Scheduled System Maintenance
On Friday, October 20, IEEE Xplore will be unavailable from 9:00 PM-midnight ET. We apologize for the inconvenience.
Notice: There is currently an issue with the citation download feature. Learn more.

IEEE Communications Letters

Issue 12 • Dec. 2005

Filter Results

Displaying Results 1 - 23 of 23
  • IEEE Communications Letters - Table of contents

    Publication Year: 2005, Page(s):01 - 1122
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • IEEE Communications Society

    Publication Year: 2005, Page(s): 02
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Threshold selection for UWB TOA estimation based on kurtosis analysis

    Publication Year: 2005, Page(s):1025 - 1027
    Cited by:  Papers (67)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In this letter, a normalized threshold selection technique for time of arrival estimation of ultra-wideband signals is proposed. It exploits the kurtosis of the received signal samples. The dependency between the kurtosis and optimal normalized threshold are investigated via simulations. The proposed technique yields efficient threshold selection, has low complexity and sampling rate requirements,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicell spreading sequence design algorithm for overloaded S-CDMA

    Publication Year: 2005, Page(s):1028 - 1030
    Cited by:  Papers (12)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (113 KB) | HTML iconHTML

    An algorithm for the design of the overloaded complex spreading sequence sets on the uplink of multicell synchronous S-CDMA systems is introduced. Assuming that in each cell the number of active users K is greater than the corresponding processing gain N, the total weighted squared correlation (TWSC) criterion is used as a performance measure. The mathematical formalism is supported with selected ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modulation doping for iterative demapping of bit-interleaved coded modulation

    Publication Year: 2005, Page(s):1031 - 1033
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (238 KB) | HTML iconHTML

    In this letter, the problem of the transmitter design for bit-interleaved coded modulation (BICM) with the receiver employing iterative demapping, is addressed. Conventionally, the design is focused on the appropriate choice of the constellation mapping so that the iterative process converges to small values of bit- or block- error rates. Here, instead of a difficult design of a new mapping, we pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power efficiency of user cooperation in multihop wireless networks

    Publication Year: 2005, Page(s):1034 - 1036
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB) | HTML iconHTML

    In this paper we analyze the power efficiency of a user cooperation scheme for multihop wireless networks. In this scheme, the signals are jointly transmitted by two mobile terminals (MTs), emulating transmit macro diversity. We derive the optimal transmit power assignments for the two transmitting MTs and quantify the power efficiency of the scheme. The results indicate that macro diversity by wa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A combination of wireless multicast advantage and hitch-hiking

    Publication Year: 2005, Page(s):1037 - 1039
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    In the minimum energy broadcast problem, each node adjusts its transmission power to minimize the total energy consumption while still delivering data to all the nodes in a network. The minimum energy broadcast problem is proved to be NP-complete. The Wireless Multicast Advantage (WMA) is that a single transmission can be received by all the nodes that are within the transmission range of a transm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum likelihood estimation of the K factor in Ricean fading channels

    Publication Year: 2005, Page(s):1040 - 1042
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB) | HTML iconHTML

    Estimation of the K factor in a Ricean fading channel is studied. Unlike most previous estimators which employ exclusively samples of the fading envelope, new maximum likelihood estimators that use samples of both the fading envelope and the fading phase, or samples of the fading phase only, are derived and examined. Simulation results show that these estimators have good performances when operati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A TCP-tailored approach to location management in mobile ad hoc networks

    Publication Year: 2005, Page(s):1043 - 1045
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    The main location management proposals in mobile ad hoc networks have, as a common characteristic, two distinct phases: the location query of the position of a destination node and the transmission of a flow toward the destination node. This letter proposes to send the initial packet of a flow to learn the position of its destination instead of adopting a dedicated query packet. Such an approach s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random power control in wireless ad hoc networks

    Publication Year: 2005, Page(s):1046 - 1048
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In this letter, we present stochastic analysis of two power control schemes for wireless ad hoc networks: random-vs. fixed power controls. Using numerical examples, we show that randomizing transmit power has positive effect of reducing high interferences to the other nodes, and improves network connectivity, in high-density networks. However, the fixed power control is more favorable in low-densi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simplified adaptive modulation scheme for D-STTD systems with linear receivers

    Publication Year: 2005, Page(s):1049 - 1051
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    In this letter, we consider D-STTD (Double Space Time Transmit Diversity) with an adaptive modulation (AM) scheme. The simple criteria for AM are proposed according to linear receivers and the corresponding AM schemes are derived to minimize bit error rate under the constraint of the total data rate and total transmit power. The D-STTD system using the proposed AM scheme requires low computational... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient power-saving mechanism for integration of WLAN and cellular networks

    Publication Year: 2005, Page(s):1052 - 1054
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    In this letter, we propose an efficient power-saving mechanism using paging of cellular networks for WLAN in heterogeneous wireless networks, where WLAN interface is turned off during idle state without any periodic wake-up in order to save power consumption while at the same time, the existing paging of cellular network is utilized in place of beacons in WLAN. For the proposed mechanism, the mean... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MC-CDMA bit error probability and outage minimization through partial combining

    Publication Year: 2005, Page(s):1055 - 1057
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    This work addresses the performance evaluation, in terms of bit error probability (BEP) and bit error outage (BEO), for the down-link of multi-carrier code division multiple access systems. A partial combining technique depending on a parameter adapted to the system load and the mean signal-to-noise ratio is proposed to counteract both interference and thermal noise and optimized to minimize both ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of low-density parity-check convolutional codes through progressive edge-growth

    Publication Year: 2005, Page(s):1058 - 1060
    Cited by:  Papers (14)  |  Patents (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    In this letter, we propose a novel approach of constructing low-density parity-check convolutional codes (LDPC-CCs), based on the progressive edge-growth (PEG) algorithm. LDPC-CC related modifications are made upon the original PEG algorithm to generate the time-varying parity-check matrix. The proposed method can generate LDPC-CCs with large girth, and is flexible in handling codes with different... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A family of low-complexity binary linear codes for Bluetooth and BLAST signaling applications

    Publication Year: 2005, Page(s):1061 - 1063
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    We construct a family of linear binary block codes that are useful for Bluetooth, OFDM and BLAST applications. These codes are derived from ordinary block repetition codes using cyclic shifts of the input information vector which greatly simplifies encoding. We find several sets of cyclic shifts that constrain the search for good codes. We consider code lengthening and the input-output weight enum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis and optimization of irregular LDPC codes for joint source-channel decoding

    Publication Year: 2005, Page(s):1064 - 1066
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    In this paper, we present a characterization, through its convergence analysis, and an optimisation of a joint source-channel receiver composed of a LDPC decoder and a Soft Input Soft Output (SISO) source decoder. Under Gaussian approximation, assuming the knowledge of the extrinsic mutual information transfer function (EXIT chart) of the source decoder, we derive the Mutual Information evolution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative reliability-based decoding of linear block codes with adaptive belief propagation

    Publication Year: 2005, Page(s):1067 - 1069
    Cited by:  Papers (21)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    In this letter, an iterative decoding algorithm for linear block codes combining reliability-based decoding with adaptive belief propagation decoding is proposed. At each iteration, the soft output values delivered by the adaptive belief propagation algorithm are used as reliability values to perform reduced order reliability-based decoding of the code considered. This approach allows to bridge th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized punctured convolutional codes

    Publication Year: 2005, Page(s):1070 - 1072
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    This letter introduces the class of generalized punctured convolutional codes (GPCCs), which is broader than and encompasses the class of the standard punctured convolutional codes (PCCs). A code in this class can be represented by a trellis module, the GPCC trellis module, whose topology resembles that of the minimal trellis module. he GPCC trellis module for a PCC is isomorphic to the minimal tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A linear equalizer for high-speed APD-Based integrate-and-dump receivers

    Publication Year: 2005, Page(s):1073 - 1075
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A linear minimum mean-square error (LMMSE) equalizer for avalanche-photodiode (APD) based integrate-and-dump receivers is designed to compensate for intersymbol-interference (ISI) introduced by the APD's random impulse response. Recent work on the characterization of the joint probability distribution of the APD's gain and buildup-time are adopted and utilized to determine the mean and correlation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet triplet: a novel approach to estimate path capacity

    Publication Year: 2005, Page(s):1076 - 1078
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB)

    Packet Pair is an end-to-end approach to estimate the capacity of an Internet path. Many studies have shown that such estimation exhibits a lot of bias due to the dynamic cross traffic. In this paper, we propose a novel approach, called Packet Triplet, which uses three back-to-back probing packets - different from two back-to-back probing packets in Packet Pair - to estimate the capacity of a netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Communications Society 2005 Board of governors

    Publication Year: 2005, Page(s): 1121
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • 2005 index

    Publication Year: 2005, Page(s):1084 - 1120
    Request permission for commercial reuse | PDF file iconPDF (497 KB)
    Freely Available from IEEE
  • List of reviewers

    Publication Year: 2005, Page(s):1079 - 1083
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.

 

 

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Octavia Dobre
Memorial University, Canada