The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)

2-4 Aug. 2011

Filter Results

Displaying Results 1 - 25 of 90
  • [Front and back cover]

    Publication Year: 2011, Page(s):c1 - c4
    Request permission for reuse | PDF file iconPDF (202 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2011, Page(s): i
    Request permission for reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): ii
    Request permission for reuse | PDF file iconPDF (181 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):iii - viii
    Request permission for reuse | PDF file iconPDF (601 KB)
    Freely Available from IEEE
  • Message from the chairs

    Publication Year: 2011, Page(s): ix
    Request permission for reuse | PDF file iconPDF (175 KB)
    Freely Available from IEEE
  • Conference committee

    Publication Year: 2011, Page(s): x
    Request permission for reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • International liaisons

    Publication Year: 2011, Page(s): xi
    Request permission for reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2011, Page(s): xii
    Request permission for reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2011, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Keynote talk 1: The internet WITH things

    Publication Year: 2011, Page(s): 1
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (57 KB)

    Summary form only given. As we continue scaling towards 14 nm and beyond, reliability is becoming an integral part of the complete technology offering. Building in reliability is critical to the success of future scaling. As we marched towards the sub 100 nm technologies material changes have been necessary to meet the power, performance and reliability requirements. In sub 45 nm regime SiOx based... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk 2: How to build an industrial R&D center in Vietnam: A case study

    Publication Year: 2011, Page(s): 2
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (54 KB)

    Summary form only given. To be competitive in today's market, the IT industry faces many challenges in the development and maintenance of enterprise information systems. Engineering these largescaled systems efficiently requires making decisions about a number of issues. In addition, customers expectations imply continuous software delivery in predictable quality. The operation such systems demand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk 3: From basics to advanced modelling and simulation techniques for mobile radio channels

    Publication Year: 2011, Page(s):3 - 4
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (86 KB)

    From the earliest beginnings of mobile communications to the present time, there has always been a high demand for realistic mobile radio channel models. This demand is driven by the fact that channel models are indispensable for the performance evaluation, parameter optimisation, and test of mobile communication systems. Channel modelling and simulation techniques are therefore of great importanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote talk 4: Automated understanding of video object events in a distributed smart camera network

    Publication Year: 2011, Page(s): 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (62 KB)

    Summary form only given. You may think that your requirements engineering process is fairly limited and currently not too complex to manage. Or you may be right in the middle of a storm of requirements where it is impossible to manage even the most important ones comprehensively. If you are in the former situation, it may be dangerous to relax as many successful software-intensive products have a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On functionality extension of the digital signature standards

    Publication Year: 2011, Page(s):6 - 9
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (457 KB) | HTML iconHTML

    There are proposed collective signature, blind signature, and collective blind signature protocols based on the digital signature generation and verification procedures specified by Russian and Belarusian signature standards. The protocols are characterized in computing the randomization parameter of the collective signature depending on the collective public key. Due to this novel feature the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure finite state integer arithmetic codes

    Publication Year: 2011, Page(s):10 - 13
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (985 KB) | HTML iconHTML

    In this paper finite state characteristic of integer arithmetic codes (FSAC) is combined with prefix free characteristic of Huffman codes to yield security in source codes. Some random jumps are inserted in transition sequence of state diagram to provide security. Huffman codes are used to make possible tracking and therefore decoding in jump instants. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions

    Publication Year: 2011, Page(s):14 - 17
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    We consider the problem of constructing public-key encryption schemes that are resilient to chosen-ciphertext and key-leakage attach. In this paper, we present a generic construction of public-key encryption that is resilient to this attack from any 1-universal hash proof system and any 4-wise independent hash function. As shown in the paper [6] they can be instantiated with efficient schemes base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial reuse of QAM signal points for BICM-ID systems

    Publication Year: 2011, Page(s):18 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (847 KB) | HTML iconHTML

    A new method of reusing a subset of an M-QAM signal constellation is presented for Bit-Interleaved Coded Modulation systems with Iterative Decoding (BICM-ID). In addition to the remapping of high-energy signals to low-energy signals in order to save the average signal energy as a shaping technique known so far, a new scheme of remapping low-energy signals to high-energy signals is proposed in orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Construction of high-rate QC-LDPC codes

    Publication Year: 2011, Page(s):24 - 27
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (928 KB) | HTML iconHTML

    In this paper, we construct high-rate quasi-cyclic low-density parity-check (QC-LDPC) codes with girth-10 based on shortened array codes. First, we derive analytic results on the maximum number of columns for shortened array codes of different girths. A code construction method inspired by the analysis is proposed for column-weight-three codes and is compared with the conventional greedy construct... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion-aware energy-efficient routing in wireless sensor networks

    Publication Year: 2011, Page(s):28 - 31
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1340 KB) | HTML iconHTML

    Energy efficiency is a critical feature to be considered in wireless sensor networks (WSNs). In recent studies, it was revealed that congestion is one of the main factors to provoke energy consumption in constrained environments. To alleviate congestion, several studies have been investigated, but mostly focused on the transport layer. In this paper, we propose a congestion-aware energy-efficient ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A reliable and energy efficient routing protocol in industrial wireless sensor networks

    Publication Year: 2011, Page(s):32 - 35
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (700 KB) | HTML iconHTML

    This paper proposes a reliable an energy efficient routing protocol for transmitting periodic packets on industrial wireless sensor networks. For reliable transmission of periodic packets, the proposed protocol chooses the path has highest end-to-end packet reception rate (e2e_PRR) to transmit data packets. Also, a mechanism is used to reduce the number of control packets. The simulation result ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A load-balanced and mobility-aware routing protocol for vehicular ad-hoc networks

    Publication Year: 2011, Page(s):36 - 39
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (677 KB) | HTML iconHTML

    VANET (Vehicular Ad-hoc NETwork) is comprised of devices that are installed inside vehicles and on road sides. Since vehicles can move randomly and at various velocities, the network topology is highly dynamic. Consequently, links between network nodes could be broken at anytime and communications from vehicle to vehicle could be corrupted. For this reason, a routing protocol independent of the ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering based multi-object positioning system

    Publication Year: 2011, Page(s):40 - 44
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1347 KB) | HTML iconHTML

    Acoustic source positioning plays an important role in military tracking unwelcome objects. A system for this application must be capable of dealing with the input recorded convolved mixture signals while minimizing the high communication and computation cost. This paper describes a distributed system for positioning multiple independent moving sources relying on acoustic signals. The sensors pre-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency offset compensation for crystal-free 802.15.4 communication

    Publication Year: 2011, Page(s):45 - 47
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (647 KB) | HTML iconHTML

    The IEEE 802.15.4 standard is widely used in low power wireless sensor networks. Providing 250kbps raw data band-width, its physical layer (PHY) mandates tight constraints on the RF carrier frequency, calling for an absolute accuracy of ±40 ppm. This specification necessitates the use of a crystal timing reference, thus requiring design of a multi-component PCB to implement any 802.15.4 compliant ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scene-based video super-resolution with minimum mean square error estimation

    Publication Year: 2011, Page(s):48 - 52
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (812 KB) | HTML iconHTML

    Motion estimation is a key problem in video super-resolution (SR). If the estimation is highly accurate then the high resolution (HR) frames reconstructed is better in quality. Otherwise with small errors in estimation, they will create more degradation in the reconstructed HR frames. In many recent studies, the motion estimation is applied on every block of pixels. There is too little input data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on hierarchical side information generation structure in Distributed Video Coding

    Publication Year: 2011, Page(s):53 - 57
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (810 KB) | HTML iconHTML

    Side Information generation is one of major problems in Distributed Video Coding (DVC). This can be performed by motion compensated temporal interpolation (MCTI) between two closest key frames. However, when temporal distance between the key frames increases, its linear interpolation becomes less effective. This paper introduces a hierarchical side information generation structure applicable to DV... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.