By Topic

7th International Conference on Communications and Networking in China

8-10 Aug. 2012

Filter Results

Displaying Results 1 - 25 of 175
  • [Front matter]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (66 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2012, Page(s):iii - xv
    Request permission for commercial reuse | PDF file iconPDF (145 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (41 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2012, Page(s):xviii - xx
    Request permission for commercial reuse | PDF file iconPDF (1298 KB)
    Freely Available from IEEE
  • MRS: A click-based multipath routing simulator

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    The ability to forward traffic on multiple paths would be useful for customizing paths for different applications, improving reliability and balancing load. In order to evaluate the behaviour and performance of multipath routing protocols both simulators and test beds are often used. The simulator is used in the first stages and the test bed is used in the final stages of the development process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bandwidth configuration for fractional Brownian motion traffic

    Publication Year: 2012, Page(s):7 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    In DiffServ-aware traffic engineering, a key issue is how to properly allocate bandwidth for different DiffServ class types. Recently, a cumulative allocation strategy, called the Russian doll model (RDM), has gained intensive interests in IETF. The basic RDM, however, only describes the necessary condition of a stable queuing system: the utilization factor must be less than unit. When applied to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Play patterns for path prediction in multiplayer online games

    Publication Year: 2012, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1332 KB) | HTML iconHTML

    Traditional dead reckoning schemes predict a player's position by assuming that players move with constant force or velocity. However, because player movement is rarely linear in nature, using linear prediction fails to produce an accurate result. Among existing dead reckoning methods, only few focus on improving prediction accuracy via genuinely non-traditional methods for predicting the path of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallelizing sequential network applications with customized lock-free data structures

    Publication Year: 2012, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Parallelizing fine-grained network applications on general-purpose multi-core architectures is a big challenge, as it requires fast core-to-core synchronization that is not supported for now. This paper proposes a methodology for parallelizing legacy sequential network applications on multi-core architectures with only minor code rewriting. Single Program Multiple Data (SPMD) parallel programming ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the feasibility of common-friend measurements for the distributed online social networks

    Publication Year: 2012, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    Distributed social networks have emerged recently. Nevertheless, recommending friends in the distributed social networks has not been exploited fully. We propose FDist, a distributed common-friend estimation scheme that estimates the number of common-friends between any pair of users without disclosing the friends' information. FDist uses privacy-preserving common-friend measurements to collect a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for DNS names identical resolution

    Publication Year: 2012, Page(s):30 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Internet users hope that some of names in the DNS name space can get the same DNS resolution results. With the development of internationalized domain name (IDN) protocols, more and more IDNs including Chinese domain names are added into the DNS name space and many of them are expected to be identical in the DNS resolution. How to make the DNS name resolution equivalence becomes more critical. Cur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Availability analysis of DNSSEC resolution and validation service

    Publication Year: 2012, Page(s):35 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (491 KB) | HTML iconHTML

    Availability of DNSSEC resolution and validation service against man-in-the-middle attacks are analysed in this paper, and possible vulnerabilities are introduced and classified. Experiments show DNSSEC client is vulnerable because the attacks are always successful, but they are failed to recursive server, at the same time, attacks to recursive server will bring about numerous retries, and the num... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Bayesian Compressed Sensing based localization in wireless networks

    Publication Year: 2012, Page(s):43 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    This paper exploits the most recent developments in sparsity approximation and Compressed Sensing (CS) to efficiently perform localization in wireless networks. Based on the spatial sparsity of the mobile devices distribution, a Bayesian Compressed Sensing (BCS) scheme has been put forward to perform accurate localization. Location estimation is carried out at a network central unit (CU) thus sign... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GPP-based soft base station designing and optimization (invited paper)

    Publication Year: 2012, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    In this paper, we compared several software defined radio platforms and proposed the general architecture of GPP (General Purpose Processor)-based soft base stations. Then, we studied on the scheme design of resource allocation and algorithm optimization in soft base station implementation. Finally, as an instance of our study above, a prototype of GPP-based soft base station referring to 3GPP LTE... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A radio over fiber link for the wireless distribution of 3-Gb/s uncompressed HD video (invited paper)

    Publication Year: 2012, Page(s):54 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    A radio over fiber link for the wireless distribution of 3-Gb/s uncompressed HD video is developed. The power fading caused by the dispersion of the optical fiber is effectively reduced by using a polarization modulator (PolM) in the transmitter. In the receiver, an injection-locked frequency-doubling optoelectronic oscillator (OEO) is employed to simultaneously extract the RF carrier and perform ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PNN-based QoE measuring model for video applications over LTE system

    Publication Year: 2012, Page(s):58 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Users' quality of experience (QoE) is a key factor in the success of video applications over the Long Term Evolution (LTE) networks. Thus, evaluating the QoE of video applications is of tremendous importance in design and optimization of wireless video processing and transmission systems. In this paper, we propose a QoE measuring model for the quality of video applications by using probabilistic n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection algorithms for physical network coding

    Publication Year: 2012, Page(s):63 - 67
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    This paper investigates multi-user detection (MUD) as well as virtual single-user detection (VSUD) for denoising-based physical network coding in two-way relay channels. In MUD, the two source messages are detected separately and then mapped into a relaying message. In VSUD, the relaying message is obtained directly by detecting the received signal. Maximum likelihood (ML) algorithm and linear alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection for two-way relay MIMO channels

    Publication Year: 2012, Page(s):68 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    We investigate virtual single user detection (VSUD) for physical network coding in two-way relay MIMO channels. We propose (non)-linear detection algorithms which are derived from maximum-likelihood (ML) structure. Simulation results show that VSUD with ML detection can achieve the best performance. VSUD with Euclidian distance based detection provide the same performance as multiple user detectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SOPC-based cooperative awareness nodes in smart multimedia sensor networks

    Publication Year: 2012, Page(s):71 - 75
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1034 KB) | HTML iconHTML

    The design mind of SOPC (System on Programmable Chip), hardware & software co-design, will bring the system optimization with larger degree of freedom. It will establish the foundation on realizing the miniaturization and more efficient local preprocessing in smart cooperative sensor networks. In this contribution, a solution is proposed for smart multimedia sensor nodes based on the SOPC fram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and application on LTE technology in smart grids

    Publication Year: 2012, Page(s):76 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    The development of smart grid requires higher data rate and wider coverage for current communication networks. What's more, the communication network should be rapidly and flexibly deployed in emergency situation. In this paper, we first investigate the requirements of communication network in smart grid. Then application of LTE in normal and emergency situations in smart grid is proposed. Finally... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The research of time unified system in smart grid

    Publication Year: 2012, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    According to the intelligent substation and the increasing synchronization requirements of Green Power Grid, it is important to establish a communication support network of time synchronization in the whole power grid. This paper offers a comprehensive introduction and detailed analysis of the basic concept, signal type and the networking technology of time synchronization. According to the applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal exploitation of renewable energy for residential smart grid with supply-demand model

    Publication Year: 2012, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (901 KB) | HTML iconHTML

    Future smart grid has been widely conceived to be featured by its flexible supply-demand management and great exploitation of renewable energy. However, due to the volatility of renewable sources, exploitation of renewable energy introduces uncertainty in energy supply. Therefore, it is of practical importance to quantify the optimal exploitation of renewable energy based on the supply-demand fram... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative interference mitigation for indoor dense femtocell networks

    Publication Year: 2012, Page(s):93 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1517 KB) | HTML iconHTML

    It has been predicted that the total mobile traffic in the world will have a ten-fold growth from 2011 to 2016. Moreover, it is estimated that over 80% of the mobile traffic is generated indoors. Massive indoor femtocells are expected to be set up for offloading indoor users from outdoor macrocells and to provide huge capacity to meet high data demands. However, inter-cell interference between fem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downlink subchannel power allocation for multicell WRANs considering inter-cell interference

    Publication Year: 2012, Page(s):99 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (114 KB) | HTML iconHTML

    OFDMA modulation is utilized for downlink and uplink communications in IEEE 802.22 wireless regional area network(WRAN). Because a base station (BS) uses omnidirectional antenna for downlink communications, BS will interfere with consumer premise equipments (CPEs) which use the same subchannel in other cells. Every BS wants to maxmize its sum downlink rate when minimizing co-channel interference w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid overlay/underlay waveform for cognitive radio associated with fractional Fourier transform

    Publication Year: 2012, Page(s):103 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    Spectrum congestion problem is mainly caused by the inefficient spectrum usage. Cognitive radio (CR) and emerging soft decision CR (SDCR) have attracted wide interest as candidates to solve this problem. The former determines unused spectral regions and transmits overlay signals in these bands. The latter exploits both unused and occupied spectral regions simultaneously and dynamically adapts its ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.