By Topic

2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks

23-27 June 2009

Filter Results

Displaying Results 1 - 25 of 102
  • [Title page]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • WiOpt - general chair's message

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • WiOpt - message from the TPC co-chairs

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (57 KB)
    Freely Available from IEEE
  • Wireless scheduling

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (445 KB)
    Freely Available from IEEE
  • Recent progress in multiuser information theory with correlated sources

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Self-X RAN: Autonomous self organizing radio access networks

    Publication Year: 2009, Page(s):1 - 2
    Cited by:  Papers (1)  |  Patents (10)
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Cooperation at the network level

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Coding for cooperation and relaying

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Lifting the curse of dimensionality: a random matrix-theoretic approach

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (92 KB)
    Freely Available from IEEE
  • Survey on spiked models and their application to wireless commcunications

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (365 KB)
    Freely Available from IEEE
  • Time and space averages in large wireless networks [SpaSWiN Workshop]

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (370 KB)

    Summary form only given, as follows. In this talk, we will discuss some problems related to cooperative spectrum sensing, and show how random matrix theory can help to address them. We will propose a simple test for frequency band sensing in wireless networks. The test is based on the analysis of the ratio of the extreme eigenvalues related to the gain matrix of the channel. The novelty relies in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards client-assisted management in large-scale wireless networks [WinMee Workshop]

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using redundancy to enable interactive communication for moving vehicles

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Where is the action in information theory

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (78 KB)
    Freely Available from IEEE
  • Transmission schedule optimization for half-duplex multiple-relay networks

    Publication Year: 2009, Page(s):1 - 9
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6094 KB) | HTML iconHTML

    Half duplex devices are widely used in today's wireless networks. These devices can only send or receive, but not do both at the same time. In this paper, we use cooperative decode-forward relay strategies to increase the throughput of half-duplex wireless networks. Due to the half duplex constraint, relays need to carefully choose their transmission states in order to maximize the throughput. We ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On models for multi-user Gaussian channels with fading

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1806 KB) | HTML iconHTML

    An analytically tractable model for Gaussian multiuser channels with fading is studied, and the capacity region of this model is found to be a good approximation of the capacity region of the original Gaussian network. This work extends the existing body of work on deterministic models for Gaussian multiuser channels to include the physical phenomenon of fading. In particular, it generalizes these... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Natural selection of message forwarding algorithms in Multihop wireless networks

    Publication Year: 2009, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4921 KB) | HTML iconHTML

    The need for self-managing multihop MANETs (mobile ad hoc networks) arose recently, where the network rapidly adapts to the changes of the environment without any central control. One of the challenges is how to spread the information fast and resource-effectively in the network. This paper presents a novel adaptive framework, which utilizes natural selection for choosing the adequate message forw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-sensor event detection under temporal correlations with renewable energy sources

    Publication Year: 2009, Page(s):1 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5870 KB) | HTML iconHTML

    Sensor networks have major applications in environmental monitoring, relief operations, surveillance, health-care and defense. Future sensor networks would comprise of sensing devices with energy harvesting capabilities from renewable energy sources such as solar power. Multiple sensor nodes deployed in the region of interest would collaborate to achieve a global objective, such as detection of ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical analysis of throughput bounds in random access with ZIGZAG decoding

    Publication Year: 2009, Page(s):1 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4795 KB) | HTML iconHTML

    We investigate the throughput improvement that ZIGZAG decoding (Gollakota and Katabi (2008)) can achieve in multi-user random access systems. ZIGZAG is a recently proposed 802.11 receiver design that allows successful reception of packets despite collision. Thus, the maximum achievable throughput of a wireless LAN can be significantly improved by using ZIGZAG decoding. We analyze the throughput bo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint resource allocation and admission control in wireless mesh networks

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1994 KB) | HTML iconHTML

    Many next generation applications (such as video flows) are likely to have associated minimum data rate requirements to ensure satisfactory quality as perceived by end-users. While there have been prior approaches on supporting quality-of-service (QoS) in mesh networks, they have largely ignored the issues that arise due to self-interference, the interference between different link layer transmiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint load balancing, scheduling, and interference mitigation in multi-cell and multi-carrier wireless data systems

    Publication Year: 2009, Page(s):1 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3447 KB) | HTML iconHTML

    We consider the problem of maximizing the weighted sum data rate in multi-cell and multi-carrier wireless data systems in the presence of interference. We present a scheme that jointly considers load balancing, user scheduling, and interference mitigation to improve the system performance. Our proposed scheme iteratively applies two processes. The first process solves the sub-problem of load balan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Jamming in wireless networks under uncertainty

    Publication Year: 2009, Page(s):1 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2732 KB) | HTML iconHTML

    The problem of jamming plays an important role in ensuring the quality and security of wireless communications, especially at this moment when wireless networks are quickly becoming ubiquitous. Since jamming can be considered as a game in which jammer is playing against the user (transmitter) who would like to transmit signal with good quality and at the same time with a reasonable amount of energ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying RFID tag categories in linear time

    Publication Year: 2009, Page(s):1 - 6
    Cited by:  Papers (4)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (427 KB) | HTML iconHTML

    Given a large set of RFID tags, we are interested in determining the categories of tags that are present in the shortest time possible. Since there can be more than one tag present in a particular category, pure randomized strategies that rely on resolving individual tags are very inefficient. Instead, we rely on a pseudo-random strategy that utilizes a uniform hash function to accurately identify... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.