By Topic

First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004.

5-8 Jan. 2004

Filter Results

Displaying Results 1 - 25 of 158
  • 2004 1st IEEE Consumer Communications and Networking Conference (IEEE Cat. No.04EX745)

    Publication Year: 2004
    Request permission for commercial reuse | PDF file iconPDF (1330 KB)
    Freely Available from IEEE
  • 2004 1st IEEE Consumer Communications And Networking Conference CCNC 2004

    Publication Year: 2004, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (1330 KB)
    Freely Available from IEEE
  • 2004 1st IEEE Consumer Communications And Networking Conference CCNC 2004

    Publication Year: 2004, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (1261 KB)
    Freely Available from IEEE
  • Letter from the general chair

    Publication Year: 2004, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (1269 KB) | HTML iconHTML
    Freely Available from IEEE
  • Letter from the Technical Program Chairs

    Publication Year: 2004, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (1270 KB) | HTML iconHTML
    Freely Available from IEEE
  • Keynote - Crossing the chasm: guiding digital network technology into the consumer world

    Publication Year: 2004, Page(s): v
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1371 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote - The connected home

    Publication Year: 2004, Page(s): vi
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1376 KB)

    Provides an abstract of the keynote presentation and a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Organizing Committee

    Publication Year: 2004, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (1306 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2004, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (1345 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2004, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (1295 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s):xi - xxiii
    Request permission for commercial reuse | PDF file iconPDF (1367 KB)
    Freely Available from IEEE
  • Convergence of residential gateway technology: analysis of evolutionary paths

    Publication Year: 2004, Page(s):1 - 6
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1408 KB) | HTML iconHTML

    A new OSI (Open Systems Interconnection)-based model is described that can be used for the classification of residential gateways (RG). It is applied to analyze current gateway solutions and to draw evolutionary paths for the mid-to-long term. It is concluded that set-top boxes and broadband modems especially, in contrast to game consoles and PCs, have a strong potential to evolve towards gateways... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource management and scheduling for the QoS-capable home network wireless access point

    Publication Year: 2004, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1776 KB) | HTML iconHTML

    We propose and evaluate a resource management and scheduling algorithm for a quality of service (QoS)-aware wireless access router for use in enterprise and home network solutions. The proposed algorithm provides delay and packet loss service guarantees to a diverse set of application traffic classes, produced as a result of convergence of home entertainment and data networks. The algorithm provid... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 802.11 over coax - a hybrid coax-wireless home network using 802.11 technology

    Publication Year: 2004, Page(s):13 - 18
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1550 KB) | HTML iconHTML

    We address the challenge of a ubiquitous home network for new high-bandwidth applications and services such as video. We present a new concept of a hybrid coax-wireless home network using IEEE 802.11 technology. We further analyze this solution from a technical as well as other aspects and show its superiority by comparing it to alternative solutions. With data rates of up to 54 Mbps, guaranteed Q... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS technology for home networks

    Publication Year: 2004, Page(s):19 - 24
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1612 KB) | HTML iconHTML

    With widespread Internet technologies, and the increasing number of users owning networking devices at home, home LANs are becoming a popular utility. Home LANs may be established on two distinct layer 2 technologies, i.e., wired and wireless Ethernet, each of which has variants providing different communication modes and speeds. There appears to be a large demand in the home network area for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling the indoor power line channel: new results and modem design considerations

    Publication Year: 2004, Page(s):25 - 30
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1805 KB) | HTML iconHTML

    Considerable effort has recently been devoted to the determination of accurate channel models for the power line (PL) environment, for both the indoor and outdoor cases. The common denominator (and limitation) of the known and previously published models is the particular type of approach followed. In fact, until now, the PL channel (PLC) has been treated from a mere phenomenological or statistica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Zero-padded OFDM with improved performance over multipath channels

    Publication Year: 2004, Page(s):31 - 34
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1331 KB) | HTML iconHTML

    It has been proposed recently to replace the cyclic prefix (CP) in OFDM transmission by zero-padding (ZP); this guarantees symbol recovery even when channel nulls are located on a subcarrier. This, though, has the disadvantage that the simple DFT-based receiver does not perform well, but results have shown that if much higher complexity turbo demodulation is used, ZP-OFDM outperforms CP-OFDM. Howe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed access control for consumer operated mobile ad-hoc networks

    Publication Year: 2004, Page(s):35 - 40
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1312 KB) | HTML iconHTML

    We propose a concept for realizing access control in mobile ad-hoc networks to exclude nodes that do not contribute to the provision of network services from using them. Each node observes the behavior of its neighbors in order to build up opinions about their willingness to take part in different network activities. In turn, service is provided only to nodes that have positive opinions about them... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ISP-operated protection of home networks with FIDRAN

    Publication Year: 2004, Page(s):41 - 46
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    In order to fight against the increasing number of network security incidents due to mal-protected home networks permanently connected to the Internet via DSL, TV cable or similar technologies, we propose that Internet service providers (ISP) operate and manage intrusion prevention systems (IPS) which are to a large extend executed on the consumer's gateway to the Internet (e.g., DSL router). The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A key-distribution scheme for wireless home automation networks

    Publication Year: 2004, Page(s):47 - 52
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1345 KB) | HTML iconHTML

    Wireless home automation networks are one example of how wireless technologies may soon become part of our daily life, yet security in existing products is woefully inadequate. An important problem in this area is the question of secure key distribution. We present a key-distribution scheme geared towards home automation networks, but also applicable to other networks with related properties. Our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the security of wireless LANs by managing 802.1x disassociation

    Publication Year: 2004, Page(s):53 - 58
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1453 KB) | HTML iconHTML

    802.1x is a security protocol based on the frame structure of 802.11. It attempts to provide strong authentication, access control, and WEP (wired equivalent privacy) key management for wireless LANs. Unfortunately, 802.1x misses its goals in access control denial-of-service attacks. Currently, there are no IEEE approved ways to solve this security hole. We propose a central manager, not only to t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bluetooth scatternet formation: criteria, models and classification

    Publication Year: 2004, Page(s):59 - 64
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1313 KB) | HTML iconHTML

    Bluetooth ad hoc networks are constrained by a master/slave configuration, in which one device takes the role of master and controls the communication with the slave devices. Piconets are small Bluetooth networks containing one master and up to seven active slave devices. In order to build larger topologies, called scatternets, the piconets must be interconnected. Scatternets are formed by allowin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using piconet avoidance techniques to reduce interference in Bluetooth networks

    Publication Year: 2004, Page(s):65 - 70
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1563 KB) | HTML iconHTML

    The paper presents techniques to avoid the problem of inter-piconet interference in Bluetooth networks. These techniques aim to reduce the number of piconets created in a Bluetooth networking area. The main advantage of having fewer piconets in a Bluetooth network is the reduction in inter-piconet interference and hence better network performance These techniques are simulated in software called B... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the optimal clustering in mobile ad hoc networks

    Publication Year: 2004, Page(s):71 - 76
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1425 KB) | HTML iconHTML

    A mobile ad hoc network (MANET) can be represented by a set of logical clusters with clusterheads (CHs) acting like virtual base-stations, hence forming a wireless virtual backbone. The role of clusterhead is a temporary one, which changes dynamically as the topology or other factors affecting it change. Finding the minimal set of CHs is an NP-complete problem. We study the performance tradeoffs b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A remotely controlled Bluetooth enabled environment

    Publication Year: 2004, Page(s):77 - 81
    Cited by:  Papers (4)  |  Patents (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1458 KB) | HTML iconHTML

    Ad-hoc networks using Bluetooth enabled devices have piqued the interest of the networking community. Network developers are looking into different means of remotely controlling the devices comprising such networks, so as to have the flexibility to change various device parameters without actually being present near them. We present a method of remotely controlling devices in a Bluetooth enabled e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.