Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)

27-29 Aug. 2013

Filter Results

Displaying Results 1 - 25 of 85
  • [Front cover]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Greetings from the conference chair

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (166 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (117 KB)
    Freely Available from IEEE
  • Conference committees

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • Program committee members

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (166 KB)
    Freely Available from IEEE
  • List of countries

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • List of institutions

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • A joint multiple resource allocation method for cloud computing environments with different QoS to users at multiple locations

    Publication Year: 2013, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (732 KB) | HTML iconHTML

    In a cloud computing environment, it is necessary to simultaneously allocate both processing ability and network bandwidth needed to access it. The authors proposed the joint multiple resource allocation method in a cloud computing environment that consists of multiple data centers and each data center provides the different network delay. It is also highly likely that each data center would provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modulation-independent non-data-aided SNR estimator for OFDM signals in Nakagami fading channels

    Publication Year: 2013, Page(s):6 - 9
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    A signal-to-noise ratio estimator for OFDM signals in Nakagami-m fading channels is proposed. This estimator can be used with any signal constellation. It is an envelope-based non-data-aided estimator that makes use of statistical-moments of the received OFDM signals to get an estimate of the SNR in time domain. A mathematical derivation of the estimator is given and two main performance measures ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Outage performance of MIMO cognitive relay networks with antenna selection

    Publication Year: 2013, Page(s):10 - 14
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (201 KB) | HTML iconHTML

    In this paper, a novel antenna selection strategy is proposed and analyzed for dual hop MIMO cognitive amplify-and-forward (AF) relay networks over independent non-identically distributed (i.n.i.d.) Nakagami-m fading channels. Spectrum sharing is employed with secondary users constrained by a limit on the interference to the primary receivers. All secondary users are equipped with multiple antenna... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A performance comparison of SQL and NoSQL databases

    Publication Year: 2013, Page(s):15 - 19
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (86 KB) | HTML iconHTML

    With the current emphasis on “Big Data”, NoSQL databases have surged in popularity. These databases are claimed to perform better than SQL databases. In this paper we aim to independently investigate the performance of some NoSQL and SQL databases in the light of key-value stores. We compare read, write, delete, and instantiate operations on key-value stores implemented by NoSQL and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A review of network latency optimization techniques

    Publication Year: 2013, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (87 KB) | HTML iconHTML

    With the growth of the speed of and access to the Internet, the use of networked or cloud-based applications have grown substantially. Even though there is an increase in the speed of the network, latencies presented to networked applications are often unacceptable and result in lowering user experience. In this paper, we review the state of the art techniques that optimize network latency. These ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient phase detectors for M-PSK

    Publication Year: 2013, Page(s):26 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (305 KB) | HTML iconHTML

    In this paper we present new and efficient carrier phase detector structures for M-PSK (M-ary Phase Shift Keying). The phase detectors are NDA (Non Data Aided) and are shown to have the following advantages: (1) they have an efficient fixed-point hardware implementation; (2) they require only 1 sample/symbol; (3) the phase detectors are not dependent upon the signal amplitude and are resilient to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved tree-based strategies for a Connect6 threat-based hardware design

    Publication Year: 2013, Page(s):32 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    Connect6 is a member of the k-in-a-row games family and attracts attention through its fairness and game complexity. Several very good strategies for Connect6 exist. In this paper we improve an already existing threat-based hardware design, which only evaluates the actual allocation of the game board. This strategy calculates a best move and waits until it wins or loses in the next two moves after... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-blind iterative joint channel estimation and K-Best Sphere Decoding for MIMO

    Publication Year: 2013, Page(s):37 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    An efficient and high-performance semi-blind scheme is proposed for Multiple-Input Multiple-Output (MIMO) systems by iteratively combining channel estimation with K-Best Sphere Decoding (SD). To avoid the exponentially increasing complexity of Maximum Likelihood Detection (MLD) while achieving a near optimal MLD performance, K-best SD is considered to accomplish data detection. Semi-blind iterativ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the multilingual terminology from the web

    Publication Year: 2013, Page(s):41 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Multilingual linguistic resources are usually constructed from parallel corpora, but since these corpora are available only for selected text domains and language pairs, the potential of other resources is being explored as well. This article seeks to explore and exploit the idea of using multilingual Web-based encyclopaedias such as Wikipedia as comparable corpora for multilingual terminology ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Global motion estimation under translation-zoom ambiguity

    Publication Year: 2013, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (638 KB) | HTML iconHTML

    Global motion estimation (GME) is an important technique in video processing, segmentation, and compression. In this correspondence, we propose a GME algorithm that offers improved accuracy especially in the presence of large-scale zoom. The proposed algorithm is derived from the observation that there exists an ambiguity between translation and zoom for simple geometric shapes such as lines, whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Field-based job dispatch and migration

    Publication Year: 2013, Page(s):52 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB) | HTML iconHTML

    AgentTeamwork-Lite is a mobile-agent-based job scheduling and monitoring framework that has been developed in the concept of field-based job dispatch and migration where agents migrate over a computing-resource field to highest performance computing nodes for executing their user jobs as if they were electrons sliding down on an electric field. The agents keep monitoring their computing-resource f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RSSI-based error collection applied to estimated sensor locations

    Publication Year: 2013, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    We consider a wireless sensor network (WSN) that needs to install hundreds of sensor nodes over a vast extent of land, (e.g., an orchard temperature sensor network). For monitoring critical events such as frost-prone temperature over an orchard, WSN users, (namely farmers) need to identify all sensor locations, which is however overwhelming from the viewpoints of costs and man power. To address th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low complexity AOA based codebook beamforming for 60 GHz wireless communications

    Publication Year: 2013, Page(s):64 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    This paper considers a beamforming (BF) system for 60 GHz wireless communications. A low complexity codebook-based BF scheme that uses the signal angle-of-arrival (AOA) is proposed. This exploits the ability of a millimeter-wave (MMW) antenna array to provide the signal AOA. The effective power beam width (EPBW) is defined to obtain beams that are approximately orthogonal. A reduced transmit beam ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fractional 90-degree phase-shift filtering based on Liouville-Weyl differintegral

    Publication Year: 2013, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (150 KB) | HTML iconHTML

    In this brief, fractional 90-degree phase-shift filtering technique is investigated. First, thanks to the two commonly used Liouville and Weyl fractional integral definitions, we present Liouville and Weyl fractional differintegrators which are generalized magnitude-and-phase modulations. Then, paralleling a Liouville fractional differintegrator with a Weyl fractional differ-integrator to obtain a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crosstalk measurements in DSL rings

    Publication Year: 2013, Page(s):73 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Due to the inverse relation between cable length and transmission bit rate, many current DSL deployments do not truly benefit from the wide spectrum of VDSL2. In this paper, we propose a new DSL network technology, called DSL Rings (DSLRs), to overcome the challenge of long cable runs in DSL networks. Utilizing MIMO techniques from the central office to the pedestal and a ring network between the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved progressive lossy-to-lossless coding method for arbitrarily-sampled image data

    Publication Year: 2013, Page(s):79 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (143 KB) | HTML iconHTML

    A method for the progressive lossy-to-lossless coding of arbitrarily-sampled image data is proposed. Through experimental results, the proposed method is demonstrated to have a rate-distortion performance that is vastly superior to that of the state-of-the-art image-tree (IT) coding scheme. In particular, at intermediate rates (i.e., in progressive decoding scenarios), the proposed method yields i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.