Journal of Communications and Networks

Issue 5 • Oct. 2011

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2011, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (274 KB)
    Freely Available from IEEE
  • Editorial board

    Publication Year: 2011, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • Selective decoding schemes and wireless MAC operating in MIMO ad hoc networks

    Publication Year: 2011, Page(s):421 - 427
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1287 KB) | HTML iconHTML

    Problems encountered in IEEE 802.11 medium access control (MAC) design are interferences from neighboring or hidden nodes and collision from simultaneous transmissions within the same contention floors. This paper presents the selective de- coding schemes in MAC protocol for multiple input multiple out- put ad-hoc networks. It is able to mitigate interferences by using a developed minimum mean-squ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fully collusion-resistant trace-and-revoke scheme in prime-order groups

    Publication Year: 2011, Page(s):428 - 441
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (635 KB) | HTML iconHTML

    A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to re- quire composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Constant envelope enhanced FQPSK and its performance analysis

    Publication Year: 2011, Page(s):442 - 448
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (995 KB) | HTML iconHTML

    It's a challenging task to design a high performance modulation for satellite and space communications due to the limited power and bandwidth resource. Constant envelope modulation is an attractive scheme to be used in such cases for their needlessness of input power back-off about 2~3 dB for avoidance of nonlinear distortion induced by high power amplifier. The envelope of Feher quadrature phase ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast DFT matrices transform based on generalized prime factor algorithm

    Publication Year: 2011, Page(s):449 - 455
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (556 KB) | HTML iconHTML

    Inspired by fast Jacket transforms, we propose simple factorization and construction algorithms for the M -dimensional discrete Fourier transform (DFT) matrices underlying generalized Chinese remainder theorem (CRT) index mappings. Based on successive coprime-order DFT matrices with respect to the CRT with recursive relations, the proposed algorithms are presented with simplicity and clarity on th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the outage behavior of interference temperature limited CR-MISO channel

    Publication Year: 2011, Page(s):456 - 462
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (690 KB) | HTML iconHTML

    This paper investigates the outage behavior of peak interference power limited cognitive radio (CR) networks with multiple transmit antennas. In CR-multi-input single-output (MISO) channel, the total transmit power is distributed over the transmit- antennas. First, we use the orthogonal space-time codes (STC) to achieve the transmit diversity at CR-receiver (rx) and investigate the effect of the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperative MAC protocol using active relays for multi-rate WLANs

    Publication Year: 2011, Page(s):463 - 471
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1670 KB) | HTML iconHTML

    Cooperative communications using relays in wireless networks have similar effects of multiple-input and multiple-output without the need of multiple antennas at each node. To implement cooperation into a system, efficient protocols are desired. In IEEE 802.11 families such as a/b/g, mobile stations can automatically adjust transmission rates according to channel conditions. However throughput perf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multibeam satellite frequency/time duality study and capacity optimization

    Publication Year: 2011, Page(s):472 - 480
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (986 KB) | HTML iconHTML

    In this paper, we investigate two new candidate transmission schemes, non-orthogonal frequency reuse (NOFR) and beam- hopping (BH). They operate in different domains (frequency and time/space, respectively), and we want to know which domain shows overall best performance. We propose a novel formulation of the signal-to-interference plus noise ratio (SINR) which allows us to prove the frequency/tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Systolic arrays for lattice-reduction-aided mimo detection

    Publication Year: 2011, Page(s):481 - 493
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2601 KB) | HTML iconHTML

    Multiple-input multiple-output (MIMO) technology provides high data rate and enhanced quality of service for wireless communications. Since the benefits from MIMO result in a heavy computational load in detectors, the design of low-complexity sub- optimum receivers is currently an active area of research. Lattice- reduction-aided detection (LRAD) has been shown to be an effective low-complexity me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Planning of gap filler networks in satellite DMB systems for wireless multimedia services

    Publication Year: 2011, Page(s):494 - 498
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1121 KB) | HTML iconHTML

    Satellite digital multimedia broadcasting (S-DMB) systems use gap fillers (GFs) to provide wireless multimedia services to non-line-of-sight locations. GFs act as repeaters, and S-DMB systems require GF networks in order to guarantee mobile reception. Fach GF covers a cell or sector. In order to provide contiguous coverage of an area comprising two or more cells or sectors, multiple GFs are needed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of inter-domain collaborative routing: provider competition for clients

    Publication Year: 2011, Page(s):499 - 510
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1775 KB) | HTML iconHTML

    Any server offering a routing service in the Internet would naturally be in competition for clients, and clients may need to utilize service from a specific server in order to achieve a desired result. We study the various properties of this competition, such as the fraction of route requests handled by a routing service provider and the fraction of total revenue obtained. As the routing service p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the (n, m, k)-cast capacity of wireless ad hoc networks

    Publication Year: 2011, Page(s):511 - 517
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (773 KB) | HTML iconHTML

    The capacity of wireless ad-hoc networks is analyzed for all kinds of information dissemination based on single and multiple packet reception schemes under the physical model. To represent the general information dissemination scheme, we use (n, m, k)-cast model [1] where n, to, and k (k ≤ m) are the number of nodes, destinations and closest destinations that actually receive packets from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TCP accelerator for DVB-RCS SATCOM dynamic bandwidth environment with HAIPE

    Publication Year: 2011, Page(s):518 - 524
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1113 KB) | HTML iconHTML

    A high assurance IP encryption (HAIPE) compliant protocol accelerator is proposed for military networks consisting of red (or classified) networks and black (or unclassified) networks. The boundary between red and black sides is assumed to be protected via a HAIPE device. However, the IP layer encryption introduces challenges for bandwidth on demand satellite communication. The problems experience... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the multicast capacity of wireless ad hoc networks with network coding

    Publication Year: 2011, Page(s):525 - 535
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1014 KB) | HTML iconHTML

    In this paper, we study the contribution of network coding (NC) in improving the multicast capacity of random wireless ad hoc networks when nodes are endowed with multi-packet transmission (MPT) and multi-packet reception (MPR) capabilities. We show that a per session throughput capacity of Θ(nT3 (n)) can be achieved as a tight bound when each session contains a constant number o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the heterogeneous postal delivery model for multicasting

    Publication Year: 2011, Page(s):536 - 543
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (817 KB) | HTML iconHTML

    The heterogeneous postal delivery model assumes that each intermediate node in the multicasting tree incurs a constant switching time for each message that is sent. We have proposed a new model where we assume a more generalized switching time at intermediate nodes. In our model, a child node v of a parent u has a switching delay vector, where the ith element of the vector indicates the switching ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Call for papers

    Publication Year: 2011, Page(s): 544
    Request permission for commercial reuse | |PDF file iconPDF (745 KB)
    Freely Available from IEEE
  • Physical-layer security

    Publication Year: 2011, Page(s): 545
    Request permission for commercial reuse | |PDF file iconPDF (342 KB)
    Freely Available from IEEE
  • [Advertisement]

    Publication Year: 2011, Page(s): 546
    Request permission for commercial reuse | |PDF file iconPDF (601 KB)
    Freely Available from IEEE
  • Aim and scope

    Publication Year: 2011, Page(s): 547
    Request permission for commercial reuse | |PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • [Back cover]

    Publication Year: 2011, Page(s): c4
    Request permission for commercial reuse | |PDF file iconPDF (153 KB)
    Freely Available from IEEE

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Anthony Ephremides
University of Maryland