Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Communications Letters

Issue 10 • Oct. 2004

Filter Results

Displaying Results 1 - 22 of 22
  • Table of contents

    Publication Year: 2004, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • IEEE Communications Letters publication information

    Publication Year: 2004, Page(s): c2
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • SOSP: an efficient multicast fault isolation scheme for multi-source sessions

    Publication Year: 2004, Page(s):605 - 607
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    This paper proposes a one-way source probing mechanism for fault isolation in multi-source multicast sessions. Routers involved in multicast record a routing path based on periodic probes from sources, and receivers isolate a fault region using the probes. We introduce a probe suppression mechanism to enhance the performance. The proposed scheme reduces message complexity and enhances fault isolat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Pseudorandom active UWB reflectors for accurate ranging

    Publication Year: 2004, Page(s):608 - 610
    Cited by:  Papers (29)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB) | HTML iconHTML

    In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downlink scheduling optimization in CDMA networks

    Publication Year: 2004, Page(s):611 - 613
    Cited by:  Papers (28)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    The problem of allocating radio resources in the downlink of a code-division multiple access (CDMA) network is studied. The modulation and coding schemes, numbers of multicodes, and transmit powers used for all mobile stations (MS) are jointly chosen so as to maximize the total transmission bit rate, subject to certain constraints. Based on the discrete and nonlinear nature of the proposed model, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Channel holding time in hierarchical cellular systems

    Publication Year: 2004, Page(s):614 - 616
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    We study the characteristics of the channel holding time in the multitier cellular systems supporting overflow and underflow schemes with the general call holding time and the general cell residence time. Comparison between our results, together with previous results, and simulation shows that our result is more universal and more accurate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ricean K-factor estimation in mobile communication systems

    Publication Year: 2004, Page(s):617 - 619
    Cited by:  Papers (26)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    We propose an estimator for the Ricean K-factor which has applications in mobile communication systems. The estimator is based on the statistics of the instantaneous frequency (IF) of the received signal. Using simulations, we show that the proposed estimator is robust to shadowing and its mean-square error (MSE) is significantly lower than that of the envelope-based estimators. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CCK demodulation via symbol decision feedback equalizer

    Publication Year: 2004, Page(s):620 - 622
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    A symbol decision feedback equalization (DFE) technique is developed for demodulating complementary code keying (CCK) signals. The efficacy of the proposed receiver is demonstrated on the physical layer (PHY) specified in the IEEE 802.11b wireless local area network (WLAN) standard. Packet error rate (PER) performance is compared with that of the conventional RAKE receiver. The proposed receiver s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exact BER analysis of bandlimited BPSK with EGC and SC diversity in cochannel interference and Nakagami fading

    Publication Year: 2004, Page(s):623 - 625
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Equal gain and selection combining for bandlimited binary phase-shift keying systems in Nakagami fading with cochannel interference are considered. Spectrum raised-cosine and Beaulieu-Tan-Damen pulse shapes are employed. Average bit error rates are derived for arbitrary orders of diversity and fading parameters. The computational complexity of the solution does not grow with the diversity order. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Cramer-Rao bounds of hybrid TOA/RSS and TDOA/RSS location estimation schemes

    Publication Year: 2004, Page(s):626 - 628
    Cited by:  Papers (108)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    The Cramer-Rao bound (CRB) on location estimation accuracy of two different hybrid schemes, time of arrival/received signal strength (TOA/RSS) and time difference of arrival/received signal strength (TDOA/RSS), is computed. For short-range networks, the hybrid schemes offer improved accuracy with respect to conventional TOA and TDOA schemes, particularly in the proximity of the reference devices. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recurrent formulas for the multiple fractional channel reservation strategy in multi-service mobile cellular networks

    Publication Year: 2004, Page(s):629 - 631
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    One-dimensional recursive formulas to calculate the blocking probabilities of the different call types in multi-service mobile cellular networks using the multiple fractional channel reservation (MFCR) strategy are derived. MFCR achieves practically the same performance as the optimum call admission control policy in multi-service mobile cellular networks. The "macro states" technique is used to e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Symbol-interleaver design for turbo trellis-coded modulation

    Publication Year: 2004, Page(s):632 - 634
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB) | HTML iconHTML

    A design method for a code-matched symbol-interleaver for turbo trellis-coded modulation is proposed. The method constructs an interleaver by code matched criteria to eliminate some input error events of low symbol Hamming weight (SHW) sequences of the code which can produce low SHW codewords. Numerical results confirm that the interleaver can lower the error floor at moderate to high signal-to-no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error rate performance of coded free-space optical links over strong turbulence channels

    Publication Year: 2004, Page(s):635 - 637
    Cited by:  Papers (83)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    Error control coding can be used over free-space optical (FSO) links to mitigate turbulence-induced fading. We present error rate performance bounds for coded FSO communication systems operating over atmospheric turbulence channels, which are modeled as a correlated K distribution under strong turbulence conditions. We derive an upper bound on the pairwise error probability (PEP) and then apply th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asymptotic loss of real-time traffic in wireless mobile networks with selective-repeat ARQ

    Publication Year: 2004, Page(s):638 - 640
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (192 KB) | HTML iconHTML

    We study the issue of quality of service (QoS) for real-time traffic over a wireless channel deploying automatic repeat request (ARQ) error control. An analytical model has been derived to evaluate the queueing related loss and the wireless channel related loss. In contrast to previous work, this model quantifies the interaction between the network layer and the physical layer, and then it enables... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Limits on the traffic carrying capacity of optical networks with an arbitrary topology

    Publication Year: 2004, Page(s):641 - 643
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB) | HTML iconHTML

    The letter examines the limits on the traffic carrying capacity of a dense wavelength-division multiplexing (DWDM)-based network of arbitrary topology. It also presents a technique to maximize the traffic carrying capacity of such networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach for VoIP traffic characterization

    Publication Year: 2004, Page(s):644 - 646
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The letter proposes a new frame generation model for those audio codecs which handle SID frames and deduces an analytical expression for the mean bit rate at the input of the IP network as a function of the number of frames per packet. The new model is experimentally validated for the G.729B, G.723.1, and GSM AMR codecs. Results show that the error of the estimation of the mean bit rate can be red... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying the deployment of TCP options - a comparative study

    Publication Year: 2004, Page(s):647 - 649
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Transmission Control Protocol (TCP) performance evaluation studies need to use protocol configurations representative of real networks. However, the actual deployment of TCP options has not yet been quantified on a large scale. After analyzing a large set of traffic traces collected at 12 different monitoring points, we find that TCP segment sizes have a bimodal distribution, not a trimodal one as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisement - Explore IEL IEEE's most comprehensive resource

    Publication Year: 2004, Page(s): 650
    Request permission for commercial reuse | PDF file iconPDF (341 KB)
    Freely Available from IEEE
  • IEEE Communications Letters Edics

    Publication Year: 2004, Page(s): 651
    Request permission for commercial reuse | PDF file iconPDF (17 KB)
    Freely Available from IEEE
  • IEEE Communications Letters Information for authors

    Publication Year: 2004, Page(s): 652
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • IEEE Communications Society Information

    Publication Year: 2004, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • IEEE Communications Letters blank page

    Publication Year: 2004, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (4 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Octavia Dobre
Memorial University, Canada