By Topic

3rd Annual Communication Networks and Services Research Conference (CNSR'05)

16-18 May 2005

Filter Results

Displaying Results 1 - 25 of 62
  • 3rd Annual Communication Networks and Services Research Conference - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (431 KB)
    Freely Available from IEEE
  • Proceedings of the 3rd Annual Communication Networks and Services Research Conference

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • 3rd Annual Communication Networks and Services Research Conference - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 3rd Annual Communication Networks and Services Research Conference - Table of contents

    Publication Year: 2005, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2005, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (40 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2005, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (23 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2005, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • Heuristic constraint-path routing decision system

    Publication Year: 2005, Page(s):3 - 8
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Heuristic QoS algorithms under strict constraints perform poorly in terms of finding a path that is suitable for a user's QoS needs-the multiple constraint path problem (MCP). Exact QoS algorithms, on the other hand, guarantee that a path satisfying user needs would be found and offer a more realistic approach for solving the MCP problem in view of the fact that the NP-complete character of graphs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Router design for optical Cartesian networks

    Publication Year: 2005, Page(s):9 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The paper describes the progress in the research, design, and development of an all-optical router for the optical switching of packets in Cartesian networks (a novel network akin to mesh networks). The importance of all-optical packet switching/routing for convergent, next generation transport network is described. The selection of Cartesian routing as the basic routing methodology for all-optica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Shortest-hop based reliable network multicast

    Publication Year: 2005, Page(s):16 - 21
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., multicast overlay. This is because there is a lack of reliable multicast protocols. This is even harder for the multicast capable routers to offer transparent reliable multicast services if receivers are on paths with dras... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalability of a class of switch networks

    Publication Year: 2005, Page(s):22 - 27
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Today many network operators and suppliers are developing control plane technologies for applications in the emerging optical network called all-switched network in which multi-chassis optical switches (called Switch Chassis Systems) play an important role. In this paper, we present ways to evaluate the scalability of the control plane of a switch chassis system (i.e. SONET/SDH OC-48 cross-connect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PENS: a personalized electronic news system

    Publication Year: 2005, Page(s):31 - 38
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    A framework has been developed as a basis for design and implementation of adaptive Web systems. This framework and the respective architecture support the idea of high-level synthesis and facilitate different types of adaptation. In this paper, we describe main components in the framework, and introduce an example application from e-News domain, a personalized electronic news system (PENS). PENS ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On fair traceable electronic cash

    Publication Year: 2005, Page(s):39 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    Credit card is currently the most popular electronic payment method on the Internet, but it is not an ideal method from the security and privacy point of view. Electronic cash solves many inherent problems of credit card, such as anonymity and off-line payment, and is generally considered as an ideal electronic payment method. However, there are issues that are yet to be satisfactorily solved, suc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi-context visual Web page authoring tool

    Publication Year: 2005, Page(s):45 - 47
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Nowadays, more and more people are accessing the Internet wirelessly via many different mobile devices such as notebooks, PDAs and smartphones. The heterogeneity of the various portable devices makes the experience of using the Internet much different from using a desktop computer. Web pages must be adapted to the context of computing for efficient delivery and user satisfaction. The FACADE framew... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A churn-strategy alignment model for managers in mobile telecom

    Publication Year: 2005, Page(s):48 - 53
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    Customer churn is a vexing problem in the telecom industry. Data mining techniques play an important role in churn prediction. However, most of these techniques can only provide a result that customers may churn or not, but seldom tell why they churn. Therefore even an accurate prediction result is of minimal use to telecom management, especially to the strategies of customer retention. In this pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Rapid prototyping hardware platforms for the development and testing of OFDM based communication systems

    Publication Year: 2005, Page(s):57 - 62
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    Implementation of modern digital transceivers requires an expertise in numerous fields. Conventional transceiver design methods are no longer sufficient to guarantee a fast conversion from initial concept to final product. Moreover, in the testing phase, system simulations alone cannot provide the full insight into the system parameters and performance, especially at the RF stages, where the model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental studies of the 2.4-GHz ISM wireless indoor channel

    Publication Year: 2005, Page(s):63 - 68
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Experimental results from indoor measurements of the 2.4-GHz wireless channel are presented. These measurements include both quasi-static and time-varying channel conditions in a number of indoor environments. Four channel propagation characteristics of interest are evaluated. For the time-varying environment, the Doppler spread of the wireless channel is measured. For the quasi-static environment... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Signalling wavelength in an antenna array for space-time wireless over LOS channels

    Publication Year: 2005, Page(s):69 - 73
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    We consider the inter-antenna separation in a distributed antenna array. We introduce a new separation constraint with respect to the signalling wavelength, which equals the chip wavelength in DS-CDMA systems and the symbol wavelength in non-spread systems. This constraint ensures the phases of the frequency responses are exercised over 2π in the baseband channel matrix. The diverse phases prov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural network based channel estimation and performance evaluation of time varying multipath satellite channel

    Publication Year: 2005, Page(s):74 - 79
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Neural network (NN) based channel estimation method has been proposed for identifying the parameters of a nonlinear time varying satellite channel. A multipath time-varying Ricean-fading channel has been considered in the analysis for a down link scenario. To study the flexibility and performance of the proposed method, the channel has been varied over a reasonable range of Doppler frequencies, an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of three dimensional retrodirective arrays

    Publication Year: 2005, Page(s):80 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB) | HTML iconHTML

    Retrodirective antenna systems have presented a very attractive feature of transmitting their RF energy back in the directions of their received signals. Much of the research efforts have so far been focused on electronic parts of the systems rather than on antenna array configurations they used. In this paper, we present a numerical scheme that can optimize the retrodirective array performance by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and implementation of a Cartesian router

    Publication Year: 2005, Page(s):84 - 90
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The increasing popularity of the Internet and networking has resulted in a significant growth in Internet traffic, coupled with an increase in the number of Internet routers. The increase in routers has resulted in the development of more complex routing algorithms, larger routing tables (requiring more memory), ultimately increasing the time required to search the lookup table. The Cartesian netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient CAD method to design dual-band probe-fed microstrip antennas using a fuzzy approach

    Publication Year: 2005, Page(s):91 - 96
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    Dual-frequency patch antennas may provide an alternative to large bandwidth planar antennas, in applications in which large bandwidth is really needed for operating at to separate transmit-receive bands. When the two frequencies are far apart, a dual frequency patch structure can be conceived to avoid the use of separate antennas. In this paper the multiport analysis is coupled with an intelligent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling Internet traffic using nonGaussian time series models

    Publication Year: 2005, Page(s):99 - 104
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (888 KB) | HTML iconHTML

    Internet traffic is usually represented by a time series of number of packets or number of bits received in each time slot. There exists a class of Internet traffic traces that have slowly decreasing autocorrelation, their marginal distributions of the number of packets are fit by negative binomial distributions and the time series of number of bits are fit by Gamma distributions. To model this cl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing access control for presence-based services

    Publication Year: 2005, Page(s):105 - 111
    Cited by:  Papers (4)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (160 KB) | HTML iconHTML

    This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challenges. The first is to form a communication group based on an association such as physical location. The second is to dynamically create and enforce a security policy by using service description and the user association. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generating representative traffic for intrusion detection system benchmarking

    Publication Year: 2005, Page(s):112 - 117
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of Web usage from Web server logs in a data driven fashion and the actual traffic is generated by employing the Web browser installed on the host. Additionally, we employed an intrusion detection system as a traffic analyzer to va... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.