2014 IEEE 79th Vehicular Technology Conference (VTC Spring)

18-21 May 2014

Filter Results

Displaying Results 1 - 25 of 425
  • [VTC 2014 Spring - title page]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • VTC 2014 Spring Welcome from the General Chair

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (83 KB) | HTML iconHTML
    Freely Available from IEEE
  • VTC 2014 Spring Welcome from the TPC Co-chairs

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (108 KB) | HTML iconHTML
    Freely Available from IEEE
  • VTC 2014 Spring Welcome from the President

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (45 KB) | HTML iconHTML
    Freely Available from IEEE
  • VTC 2014 Spring Organizing Committee

    Publication Year: 2014, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (72 KB)
    Freely Available from IEEE
  • VTC 2014 Spring Track Co-chairs

    Publication Year: 2014, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • VTC 2014 Spring TPC Members

    Publication Year: 2014, Page(s):i - viii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • VTC 2014 Spring Reviewers

    Publication Year: 2014, Page(s):i - xix
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • VTC 2014 Spring Patrons and Exhibitors

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • VTC 2014 Spring Final Program

    Publication Year: 2014, Page(s):i - xvi
    Request permission for commercial reuse | PDF file iconPDF (247 KB)
    Freely Available from IEEE
  • Welcome to 2014 IEEE VTC-WoW

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome Message from the VTM 2014 General Co-Chairs

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (85 KB) | HTML iconHTML
    Freely Available from IEEE
  • W1 Committee

    Publication Year: 2014, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • W2 Committee

    Publication Year: 2014, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (68 KB)
    Freely Available from IEEE
  • W4 Committee

    Publication Year: 2014, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • [VTC Workshops Table of Contents]

    Publication Year: 2014, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • 3D Polarization Projection for WINNER Channel Simulations

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (754 KB) | HTML iconHTML

    Wireless world initiative new radio (WINNER) delivers a 3D cross-polarized channel model for B3G/4G system designs. Comprehensive radiation characteristics of polarized antenna are crucial in generating channel coefficients. Being currently supported within WINNER channel model, field patterns are technically obtained by chamber measurement. However, in some channel related performance analysis sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D UTD Modeling of a Measured Antenna Disturbed by a Dielectric Circular Cylinder in WBAN Context

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (447 KB) | HTML iconHTML

    This paper describes a work realized for On-Body antennas characterization: the 3D deterministic modeling of a measured antenna disturbed by a dielectric circular cylinder of finite length. This prediction model is based on the ray-tracing technique for the electromagnetic wave paths search and the Uniform Theory of Diffraction (UTD) for the modeling of the electromagnetic waves interactions with ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chain Based Syndrome Coding Scheme for Secure Communication in the Wiretap Channel

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (441 KB) | HTML iconHTML

    In this paper, we propose a chain based syndrome coding scheme for secure communication in a wiretap channel, where the main channel is noiseless and the eavesdropper channel is binary symmetric. The most relevant aspect of the scheme, which represents a generalization of Wyner's conventional syndrome coding scheme, relates to the use of a chain of syndromes to encode the message. By using the eav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Contract-Auction Mechanism for Multi-Relay Cooperative Wireless Networks

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Cooperation in wireless systems requires providing proper incentives. Furthermore, relay nodes may not be willing to reveal their channel state information to others, which will result in asymmetry of information. This paper integrates contract theory and auction mechanism to stimulate relays to cooperate and maximize utility of both the source node and the relay node. In the presence of asymmetri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Compressed Sensing Scheme Based on One-Bit Quantization

    Publication Year: 2014, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    For multi-node networks, a distributed compressed sensing scheme based on one-bit quantization is proposed, where signals at each node consist of common component and innovation component. To reduce the transmission cost, each node derives the measurements as the sign information of the compressed samples by using one-bit quantization. Based on the received sign information from different nodes, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Prioritization Scheme between Access Points for Densely Deployed Networks

    Publication Year: 2014, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Random backoff counter based contention schemes have some drawbacks. They are basically unfair in short periods and unable to provide differentiated services between participants. Since these drawbacks are more serious when the participants are access points rather than mobile nodes, we propose a prioritization scheme to enhance the short-term fairness and to give different priorities between them... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Blocking Notification (BN) Scheme with Strategic Nodes for Wireless Ad Hoc Networks

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    The traditional RTS/CTS handshaking has been widely adopted in wireless ad hoc networks to reduce the hidden terminal problem. However, the handshaking induces the false blocking problem where adjacent nodes are deferred unnecessarily by overhearing the unsuccessful RTS packets. To mitigate these, the Blocking Notification (BN) scheme was proposed previously. In the BN scheme, the hidden and expos... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Clustering Algorithm Design for C-RAN Based on Multi-Objective Optimization Theory

    Publication Year: 2014, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    Cloud radio access network (C-RAN) is a new concept of network architecture, which brings a technical revolution into the wireless communication market and leads to some kind of all new mode of the future wireless communications. In this paper the clustering algorithm based on multi-objective optimization is investigated. The proposed algorithm aims at maximizing the throughput contribution of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.