Scheduled Maintenance on August 31st, 2016:
IEEE Xplore will undergo system maintenance from 1:00 - 3:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Communication Networks and Services Research, 2004. Proceedings. Second Annual Conference on

Date 19-21 May 2004

Filter Results

Displaying Results 1 - 25 of 58
  • Frequency multiplication and QPSK modulation with subharmonic injection-locked active antenna

    Publication Year: 2004, Page(s):329 - 332
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    A subharmonic injection-locked oscillating antenna, operating simultaneously as a frequency doubler and as a QPSK modulator, is presented. A dual-gate MESFET is used with one of its gates integrated with a PIN diode switch controlled patch antenna and the other gate connected to a low-noise subharmonic stabilising signal. The experimental and simulation results demonstrate the possibility of the s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mesh partitioning for computational grids

    Publication Year: 2004, Page(s):325 - 328
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB) | HTML iconHTML

    Computational grids, with a collection of heterogeneous resources connected by heterogeneous networks, are being developed globally. Efficient partitioning of applications to exploit such grids is becoming an emerging area of research. Recent work in our group led to the creation of the PaGrid, an application that partitions meshes onto grids. The first version of PaGrid used a multilevel graph pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical design of single feed truncated corner microstrip antenna

    Publication Year: 2004, Page(s):25 - 29
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    Two samples of direct fed circularly polarized (CP) microstrip antennas at 2.45 GHz printed on different substrates with high and low loss tangent are reported. A stub is used in the feed network to make the frequency with minimum return loss, fr (resonant frequency), equal to the frequency with minimum axial ratio, fcp (circular polarization frequency). The effect of losses ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The reconstruction of user sessions from a server log using improved time-oriented heuristics

    Publication Year: 2004, Page(s):315 - 322
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining techniques to discover Web access patterns from Web usage data. In order to discover access patterns, Web usage data should be reconstructed into sessions with or without user identification. However, not all Web server logs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The novel decision feedback equalizer for OFDM system with insufficient cyclic prefix

    Publication Year: 2004, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    If the multipath delay difference is greater than the duration of a cyclic prefix, the performance of an orthogonal frequency division multiplexing (OFDM) system suffers severe degradation. The insufficient cyclic prefix phenomenon incurs two adverse interferences, intersymbol interference (ISI) from the adjacent symbols and intercarrier interference (ICI) from other subcarriers in the same OFDM s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the referrer-based Web log session reconstruction

    Publication Year: 2004, Page(s):286 - 292
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    Web usage mining, an emergent domain in Web mining, is the process of discovering and interpreting patterns of users' accessing of the Web by mining the Web log data. We discuss the kinds of ambiguities a heuristic encounters during the process of user session reconstruction. Some criteria are introduced to measure these ambiguities. The proposed criteria are then used to adapt a reconstructor heu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weighted PageRank algorithm

    Publication Year: 2004, Page(s):305 - 314
    Cited by:  Papers (53)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    With the rapid growth of the Web, users easily get lost in the rich hyper structure. Providing the relevant information to users to cater to their needs is the primary goal of Website owners. Therefore, finding the content of the Web and retrieving the users' interests and needs from their behavior have become increasingly important. Web mining is used to categorize users and pages by analyzing us... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An application of multi-wavelet packets in digital communications

    Publication Year: 2004, Page(s):10 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Bandwidth efficiency and the ability to combat the effects of frequency selective channels are critical in the design of digital modulation schemes. To improve bandwidth utilization and to avoid ISI caused by time dispersion in the channel, a new multi-wavelet packet modulation (MWPM) scheme is proposed. The MWPM is based on orthogonal multi-wavelet packets (MWP). In particular, the orthogonality ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A micro-genetic algorithm-based CDMA multi-user detector

    Publication Year: 2004, Page(s):175 - 180
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    A new multi-user detection technique that utilizes only the micro-genetic algorithm (μGA) is developed. In contrast to previous approaches, the micro-genetic algorithm is not hybridized with any detector other than a conventional detector (CD) or a decorrelator as an initial stage. The use of this algorithm considerably reduces the number of operations as well as the total cost of the proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-agent system for multimedia communications traversing NAT/firewall in next generation networks

    Publication Year: 2004, Page(s):99 - 104
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    The forthcoming next generation network (NGN) is an all IP network. It should guarantee multimedia communications to traverse NAT and firewall. The existing traversal methods are not suitable for a service provider to set up a real system in the NGN. Multi-agent system for multimedia communication traversing NAT (network address translator) and firewall (MASMCT) is presented to resolve the problem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transcoding proxy placement in en-route Web caching

    Publication Year: 2004, Page(s):276 - 285
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    With the rapid growth of audio and video applications on the Internet, caching media objects in transcoding proxies has become an important research topic. We address the problem of finding the optimal locations for placing a fixed number of transcoding proxies among the nodes in a network such that the specified objective is achieved. We present an original model for this problem, which makes tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study of retrodirective array performance in the presence of multipath

    Publication Year: 2004, Page(s):56 - 60
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (273 KB) | HTML iconHTML

    The paper attempts to analyze the performance of a heterodyne phase conjugate retrodirective transceiver for full duplex communications in the presence of multipath signals and amplitude and phase perturbations across a four element antenna array. Simulation results are given and it is shown that the retrodirective array improves multipath fading in a full duplex scheme even under amplitude and ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Petri net approach to improving SACK TCP resilience

    Publication Year: 2004, Page(s):146 - 155
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    The transmission control protocol (TCP) was designed to provide a reliable end-to-end network connection. The most up-to-date TCP version, SACK TCP, was designed to be capable of surviving multiple segment loss. However, it has been found that if too many segments in one transmission window are lost, even if SACK TCP transitions into fast recovery, it is still possible that timeout will finally oc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of audio codecs over real-time transmission protocol (RTP) for voice services over Internet protocol

    Publication Year: 2004, Page(s):351 - 356
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    The real-time transmission of voice on a IP network is one of the key techniques in multimedia communication. This paper aims at evaluating the performance of a set of audio codecs best suitable for real-time voice transmission using the real-time transmission protocol (RTP) over an IP network. Voice is encoded using an audio codec and transmission is simulated by means of a RTP media simulator fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast flow classification over Internet

    Publication Year: 2004, Page(s):235 - 242
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1454 KB) | HTML iconHTML

    In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about their different behaviours. We consider the problem of classifying BGP (border gateway protocol) level prefix flows into a small set of homogeneous classes. We argue that a simple two states hidden Markov model (HMM), even i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Topic sharing infrastructure for weblog networks

    Publication Year: 2004, Page(s):301 - 304
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (440 KB) | HTML iconHTML

    Weblogs have recently emerged as a popular means of sharing information on the Web. While they effectively foster the networking of participants on a one-to-one basis, so far they have lacked the capacity of allowing the establishment of many-to-many communication relationships. The paper describes recent work on facilitating group forming processes and the sharing of content among weblog authors ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of generative programming based protocol implementation

    Publication Year: 2004, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB) | HTML iconHTML

    The protocol implementation framework for Linux (PIX) is a protocol development tool using generative programming. It aims at capturing the similarities in behavior among different layers of protocols and grouping solutions to cross-cutting concerns of communication systems. It achieves a high degree of configurability by providing several combinations which could be chosen to generate the desired... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSN: a network protocol for serving dynamic queries in large-scale wireless sensor networks

    Publication Year: 2004, Page(s):165 - 174
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (975 KB) | HTML iconHTML

    A fundamental problem that confronts future applications of sensor networks is how to locate efficiently the sensor node that stores a particular data item. Distributed hash table (DHT) based Internet peer-to-peer (P2P) protocols provide near-optimum data lookup times for queries made on networks of distributed nodes. A generic mapping of these protocols to sensor networks is, however, perceived a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • LRRP SpeechWebs

    Publication Year: 2004, Page(s):91 - 98
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    The paper describes a new architecture for accessing hyperlinked speech-accessible knowledge sources that are distributed over the Internet. The architecture, LRRP SpeechWeb, uses Local thin-client application-specific speech Recognition and Remote natural-language query Processing. Users navigate an LRRP SpeechWeb using voice-activated hyperlink commands, and query the knowledge sources through s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A validation solution for network configuration

    Publication Year: 2004, Page(s):273 - 275
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (219 KB) | HTML iconHTML

    The continuous development of the Internet results in an increased number of network services. The network operators and service providers have to deploy various configuration tools to deliver those network services. The different tools used to configure the same equipments can create network configuration inconsistency. Therefore, it is necessary to enhance the configuration tools with validation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • FACADE - a framework for context-aware content adaptation and delivery

    Publication Year: 2004, Page(s):46 - 55
    Cited by:  Papers (5)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Modern technology promises. mobile users Internet connectivity anytime, anywhere, using any device. However, given the constrained capabilities of mobile devices, the limited bandwidth of wireless networks and the varying personal sphere, effective information access requires the development of new computational patterns. The variety of mobile devices available today makes device-specific authorin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IP performance and interworking architecture in 802.11 WLAN/cdma2000 networks

    Publication Year: 2004, Page(s):75 - 79
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    IEEE 802.11 WLAN is designed to provide high data speed in a small coverage area. 2.5G/3G networks, on the other hand, are intended to offer ubiquitous connectivity with relatively low data speed over a wide area. Accordingly, these two technologies can be viewed as a complement to each other. However, for complementary service, the two access networks have to be integrated and the service provide... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelligent ants for adaptive network routing

    Publication Year: 2004, Page(s):255 - 261
    Cited by:  Papers (8)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    An adaptive routing algorithm based on the AntNet algorithm is designed and implemented with a new routing table formation scheme. This addresses the unrealistic requirement of the original AntNet algorithm for global information. The new algorithm requires limited routing information in the routing and traffic statistics tables. The routers only have the most popular destinations in their routing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An energy efficient MAC protocol for IEEE 802.11 WLANs

    Publication Year: 2004, Page(s):137 - 145
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    A good design of MAC protocols should realize both minimum energy consumption as well as maximum data throughput. IEEE 802.11 power management scheme for an ad hoc network is based on the carrier sense multiple access with collision avoidance (CSMA/CA) procedure to transmit/receive data frames. CSMA/CA may waste the scarce energy and bandwidth due to frame collisions and lengthen the frame delay d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote sign language interpretation using the Internet

    Publication Year: 2004, Page(s):345 - 350
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    A technological solution was investigated as a way of accessing sign language interpretation services from a remote location by people who are deaf. A number of participants including people who are deaf, health professionals, counselors, employers, and sign language interpreters were involved in communication simulations that mimic what occurs in health care delivery environments, counselors offi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.