domain are significantly dependent on the accuracy of the of traffic demand estimation. The aim of this paper is to propose an algorithm, which estimates the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind a Daptive Channel Shortening with a Generalized Lag-Hopping Algorithm Which Employs Squared Auto-Correlation Minimization [GLHSAM]

    Publication Year: 2008, Page(s):75 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB) | HTML iconHTML

    A generalized blind lag-hopping adaptive channel shortening (GLHSAM) algorithm based upon squared auto-correlation minimization is proposed. This algorithm provides the ability to select a level of complexity at each iteration between the sum-squared auto-correlation minimization (SAM) algorithm due to Martin and Johnson and the single lag auto-correlation minimization (SLAM) algorithm proposed by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AURED – Autonomous Random Early Detection for TCP Congestion Control

    Publication Year: 2008, Page(s):79 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1427 KB) | HTML iconHTML

    Congestion control is widely used in the Internet to prevent congestion collapse. Because data are inherently bursty, routers are provisioned with large buffers to absorb this burstiness and to achieve high link utilization. At the same time, large buffers lead to high queuing delays at congested routers. RED (random early detection) was introduced to relieve this problem so as to achieve high lin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Design and Implementation of Profile Management Module Including Policy-Based Repository in the Customer Network Management System for Corporate-Level Network Service Clients

    Publication Year: 2008, Page(s):85 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (425 KB) | HTML iconHTML

    In legacy customer network management (CNM) systems, there is no key element to connect between CNM service customers and their network lines because of the absence of customer group identification information. In this condition, some of customers who want to manage all network lines which are requested several corporate departments cannot manage or monitor all their ATM network lines with only on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.