Scheduled System Maintenance
On Saturday, December 10, single article sales and account management will be unavailable from 5:00-7:30 AM ET (10:00-12:30 UTC).
We apologize for the inconvenience.
By Topic

2009 Fourth International Conference on Systems and Networks Communications

20-25 Sept. 2009

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (308 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (176 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (108 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2009, Page(s):xi - xiv
    Request permission for commercial reuse | PDF file iconPDF (144 KB)
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009, Page(s):xv - xviii
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Relaying Controller Area Network Frames over Wireless Internetworks for Automotive Testing Applications

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    In this paper we describe how controller area network (CAN) frames can be relayed over a wireless Internet connection, enabling remote access to the CAN buses of vehicles for applications in automotive telematics. This opens up many new possibilities for diagnostics, monitoring, testing, analysis and verification, which we believe can significantly reduce the time required for the testing and veri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Optimal Radio Propagation Model in VANET

    Publication Year: 2009, Page(s):6 - 11
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    There are many parameters that affect the performance of vehicular ad hoc networks (VANETs) applications and protocols. To test the new applications and protocols on a real setup is very difficult and very costly. Most researchers use simulation tools to study and analyze VANETs. The simulators usually use simple radio propagation models that did not take into account all the obstacles in the envi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensitivity Analysis on Flexray Dynamic Segment Design Parameters

    Publication Year: 2009, Page(s):12 - 18
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1136 KB) | HTML iconHTML

    The Flexray protocol is rapidly emerging as the next generation in-vehicle communication protocol that will accommodate safety critical, high bandwidth and real time requirements coming from the burgeoning increase of automotive electronic content. The Flexray protocol provides a globally synchronized time base and has provisions for a Time Division Multiple Access (TDMA) based transmit model (sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Managing QoS in a NGN Using a PBM Approach

    Publication Year: 2009, Page(s):19 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Next Generation Network (NGN) management represents an enormous challenge due to the large number of managed elements, the variety of roles the managed entities play in the network and the difficulty of orchestrating management actions. Several NGN standardization bodies point toward policy based management as the best approach for NGN network management. This paper describes a management solution... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MA-AODV: Mobility Aware Routing Protocols for Mobile Ad Hoc Networks

    Publication Year: 2009, Page(s):25 - 29
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (610 KB) | HTML iconHTML

    A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate and collaborate with each other without reliance on any pre-existing infrastructure. In MANETs, wireless links are subject to frequent breakages due to nodes high mobility. While several routing protocols such AODV and DSR have been designed for MANETs, many of operate efficiently under low network mobility conditions... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks

    Publication Year: 2009, Page(s):30 - 36
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (475 KB) | HTML iconHTML

    Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Analysis of Fast Handover Schemes for Proxy Mobile IPv6

    Publication Year: 2009, Page(s):37 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (586 KB) | HTML iconHTML

    As wireless technologies have grown, many people want to use wireless networks during movements. Accordingly, Mobile IPv6 was developed by the Internet Engineering Task Force to support the mobility service. However, Mobile IPv6 cannot satisfy requirements of real-time applications such as video streaming service and VoIP service due to its high handover latency. To address this problem, Proxy Mob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Geographic Scheme with Location Update for Ad Hoc Routing

    Publication Year: 2009, Page(s):43 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (661 KB) | HTML iconHTML

    Because of the dynamic network topology, routing becomes a challenging problem in MANET. Many geographic schemes are proposed to improve routing performance but cause the challenges in geographic routing when deal with the topological problems such as a hole in the network and the location maintenances. In this paper we propose a geographic scheme with location update (GLU) for ad hoc routing. An ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Route Optimization Mechanisms Performance Evaluation in Proxy Mobile IPv6

    Publication Year: 2009, Page(s):49 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Proxy Mobile IPv6 outperforms previous mobility protocols have been standardized by the Internet Engineering Task Force. However, Proxy Mobile IPv6 still involves the triangle routing problem in where data packets for the mobile node are delivered throughout inefficient routing paths. To address the triangle routing problem, two different Route Optimization schemes proposed that exclude the ineffi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi-point Relaying Techniques with OSPF on Ad Hoc Networks

    Publication Year: 2009, Page(s):53 - 62
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (649 KB) | HTML iconHTML

    Incorporating multi-hop ad hoc wireless networks in the IP infrastructure is an effort to which a growing community participates. One instance of such activity is the extension of the most widely deployed interior gateway routing protocol on the Internet, OSPF (Open Shortest Path First), for operation on Mobile Ad hoc Networks (MANETs). Such extension allows OSPF to work on heterogeneous networks ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending the Ad Hoc Horizon in Dense 802.11 Networks Using Fountain Codes

    Publication Year: 2009, Page(s):63 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Ad hoc networks are one operational mode of IEEE802.11 wireless local area networks (WLANs) in which users form themselves the network and act as routers to one another. When the density of such a network is high, capacity becomes limited by the interference resulting from the collisions between simultaneously transmitted packets. Interference gets even worse in the case of reliable transport base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regulatory Approach to Introduction of WiMAX in Bosnia and Herzegovina

    Publication Year: 2009, Page(s):68 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB) | HTML iconHTML

    The paper focuses on the implementation of WiMAX in Bosnia and Herzegovina (BiH). A brief overview of the regulatory and legislative framework for the service implementation is given. It encompasses review of present characteristics of telecommunications market in Bosnia and Herzegovina. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Channel Model Based on SoC Design Methodology

    Publication Year: 2009, Page(s):72 - 75
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (663 KB) | HTML iconHTML

    In this paper, a new method to model and simulate a wireless communication system based on system on chip design methodology will be presented. The network performance effected by the amount of detail in the simulation model. Hence there is a need to develop suitable abstractions that maintain the accuracy of the simulation while keeping the computational resource requirements low. The integration... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance Assessment of Single and Multiple Antenna Relays for the Uplink OFDM Systems

    Publication Year: 2009, Page(s):76 - 81
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (645 KB) | HTML iconHTML

    The aim of this paper is to propose and assess the performance of cooperative schemes designed for the uplink OFDM based systems with mobile relays with an antenna array. We consider the use of an antenna array at the base station and a single antenna at the user terminal. We compare the situations at which the relay is equipped with one or two antennas. We assume that some of the user terminals d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Rate of DS-IR with RAKE Reception in Frequency Selective Channels

    Publication Year: 2009, Page(s):82 - 87
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (509 KB) | HTML iconHTML

    Direct sequence impulse radio (DS-IR) is a flexible ultra wideband (UWB) format that jointly exploits direct sequence (DS) and time hopping (TH) spreading. The symbol error rate (SER) of DS-IR is analysed for a QPSK system transmitting over a frequency selective channel with coherent RAKE reception. The inter symbol interference (ISI) and other impairments affecting the system are studied and nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum SINR Circular Weight Design of Multiple Transmitter Multiple Receiver System

    Publication Year: 2009, Page(s):88 - 93
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (371 KB) | HTML iconHTML

    Conventional MIMO (multiple input multiple output) multiuser systems consider communications between one base station (BS) and multiple user terminals (UTs) both in downlink and uplink scenarios.This paper deals with the case in which multiple BSs transmit different data sequence to different target UTs which becomes a MTMR (multiple transmitter multiple receiver) problem, and describes a maximum ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 802.21-MPA-IMS Architecture

    Publication Year: 2009, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (819 KB) | HTML iconHTML

    Mobility has become a keyword nowadays with the evolution of mobile devices market and proliferation of real-time services. IP Multimedia Subsystem (IMS) is a single, standardized service framework that supports voice, video, data and messaging services, but does not provide seamless mobility for packet based sessions. This paper purposes an IMS architecture with IEEE 802.21 and media-independent ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.