2000 IEEE International Conference on Personal Wireless Communications. Conference Proceedings (Cat. No.00TH8488)

17-20 Dec. 2000

Filter Results

Displaying Results 1 - 25 of 121
  • 2000 IEEE International Conference on Personal Wireless Communications. Conference Proceedings (Cat. No.00TH8488)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (556 KB)
    Freely Available from IEEE
  • Voice browsing for handheld mobile devices supporting WAP protocol

    Publication Year: 2000, Page(s):408 - 412
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (547 KB)

    The metamorphosis of telecommunications networks, wireless networks and the Internet has led to a need for a system that makes access to the Web on a mobile device convenient and easy. The paper proposes such a system that allows the user to speak his request for accessing a Web page or performing device-specific operations, rather than type it. The response from the proxy server is played back to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative multiuser detection with graphical modeling

    Publication Year: 2000, Page(s):454 - 458
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB)

    In this paper, we give a graphical interpretation of the multiuser detection problem for interference limited channels, using generalized inference techniques on graphs. One impediment to the implementation of multiuser detection techniques in practical systems (such as in DS-CDMA) has been the difficulty of dealing with the large number of random variables present in such systems. Graphical techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of different retransmission strategies for bandwidth efficient hybrid ARQ schemes using turbo codes

    Publication Year: 2000, Page(s):548 - 552
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (403 KB)

    In this paper, two classes of retransmission strategies in time-varying mobile radio channels are studied for bandwidth efficient hybrid-ARQ (HARQ) schemes using turbo coded modulation. These schemes combine the power efficiency of turbo codes with the bandwidth efficiency of trellis-coded modulation (TCM) to create an effective hybrid FEC/ARQ system. Different retransmission schemes provide a tra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Index of authors

    Publication Year: 2000, Page(s):583 - 584
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • An adaptive reservation packet switched multiple access protocol for a wireless network

    Publication Year: 2000, Page(s):519 - 523
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    This paper addresses the development of an adaptive packet based reservation multiple access protocol to transmit multimedia traffic over a wireless network. The proposed multiple access protocol is an adaptive version of the BRTDMA (block reservation time division multiple access) protocol where resources are allocated based on traffic type in a network. Resources are allocated in such a way that... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimally combined nonlinear MMSE beamforming and interference cancellation for CDMA communications

    Publication Year: 2000, Page(s):474 - 478
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    Nonlinear MMSE multiuser detection has been shown in earlier works to be equivalent to minimum probability of error multiuser detection for systems using binary or M-ary orthogonal signaling. An iterative approximation to nonlinear MMSE multiuser detection, proposed earlier for single-antenna systems, is applied in this paper to CDMA systems with random spreading and multiple receive antennas. The... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and performance studies on coded M-ary FSK DS CDMA system

    Publication Year: 2000, Page(s):315 - 319
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper deals with design and studies on the performance of a CDMA scheme with forward error correction coding. A low-complexity non-coherent demodulator is used at the receiver. Convolutional codes with rate 1/2 and variable constraint lengths are considered in evaluating the system performance. Some important conclusions are made based on our studies View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intrusion tolerance schemes to facilitate mobile e-commerce

    Publication Year: 2000, Page(s):514 - 518
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    In this paper, we concentrate on one aspect of information system security, namely that of intrusion tolerance. An intrusion tolerant system is one that continues to function correctly and provide the intended user services in a timely manner even in the face of an information attack. In this paper we concentrate on a technique called fragmentation-redundancy-scattering and investigate how this te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-similar network traffic characterization through linear scale-invariant system models

    Publication Year: 2000, Page(s):138 - 142
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    It has been empirically documented that data traffic over networks of various types exhibits fractal or self-similar behavior in many instances. Accurate analysis of traffic density and estimation of buffer size must take into account this self-similar nature. There is ongoing research on generating self-similar data for use in simulation and modeling of network traffic. This paper demonstrates th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Congestion in spread spectrum wireless mobile communication networks

    Publication Year: 2000, Page(s):310 - 314
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    This paper surveys some macroscopic measures of congestion that pertain to spread spectrum networks which are used in network control to decide whether or not to admit a call. Such measures reflect the congestion in the region of the network that the call will interact with during its lifetime as opposed to properties of the user itself at call set up time which are of little value due to temporal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An overview on harmonization of broadband wireless standards

    Publication Year: 2000, Page(s):178 - 183
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    This paper discusses different broadband wireless standards (LAN, WAN) currently under progress while mentioning key differences on physical (PHY) and data link control (DLC) layers. Harmonized global standards for all broadband wireless systems, from 2 GHz to 50 GHz would be a daunting task considering that organizations dealing with standards from the USA, Europe and Japan would have differing p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Downlink transmit diversity: feedback efficiency and robustness

    Publication Year: 2000, Page(s):14 - 18
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    A recently introduced method for closed-loop transmit diversity (see Nagaraj, S. and Huang, Y.F., Asilomar Conference on Signals, Systems and Computers, 2000) is further analyzed in this paper. Specifically, the amount of power saving possible due to the inherent feature of selective feedback is quantified via a capacity analysis. An optimal adaptive algorithm for channel estimation, in the sense ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimum detector for coherent M-ary signaling in the presence of impulsive noise

    Publication Year: 2000, Page(s):363 - 367
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    Digital communication systems operating in the ELF/VLF range are strongly affected by atmospheric noise which has an impulsive component on a white Gaussian background. We derive an optimum detector for coherent M-ary signaling in the presence of such noise. In the special case of coherent binary signaling, the performance of a suboptimum linear detector is analyzed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and privacy issues in wireless and mobile computing

    Publication Year: 2000, Page(s):509 - 513
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    Implementing security in wireless systems is a difficult and challenging task owing to the mobility of users and network components and the fact that the wireless medium is susceptible to eavesdropping, espionage and fraud. We study the security issues in wireless systems in this paper. Specifically, we discuss the security problems in wireless systems and the proposed solutions and security measu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of spreading code and estimation of channel capacity in multi-code CDMA downlink

    Publication Year: 2000, Page(s):469 - 473
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Transmission of multimedia data was one of the primary goals of the 3G cellular radio system. This necessitated very high-speed data links and the accommodation of the maximum possible number of users where the multipath delay spread encompassed many symbol intervals. Thus we saw that there was an urgent requirement to find more effective methods to combat the problems and channel impairments of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis for DS-CDMA systems with multistage HD-PIC

    Publication Year: 2000, Page(s):133 - 137
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    For a direct-sequence code division multiple access system with hard decision parallel interference cancellation (DS-CDMA with HD-PIC), we derive analytical results concerning the probability of a bit error. More precisely, we investigate the exponential rate Hk(s) of a CDMA system with s stages of HD-PIC, with k users and processing gain equal to n, as n→∞. The ra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile IP for 3G wireless networks

    Publication Year: 2000, Page(s):240 - 244
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    Mobile IP specifies protocol enhancements to the Internet protocol that allow transparent routing of IP datagrams in the Internet to the mobile node irrespective of its physical location. Extensions are being proposed for managing Mobile IP-based micro-mobility for the interface between a radio network and a packet data network in the third-generation cdma2000 network. We discuss the cdma2000 arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Full duplex voice communication handsets over single carrier frequency

    Publication Year: 2000, Page(s):307 - 309
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB)

    A new technique for realization of two-way voice communication over a single carrier frequency as an improvement over the usual walky-talky type, simplex handsets, which are very widely used for civil as well as for military applications, is proposed. The challenge lies in providing cost-effective, full-duplex digital voice communication handsets, conserving the bandwidth at the same time View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool to calculate Erlang capacity of a BTS supporting 3G UMTS system

    Publication Year: 2000, Page(s):173 - 177
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    The second-generation (2G) wireless systems are primarily designed for voice services. The cell capacity is obtained by simulation for the given mobile environment. The cell capacity is used in network planning. The proposed 3G wireless systems mainly address data services. A 3G system allows users to use multimedia services. Therefore, there can be several different combinations of the voice and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advantages of SiGe-HBTs for RF wireless communication

    Publication Year: 2000, Page(s):9 - 13
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    State-of-the-art RF wireless communication systems require high level of integration, low-cost and high performance. The suitability of Si/SiGe heterostructure based devices and circuits is examined in this paper. Issues related to the choice of technology for RFICs are considered and it has been shown that scaled SiGe-HBTs satisfy most of the requirements such as gain, ft and noise fig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organizing, self-healing wireless networks

    Publication Year: 2000, Page(s):355 - 362
    Cited by:  Papers (4)  |  Patents (33)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (824 KB)

    Self-organizing, self-healing networks, also called “ad hoc” networks, are perhaps the most exciting new trend in networking research and development. Every node in such a network has sufficient intelligence to continuously sense and discover other nearby nodes, dynamically determine the optimal path for forwarding data packets from itself hop by hop through the network to any other no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impact of different cellular-IP convergence strategies on mobile terminals

    Publication Year: 2000, Page(s):504 - 508
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    The last few years has seen a proliferation of the Internet, making it accessible to several millions of users worldwide. At the same time, the use of mobile devices such as cellular telephones and personal digital assistants (PDA) has been on the rise. Currently, we are beginning to see the convergence of these technologies whereby access to the Internet and other (potentially private) packet swi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS analyses of multimedia traffic in heterogeneous wireless IP networks

    Publication Year: 2000, Page(s):207 - 211
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    The Internet should allow introduction of multimedia in cellular networks, which are voice-oriented. The mobility of the users and different traffic types are introducing quality of service support in wireless IP environments. The features of IP, under the conditions in cellular networks and additional classification of the traffic, is the key element. QoS in packet networks is considered by admis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis for DS-CDMA systems with one-stage HD-PIC

    Publication Year: 2000, Page(s):128 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    We derive analytical results of the bit-error probability for a direct-sequence code division multiple access model with hard decision parallel interference cancellation (DS-CDMA with HD-PIC). Arbitrary powers and AWGN are incorporated in this model. More precisely, we derive the exponential rate Hk of a CDMA system with 1-stage HD-PIC, with k users and processing gain equal to n, as n&... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.