2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540)

23-28 Sept. 2000

Go

Filter Results

Displaying Results 1 - 25 of 125
  • 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540)

    Publication Year: 2000
    Request permission for commercial reuse | |PDF file iconPDF (2158 KB)
    Freely Available from IEEE
  • Performance of hybrid ARQ schemes using turbo trellis coded modulation for wireless channels

    Publication Year: 2000, Page(s):1025 - 1029 vol.3
    Cited by:  Papers (7)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (474 KB)

    In this paper, bandwidth efficient Type-I and Type-II hybrid-ARQ (HARQ) schemes using turbo trellis coded modulation (TTCM) are proposed. These schemes combine the power efficiency of turbo codes with the bandwidth efficiency of trellis coded modulation (TCM) to create an effective hybrid FEC/ARQ system. Several packet combining schemes are presented for use in conjunction with iterative turbo dec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2000, Page(s):0_2 - 0_6
    Request permission for commercial reuse | |PDF file iconPDF (329 KB)
    Freely Available from IEEE
  • LMDS standards architectural issues

    Publication Year: 2000, Page(s):1590 - 1594 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB)

    The IEEE 802.16.1 Task Group is developing PHY and MAC protocols as part of the LAN/MAN series of standards. Issues related to standards development for LMDS are discussed. Solutions incorporated into the current set of baseline documents are described, along with rationale for their inclusion View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS analysis of cellular systems with linear topology and high user mobility

    Publication Year: 2000, Page(s):1584 - 1589 vol.3
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (516 KB)

    This paper proposes an analytical approach for the evaluation of the quality of service (QoS) perceived by end users in cellular communication systems which provide radio coverage of suburban loads or highways, where the user mobility is typically very high. The approach is based on the interaction between the queueing model of an individual cell and an accurate description of the end user behavio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-user detection via iterative processing

    Publication Year: 2000, Page(s):1030 - 1034 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (364 KB)

    Multi-user detection of CDMA signals is studied in the light of iterative processing. The factor graph representation of a CDMA system is used to develop a low-complexity joint detection algorithm. This algorithm replaces the large sums that appear at the multiple access nodes by simple averages and ignores the error control code network of the interfering users, assuming a fixed probability distr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-demand location aware multicast (OLAM) for ad hoc networks

    Publication Year: 2000, Page(s):1323 - 1328 vol.3
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (520 KB)

    This paper introduces OLAM, a novel on-demand location aware multicast protocol for ad hoc networks. The protocol assumes that, through the use of positioning system devices, such as Global Positioning System (GPS) devices, each node knows its own position and the current (global) time, and it is able to efficiently distribute these measures, including its current transmission radius, to all other... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a universal model for personal mobility management

    Publication Year: 2000, Page(s):1578 - 1583 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (880 KB)

    The convergence of wired/wireless telecommunication networks and IP-based data networks to form a seamless global personal communication system has set up the stage for a network independent universal location service. Symbolic representation of location space in terms of cells is the key to its viability. Under this framework, universal learning, estimation and prediction of personal mobility is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scene adaptive multiple coding scheme for robust image transmission

    Publication Year: 2000, Page(s):1204 - 1208 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (748 KB)

    We propose a combined source and channel coding scheme for image transmission over noisy channels. The key component is extracting and preserving the scene information and incorporating it with unequal error protection to combat the channel errors. After hierarchical wavelet decomposition of the image, wavelet coefficients with a parent-child relationship are grouped into wavelet blocks and classi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting the unicast functionality of the on-demand multicast routing protocol

    Publication Year: 2000, Page(s):1317 - 1322 vol.3
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (536 KB)

    An ad hoc wireless network is composed of mobile hosts without any wired infrastructure support. In mobile ad hoc networks, unicast and multicast routing protocols are faced with the challenge of producing multihop routes because of limited radio propagation range. In addition, routing protocols must manage mobility and be bandwidth and power efficient. The on-demand multicast routing protocol (OD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DC error correction for image transmission over wireless channels

    Publication Year: 2000, Page(s):1237 - 1242 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (616 KB)

    With the advances in 3G mobile communications, wireless multimedia communications have received increased attention. One of the most serious problems in the wireless transmission of images is the loss of macroblock (MB) synchronization. In 1995, the error resilient entropy code (EREC) was proposed to solve the MB synchronization problem. However, EREC leads to two new error propagation issues: AC ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DS-41 and UMTS intersystem roaming

    Publication Year: 2000, Page(s):1575 - 1577 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (272 KB)

    Currently, two 3rd-generation CDMA (code division multi access) systems have been standardized. The UMTS (Universal Mobile Telecommunication System) adopts W-CDMA (wideband CDMA) direct spread (DS) air interface and the cdma2000 system adopts the cdma2000 multicarrier (MC) air interface. Currently the UMTS system is connected to a GSM-MAP based network protocol and the cdma2000 system is connected... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On reducing packet latencies in ad hoc networks

    Publication Year: 2000, Page(s):1482 - 1487 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (380 KB)

    The ad hoc on-demand distance vector (AODV) is an on-demand routing protocol designed specifically for mobile, ad hoc networks. But the packet latencies with AODV can be very high, >100 ms on average, especially when the network load is low and node mobility is high. To mitigate this effect, we have enhanced AODV with a proactive technique, which lets receiver nodes broadcast periodic `beacons'... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative channel estimation for turbo codes over fading channels

    Publication Year: 2000, Page(s):1019 - 1024 vol.3
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    A method for coherently detecting and decoding turbo coded BPSK signals transmitted over frequency-flat fading channels is discussed. Estimates of the complex channel gain and variance of the additive noise are derived first from known pilot symbols and an estimation filter. After each iteration of turbo decoding, the channel estimates are refined using information fed back from the decoder. Both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • W-CDMA random access with priority resolution

    Publication Year: 2000, Page(s):1152 - 1156 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (424 KB)

    We analyze the possibility to apply the tree random access protocol (also called the stack protocol) for the W-CDMA part in the UTRA radio interface proposition. We study also a priority system applied on the random access directly. The analytical model uses generating functions and an algebraic method in order to show the stack protocol performance. Also, numerical and simulation results are pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Average BER performance of noncoherent orthogonal M-FSK over Nakagami fading channels

    Publication Year: 2000, Page(s):1065 - 1069 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB)

    The average bit error rate (BER) performance of M-ary orthogonal noncoherent frequency-shift-keying (FSK) over frequency-selective Nakagami-m fading channels with an exponentially decaying power delay profile is studied. Exact analytical results when suboptimum square-law combining type of reception is used are first presented. Metrics and performance of maximum likelihood (ML) type of receivers a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Credit-based dynamic reservation integrated services multiple access (DRISMA) for wireless ATM networks

    Publication Year: 2000, Page(s):1199 - 1203 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (428 KB)

    In this paper, we extend our previous dynamic reservation integrated services multiple access (DRISMA) protocol for the integration of constant bit rate (CBR), variable bit rate (VBR) and unspecified bit rate (UBR) traffic over wireless ATM networks. DRISMA provides CBR services by pre-assigning slots in a frame and VBR services by reserving slots on a bandwidth-on-demand basis. By using a request... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New throughput enhancing techniques for wireless ATM networks

    Publication Year: 2000, Page(s):1516 - 1520 vol.3
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (268 KB)

    In this paper we introduce new techniques to enhance the throughput of wireless ATM networks. These techniques deal with two aspects. The first aspect is reducing the number of bits in the ATM cell header to allow the use of a shorter class of the powerful BCH (Bose-Chaudhuri-Hocqenghem) code to correct the bit-errors within the cell header caused by the wireless channel. The second aspect is deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rate-adaptive protocol for wireless data channels

    Publication Year: 2000, Page(s):1345 - 1350 vol.3
    Cited by:  Papers (1)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (484 KB)

    We present a simple heuristic protocol for adaptively adjusting the rate of an error correcting code so as to match the time-varying error probabilities in a slowly fading channel. Channel state is estimated from the past error history. Analysis and simulations indicate excellent performance over a wide variety of channels View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on unequal error protection with punctured convolutional codes in image transmission system over mobile channels

    Publication Year: 2000, Page(s):1253 - 1257 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (472 KB)

    In this paper, the 4-state Markov model is presented as a long-burst error probability model of a mobile channel, and punctured convolutional codes (PCC) are applied to an image transmission system over mobile fast-fading channels. We propose a new scheme of unequal error protection (UEP) in image transmission by means of adjusting the different code rates, the constraint length of the mother code... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A differential correlation approach to blind DPSK symbol estimation

    Publication Year: 2000, Page(s):1166 - 1171 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (412 KB)

    This paper presents a new method for the blind symbol estimation of digital communication signals under linearly distortive channels. The algorithm blindly recovers input user symbols by exploiting second order statistics of the channel output signal collected from two data windows of different size. It does not require an intermediate step of channel identification. Moreover, this differential co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AODV-BR: backup routing in ad hoc networks

    Publication Year: 2000, Page(s):1311 - 1316 vol.3
    Cited by:  Papers (274)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (516 KB)

    Nodes in mobile ad hoc networks communicate with one another via packet radios on wireless multihop links. Because of node mobility and power limitations, the network topology changes frequently. Routing protocols therefore play an important role in mobile multihop network communications. A trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A GPS/ant-like routing algorithm for ad hoc networks

    Publication Year: 2000, Page(s):1232 - 1236 vol.3
    Cited by:  Papers (22)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (500 KB)

    A mobile ad hoc network (MANET) is comprised of mobile hosts that can communicate with each other using wireless links. In this paper we present a novel routing algorithm called GPSAL (GPS/ant-like routing algorithm) which is based on the GPS (Global Positioning System) and mobile software agents modeled on ants for routing in ad hoc networks. We compare our algorithm to the location-aided routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On fundamental issues in mobile and wireless Internet

    Publication Year: 2000, Page(s):1297 - 1302 vol.3
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB)

    Wireless Internet has become possible through the evolution of portable computers and wireless connections over a mobile telephone network. However the realization of a mobile computing environment requires a communication architecture which is not only compatible with the current architectures but also takes into account the specific features of mobility and wirelessness. In this paper, the main ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A comparison of mobility protocols for quasi-dynamic networks

    Publication Year: 2000, Page(s):1569 - 1574 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (520 KB)

    We compare various existing approaches for locating roaming users and providing continuous connectivity in quasi-dynamic networks in which the movement is much more restricted than in ad-hoc networks. However, there are frequent host movements combined with occasional major topology changes (e.g., whole network is changing their point of attachment or getting disconnected). The higher dynamics cau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.