By Topic

Communication Networks and Services Research Conference, 2009. CNSR '09. Seventh Annual

Date 11-13 May 2009

Filter Results

Displaying Results 1 - 25 of 90
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (573 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (169 KB)
    Freely Available from IEEE
  • Message from the Conference General Co-chairs

    Publication Year: 2009, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (71 KB) | HTML iconHTML
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (68 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):xiv - xvii
    Request permission for commercial reuse | PDF file iconPDF (90 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xviii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (97 KB)
    Freely Available from IEEE
  • Keynote 1

    Publication Year: 2009, Page(s):xxiv - xxv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    The explosive growth of information technology (IT) and communications infrastructures, coupled with the diversity of their components and a shortage of skilled IT workers, have resulted in systems whose control and timely management exceeds human ability. Current IT management solutions are costly, ineffective, insecure and labor intensive. autonomic computing (AC) models IT infrastructures and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 2

    Publication Year: 2009, Page(s):xxvi - xxvii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (81 KB) | HTML iconHTML

    In the early days of wireless communications the research community used to view multipath-induced dispersion as an undesirable propagation phenomenon, which could only be combatted with the aid of complex channel equalizers. The longer the Channel Impulse Response (CIR) was, the more complex the channel equalizer became. However, provided that the complexity of a sufficiently high-memory channel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote 3

    Publication Year: 2009, Page(s):xxviii - xxix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (85 KB) | HTML iconHTML

    Summary form only given. Explosion of data and mass availability of Internet connections around the globe had created huge bandwidth requirements for bandwidth hungry applications. Despite the technological advances in the core and their ability to transport, still much work has to be done in the access networks in order to be able to let the broadband traffic be transmitted transparently. Current... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial 1 [breaker page]

    Publication Year: 2009, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Tutorial 2 [breaker page]

    Publication Year: 2009, Page(s):xxxi - xxxii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Semiblind Multiuser MIMO Channel Estimators Using PM and RRQR Methods

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    Estimating the channel state information (CSI) of several transmitters that use orthogonal space-time block codes (OSTBC) to communicate with a single receiver is considered. Based on rank revealing QR (RRQR) factorization and propagator method (PM), two new algorithms to estimate multiuser MIMO channels are proposed. The algorithm estimates the subspace spanned by the user channels use only a few... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiMAX Network Optimization - Analyzing Effects of Adaptive Modulation and Coding Schemes Used in Conjunction with ARQ and HARQ

    Publication Year: 2009, Page(s):6 - 13
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    The flexibility of WiMAX framework offers new dimensions for cross-layer optimization and can be exploited to optimize the application performance. This article focuses on identifiers that have direct impact on quality of service (QoS)and effect of such identifiers is evaluated through computer simulation using OPNET Modeler 14.5 Wireless Suite. In this paper we have used advanced WiMAX features s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Carrier Frequency Offset Mitigation in OFDM Systems Using Efficient Tone Reservation

    Publication Year: 2009, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    One of the major drawbacks of orthogonal frequency division multiplexing (OFDM) is sensitivity to carrier frequency offset (CFO) caused by a mismatch between the transmitter and receiver oscillators. CFO destroys the orthogonality of the subcarriers and introduces intercarrier interference (ICI), reducing the system performance. Previously, tone reservation (TR) was considered for reducing the pea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Multi-channel QoS Model for Random Access Systems

    Publication Year: 2009, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (887 KB) | HTML iconHTML

    In this paper, we present a simple two-class QoS model for random access systems. We provide a practical mechanism for categorizing the available resources into two distinct service classes prior to medium access. We use an a Markov chain model to define the states and transitions, and derive the system access success probability. This provides a mathematical basis for an accurate model that can b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Practical Survey of H.264 Capabilities

    Publication Year: 2009, Page(s):25 - 32
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (465 KB) | HTML iconHTML

    H.264 is excellent for transmitting rich interactive media over narrow and broadband networks, and can be easily integrated into existing and future networks. Video compression efficiency is improved by at least a factor of two over the MPEG-2 standard. H.264 provides bit-rate adaptivity and scalability, which addresses the needs of different applications when transmitted over heterogeneous networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Video Streaming over 802.11b in the Presence of Fading Due to Human Traffic and Bluetooth Interference

    Publication Year: 2009, Page(s):33 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    The performance of video streaming over 802.11b is evaluated through experimental measurements in the presence of fading caused by human traffic, distance and Bluetooth interference, which shares the same 2.4 GHz ISM band. A measurement network consisting of a desktop connected to the wired Internet at the University of New Brunswick (UNB), a wireless laptop and a Bluetooth smart phone were used f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measurement of MPEG-2 Video Streams through a Differentiated Service Domain

    Publication Year: 2009, Page(s):41 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    There is growing popularity of real-time Internet traffic such as audio and video streams. Such traffic benefits from receiving a different level of service from the network than more traditional data traffic. Schemes for providing differing network service for different applications have been proposed under the name QoS (Quality of Service). We investigate the performance of one such scheme by us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optical Access-Metro Network Architecture Based on Passive Access and Burst-Mode Transmission

    Publication Year: 2009, Page(s):47 - 54
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    A network architecture that integrates several WDM PON access segments in a metropolitan area network and uses optical circuit/burst switching is presented here. This architecture targets the delivery of very high speed end to end optical communications between the edge nodes connecting the end users. The combination of circuit switching and burst transmission allows the simultaneous delivery of r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workload Characterization of a Large Systems Conference Web Server

    Publication Year: 2009, Page(s):55 - 64
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1026 KB) | HTML iconHTML

    This paper presents a workload characterization study of the WWW2007 conference Web site. We use both server-sideband client-side measurement to collect data for our analysis. The collected datasets contain approximately 10 million requests from about 130,000 unique visitors generating 215 GB of traffic volume during a 1-year period. Our analysis focuses on usage behaviour, client errors, client n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet Loss Probability Approximation in High-Speed Networks Based on Self-Similar Traffic

    Publication Year: 2009, Page(s):65 - 69
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    As the packet/cell loss ratio (PLR/CLR) is counted as one of the major quality of service (QoS) requirements; in this paper we proposed a linear upper bound expression for the loss probability approximation in high-speed communication network technologies. These technologies can support multiple classes of traffic with different QoS requirements and diverse traffic characteristics, by the use of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BotCop: An Online Botnet Traffic Classifier

    Publication Year: 2009, Page(s):70 - 77
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    A botnet is a network of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. As one the most serious security threats to the Internet, a botnet cannot only be implemented with existing network applications (e.g. IRC, HTTP, or Peer-to-Peer) but also can be constructed by unknown or creative applications, thus makin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.