IEEE Communications Letters
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 16 Issue: 6
- Vol: 16 Issue: 7
- Vol: 16 Issue: 8
- Vol: 16 Issue: 9
- Vol: 16 Issue: 10
- Vol: 16 Issue: 11
- Vol: 16 Issue: 12
- Vol: 5 Issue: 1
- Vol: 5 Issue: 2
- Vol: 5 Issue: 3
- Vol: 5 Issue: 4
- Vol: 5 Issue: 5
- Vol: 5 Issue: 6
- Vol: 5 Issue: 7
- Vol: 5 Issue: 8
- Vol: 5 Issue: 9
- Vol: 5 Issue: 10
- Vol: 5 Issue: 11
- Vol: 5 Issue: 12
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 15 Issue: 6
- Vol: 15 Issue: 7
- Vol: 15 Issue: 8
- Vol: 15 Issue: 9
- Vol: 15 Issue: 10
- Vol: 15 Issue: 11
- Vol: 15 Issue: 12
- Vol: 4 Issue: 1
- Vol: 4 Issue: 2
- Vol: 4 Issue: 3
- Vol: 4 Issue: 4
- Vol: 4 Issue: 5
- Vol: 4 Issue: 6
- Vol: 4 Issue: 7
- Vol: 4 Issue: 8
- Vol: 4 Issue: 9
- Vol: 4 Issue: 10
- Vol: 4 Issue: 11
- Vol: 4 Issue: 12
- Vol: 14 Issue: 1
- Vol: 14 Issue: 2
- Vol: 14 Issue: 3
- Vol: 14 Issue: 4
- Vol: 14 Issue: 5
- Vol: 14 Issue: 6
- Vol: 14 Issue: 7
- Vol: 14 Issue: 8
- Vol: 14 Issue: 9
- Vol: 14 Issue: 10
- Vol: 14 Issue: 11
- Vol: 14 Issue: 12
- Vol: 13 Issue: 1
- Vol: 13 Issue: 2
- Vol: 13 Issue: 3
- Vol: 13 Issue: 4
- Vol: 13 Issue: 5
- Vol: 13 Issue: 6
- Vol: 13 Issue: 7
- Vol: 13 Issue: 8
- Vol: 13 Issue: 9
- Vol: 13 Issue: 10
- Vol: 13 Issue: 11
- Vol: 13 Issue: 12
- Vol: 2 Issue: 1
- Vol: 2 Issue: 2
- Vol: 2 Issue: 3
- Vol: 2 Issue: 4
- Vol: 2 Issue: 5
- Vol: 2 Issue: 6
- Vol: 2 Issue: 7
- Vol: 2 Issue: 8
- Vol: 2 Issue: 9
- Vol: 2 Issue: 10
- Vol: 2 Issue: 11
- Vol: 2 Issue: 12
- Vol: 12 Issue: 1
- Vol: 12 Issue: 2
- Vol: 12 Issue: 3
- Vol: 12 Issue: 4
- Vol: 12 Issue: 5
- Vol: 12 Issue: 6
- Vol: 12 Issue: 7
- Vol: 12 Issue: 8
- Vol: 12 Issue: 9
- Vol: 12 Issue: 10
- Vol: 12 Issue: 11
- Vol: 12 Issue: 12
- Vol: 11 Issue: 1
- Vol: 11 Issue: 2
- Vol: 11 Issue: 3
- Vol: 11 Issue: 4
- Vol: 11 Issue: 5
- Vol: 11 Issue: 6
- Vol: 11 Issue: 7
- Vol: 11 Issue: 8
- Vol: 11 Issue: 9
- Vol: 11 Issue: 10
- Vol: 11 Issue: 11
- Vol: 11 Issue: 12
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 21 Issue: 6
- Vol: 21 Issue: 7
- Vol: 21 Issue: 8
- Vol: 21 Issue: 9
- Vol: 21 Issue: 10
- Vol: 21 Issue: 11
- Vol: 21 Issue: 12
- Vol: 10 Issue: 1
- Vol: 10 Issue: 2
- Vol: 10 Issue: 3
- Vol: 10 Issue: 4
- Vol: 10 Issue: 5
- Vol: 10 Issue: 6
- Vol: 10 Issue: 7
- Vol: 10 Issue: 8
- Vol: 10 Issue: 9
- Vol: 10 Issue: 10
- Vol: 10 Issue: 11
- Vol: 10 Issue: 12
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 20 Issue: 6
- Vol: 20 Issue: 7
- Vol: 20 Issue: 8
- Vol: 20 Issue: 9
- Vol: 20 Issue: 10
- Vol: 20 Issue: 11
- Vol: 20 Issue: 12
- Vol: 9 Issue: 1
- Vol: 9 Issue: 2
- Vol: 9 Issue: 3
- Vol: 9 Issue: 4
- Vol: 9 Issue: 5
- Vol: 9 Issue: 6
- Vol: 9 Issue: 7
- Vol: 9 Issue: 8
- Vol: 9 Issue: 9
- Vol: 9 Issue: 10
- Vol: 9 Issue: 11
- Vol: 9 Issue: 12
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 19 Issue: 6
- Vol: 19 Issue: 7
- Vol: 19 Issue: 8
- Vol: 19 Issue: 9
- Vol: 19 Issue: 10
- Vol: 19 Issue: 11
- Vol: 19 Issue: 12
- Vol: 8 Issue: 1
- Vol: 8 Issue: 2
- Vol: 8 Issue: 3
- Vol: 8 Issue: 4
- Vol: 8 Issue: 5
- Vol: 8 Issue: 6
- Vol: 8 Issue: 7
- Vol: 8 Issue: 8
- Vol: 8 Issue: 9
- Vol: 8 Issue: 10
- Vol: 8 Issue: 11
- Vol: 8 Issue: 12
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 18 Issue: 6
- Vol: 18 Issue: 7
- Vol: 18 Issue: 8
- Vol: 18 Issue: 9
- Vol: 18 Issue: 10
- Vol: 18 Issue: 11
- Vol: 18 Issue: 12
- Vol: 7 Issue: 1
- Vol: 7 Issue: 2
- Vol: 7 Issue: 3
- Vol: 7 Issue: 4
- Vol: 7 Issue: 5
- Vol: 7 Issue: 6
- Vol: 7 Issue: 7
- Vol: 7 Issue: 8
- Vol: 7 Issue: 9
- Vol: 7 Issue: 10
- Vol: 7 Issue: 11
- Vol: 7 Issue: 12
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 17 Issue: 6
- Vol: 17 Issue: 7
- Vol: 17 Issue: 8
- Vol: 17 Issue: 9
- Vol: 17 Issue: 10
- Vol: 17 Issue: 11
- Vol: 17 Issue: 12
- Vol: 16 Issue: 1
- Vol: 16 Issue: 2
- Vol: 16 Issue: 3
- Vol: 16 Issue: 4
- Vol: 16 Issue: 5
- Vol: 16 Issue: 6
- Vol: 16 Issue: 7
- Vol: 16 Issue: 8
- Vol: 16 Issue: 9
- Vol: 16 Issue: 10
- Vol: 16 Issue: 11
- Vol: 16 Issue: 12
- Vol: 5 Issue: 1
- Vol: 5 Issue: 2
- Vol: 5 Issue: 3
- Vol: 5 Issue: 4
- Vol: 5 Issue: 5
- Vol: 5 Issue: 6
- Vol: 5 Issue: 7
- Vol: 5 Issue: 8
- Vol: 5 Issue: 9
- Vol: 5 Issue: 10
- Vol: 5 Issue: 11
- Vol: 5 Issue: 12
- Vol: 15 Issue: 1
- Vol: 15 Issue: 2
- Vol: 15 Issue: 3
- Vol: 15 Issue: 4
- Vol: 15 Issue: 5
- Vol: 15 Issue: 6
- Vol: 15 Issue: 7
- Vol: 15 Issue: 8
- Vol: 15 Issue: 9
- Vol: 15 Issue: 10
- Vol: 15 Issue: 11
- Vol: 15 Issue: 12
- Vol: 4 Issue: 1
- Vol: 4 Issue: 2
- Vol: 4 Issue: 3
- Vol: 4 Issue: 4
- Vol: 4 Issue: 5
- Vol: 4 Issue: 6
- Vol: 4 Issue: 7
- Vol: 4 Issue: 8
- Vol: 4 Issue: 9
- Vol: 4 Issue: 10
- Vol: 4 Issue: 11
- Vol: 4 Issue: 12
- Vol: 14 Issue: 1
- Vol: 14 Issue: 2
- Vol: 14 Issue: 3
- Vol: 14 Issue: 4
- Vol: 14 Issue: 5
- Vol: 14 Issue: 6
- Vol: 14 Issue: 7
- Vol: 14 Issue: 8
- Vol: 14 Issue: 9
- Vol: 14 Issue: 10
- Vol: 14 Issue: 11
- Vol: 14 Issue: 12
- Vol: 13 Issue: 1
- Vol: 13 Issue: 2
- Vol: 13 Issue: 3
- Vol: 13 Issue: 4
- Vol: 13 Issue: 5
- Vol: 13 Issue: 6
- Vol: 13 Issue: 7
- Vol: 13 Issue: 8
- Vol: 13 Issue: 9
- Vol: 13 Issue: 10
- Vol: 13 Issue: 11
- Vol: 13 Issue: 12
- Vol: 2 Issue: 1
- Vol: 2 Issue: 2
- Vol: 2 Issue: 3
- Vol: 2 Issue: 4
- Vol: 2 Issue: 5
- Vol: 2 Issue: 6
- Vol: 2 Issue: 7
- Vol: 2 Issue: 8
- Vol: 2 Issue: 9
- Vol: 2 Issue: 10
- Vol: 2 Issue: 11
- Vol: 2 Issue: 12
- Vol: 12 Issue: 1
- Vol: 12 Issue: 2
- Vol: 12 Issue: 3
- Vol: 12 Issue: 4
- Vol: 12 Issue: 5
- Vol: 12 Issue: 6
- Vol: 12 Issue: 7
- Vol: 12 Issue: 8
- Vol: 12 Issue: 9
- Vol: 12 Issue: 10
- Vol: 12 Issue: 11
- Vol: 12 Issue: 12
- Vol: 11 Issue: 1
- Vol: 11 Issue: 2
- Vol: 11 Issue: 3
- Vol: 11 Issue: 4
- Vol: 11 Issue: 5
- Vol: 11 Issue: 6
- Vol: 11 Issue: 7
- Vol: 11 Issue: 8
- Vol: 11 Issue: 9
- Vol: 11 Issue: 10
- Vol: 11 Issue: 11
- Vol: 11 Issue: 12
- Vol: 21 Issue: 1
- Vol: 21 Issue: 2
- Vol: 21 Issue: 3
- Vol: 21 Issue: 4
- Vol: 21 Issue: 5
- Vol: 21 Issue: 6
- Vol: 21 Issue: 7
- Vol: 21 Issue: 8
- Vol: 21 Issue: 9
- Vol: 21 Issue: 10
- Vol: 21 Issue: 11
- Vol: 21 Issue: 12
- Vol: 10 Issue: 1
- Vol: 10 Issue: 2
- Vol: 10 Issue: 3
- Vol: 10 Issue: 4
- Vol: 10 Issue: 5
- Vol: 10 Issue: 6
- Vol: 10 Issue: 7
- Vol: 10 Issue: 8
- Vol: 10 Issue: 9
- Vol: 10 Issue: 10
- Vol: 10 Issue: 11
- Vol: 10 Issue: 12
- Vol: 20 Issue: 1
- Vol: 20 Issue: 2
- Vol: 20 Issue: 3
- Vol: 20 Issue: 4
- Vol: 20 Issue: 5
- Vol: 20 Issue: 6
- Vol: 20 Issue: 7
- Vol: 20 Issue: 8
- Vol: 20 Issue: 9
- Vol: 20 Issue: 10
- Vol: 20 Issue: 11
- Vol: 20 Issue: 12
- Vol: 9 Issue: 1
- Vol: 9 Issue: 2
- Vol: 9 Issue: 3
- Vol: 9 Issue: 4
- Vol: 9 Issue: 5
- Vol: 9 Issue: 6
- Vol: 9 Issue: 7
- Vol: 9 Issue: 8
- Vol: 9 Issue: 9
- Vol: 9 Issue: 10
- Vol: 9 Issue: 11
- Vol: 9 Issue: 12
- Vol: 19 Issue: 1
- Vol: 19 Issue: 2
- Vol: 19 Issue: 3
- Vol: 19 Issue: 4
- Vol: 19 Issue: 5
- Vol: 19 Issue: 6
- Vol: 19 Issue: 7
- Vol: 19 Issue: 8
- Vol: 19 Issue: 9
- Vol: 19 Issue: 10
- Vol: 19 Issue: 11
- Vol: 19 Issue: 12
- Vol: 8 Issue: 1
- Vol: 8 Issue: 2
- Vol: 8 Issue: 3
- Vol: 8 Issue: 4
- Vol: 8 Issue: 5
- Vol: 8 Issue: 6
- Vol: 8 Issue: 7
- Vol: 8 Issue: 8
- Vol: 8 Issue: 9
- Vol: 8 Issue: 10
- Vol: 8 Issue: 11
- Vol: 8 Issue: 12
- Vol: 18 Issue: 1
- Vol: 18 Issue: 2
- Vol: 18 Issue: 3
- Vol: 18 Issue: 4
- Vol: 18 Issue: 5
- Vol: 18 Issue: 6
- Vol: 18 Issue: 7
- Vol: 18 Issue: 8
- Vol: 18 Issue: 9
- Vol: 18 Issue: 10
- Vol: 18 Issue: 11
- Vol: 18 Issue: 12
- Vol: 7 Issue: 1
- Vol: 7 Issue: 2
- Vol: 7 Issue: 3
- Vol: 7 Issue: 4
- Vol: 7 Issue: 5
- Vol: 7 Issue: 6
- Vol: 7 Issue: 7
- Vol: 7 Issue: 8
- Vol: 7 Issue: 9
- Vol: 7 Issue: 10
- Vol: 7 Issue: 11
- Vol: 7 Issue: 12
- Vol: 17 Issue: 1
- Vol: 17 Issue: 2
- Vol: 17 Issue: 3
- Vol: 17 Issue: 4
- Vol: 17 Issue: 5
- Vol: 17 Issue: 6
- Vol: 17 Issue: 7
- Vol: 17 Issue: 8
- Vol: 17 Issue: 9
- Vol: 17 Issue: 10
- Vol: 17 Issue: 11
- Vol: 17 Issue: 12
Volume 6 Issue 9 • Sept. 2002
Sponsor
Filter Results
-
Improved upper bounds on error-probability for biorthogonal trellis-coded CDMA systems
Publication Year: 2002, Page(s):361 - 363
Cited by: Papers (1)We employ the transfer function approach to obtain error-probability upper bounds for asynchronous trellis-coded CDMA systems based on biorthogonal signature sequences. The technique provides uniformly tight bounds for the biorthogonal sequence based trellis codes, both with and without parallel transitions, in contrast to previously published results. View full abstract»
-
Effects of multipath diversity on adaptive QAM in frequency selective Rayleigh fading channels
Publication Year: 2002, Page(s):364 - 366
Cited by: Papers (8)We derive the average bit error rate (BER) and the average throughput for adaptive quadrature amplitude modulation (AQAM) with constant transmit power over frequency selective Rayleigh fading channels. Based on these derived BER and throughput expressions, we go on to investigate the effect of multipath diversity on AQAM using two BER constraints. View full abstract»
-
Analysis of non-uniform cell destination distribution in virtual output queueing systems
Publication Year: 2002, Page(s):367 - 369We develop a discrete-time analytical queueing model for studying the performance of input-queued switches with non-uniform cell destination distribution. Virtual output queues are assumed at the ingress ports where cell arrivals are geometrically distributed and the service process is based on a work conserving random selection scheme. We consider the conditions for stability as basis for derivin... View full abstract»
-
Space-time-frequency (STF) coding for MIMO-OFDM systems
Publication Year: 2002, Page(s):370 - 372
Cited by: Papers (94) | Patents (12)We consider the capacity of multiple-input-multiple-output (MIMO) systems that use OFDM as the modulation format. We point out a basic equivalence between antennas and OFDM-tones. This similarity immediately allows us to essentially reuse all space-time codes designed for flat-fading channels in MIMO-OFDM systems operating in frequency-selective channels. An optimum code would thus code across all... View full abstract»
-
Capacity estimation of a SIR-based power-controlled cellular CDMA system with base station diversity in a multipath fading environment
Publication Year: 2002, Page(s):373 - 375
Cited by: Papers (4)This article estimates the reverse link capacity of an SIR-based power-controlled code-division multiple access system in a multiple cells environment. The effect of multipath fading on the interference statistics is explicitly accounted for and mobiles are assumed to connect to a base station based on minimum attenuation criterion. View full abstract»
-
Multislot estimation of fast-varying space-time channels in TD-CDMA systems
Publication Year: 2002, Page(s):376 - 378
Cited by: Papers (9)We propose a subspace method to estimate the time-varying space-time channel by taking into account the different rates of variation between delays/directions of arrival (slowly-varying) and faded amplitudes (fast-varying) of the multipath propagation. The stationarity of angles and delays across several time-slots is exploited to perform an unstructured estimation that avoids the explicit computa... View full abstract»
-
A distributed source coding technique for correlated images using turbo-codes
Publication Year: 2002, Page(s):379 - 381
Cited by: Papers (38) | Patents (4)The Slepian-Wolf (1973) theorem states that the output of two correlated sources can be compressed to the same extent without loss, whether they communicate with each other or not, provided that decompression takes place at a joint decoder. We present a distributed source coding scheme for correlated images which uses modulo encoding of pixel values and encoding (compression) of the resulting symb... View full abstract»
-
Cryptanalysis of fast encryption algorithm for multimedia FEA-M
Publication Year: 2002, Page(s):382 - 384
Cited by: Papers (8) | Patents (1)Certain weaknesses in the algebraic structure of the previously proposed fast encryption algorithm for multimedia FEA-M are pointed out. It is shown that, when the secret key consists of k bits, under realistic chosen and known plaintext attacks, the secret key recovery has complexity proportional to 2k/sup 2/ and k/sup 4/, respectively, implying that FEA-M is an insecure algorithm even if the sec... View full abstract»
-
Application of efficient Chase algorithm in decoding of generalized low-density parity-check codes
Publication Year: 2002, Page(s):385 - 387
Cited by: Papers (7)We consider the iterative decoding of generalized low-density (GLD) parity-check codes where, rather than employ an optimal subcode decoder, a Chase (1972) algorithm decoder more commonly associated with "turbo product codes" is used. GLD codes are low-density graph codes in which the constraint nodes are other than single parity-checks. For extended Hamming-based GLD codes, we use bit error rates... View full abstract»
-
Pairwise error probability evaluation of multiple symbol trellis-coded continuous phase frequency shift keying in a slow fading channel
Publication Year: 2002, Page(s):388 - 390
Cited by: Patents (1)This article evaluates the pairwise error probability (PEP) of multiple symbol trellis-coded modulation applied to continuous phase frequency shift keying (MTCM/CPFSK) in a slow fading environment with and without channel state information (CSI). The fading amplitude is assumed to be constant during an error event and distributed as Rician. For the case with CSI, the PEP is approximated using the ... View full abstract»
-
Bootstrap decoding of low-density parity-check codes
Publication Year: 2002, Page(s):391 - 393
Cited by: Papers (21) | Patents (11)An initial bootstrap step for the decoding of low-density parity-check (LDPC) codes is proposed. Decoding is initiated by first erasing a number of less reliable bits. New values and reliabilities are then assigned to erasure bits by passing messages from nonerasure bits through the reliable check equations. The bootstrap step is applied to the weighted bit-flipping algorithm to decode a number of... View full abstract»
-
Compression of binary memoryless sources using punctured turbo codes
Publication Year: 2002, Page(s):394 - 396
Cited by: Papers (58)In this letter, we propose the use of punctured turbo codes to perform near-lossless compression and joint source-channel coding of binary memoryless sources. Compression is achieved by puncturing the turbo code to the desired rate. No information about the source distribution is required in the encoding process. Moreover, the source parameters do not need to be known in the decoder, since they ca... View full abstract»
-
Non-full rank space-time trellis codes for serially concatenated system
Publication Year: 2002, Page(s):397 - 399
Cited by: Papers (2)The feasibility of the non-full rank space-time trellis codes (NFR-STTCs) for the serially concatenated system is described carefully in this letter and a QPSK-based NFR-STTC suitable for the system is proposed. As the simulation results show, over the flat block Rayleigh fading channels, a concatenated system with the proposed NFR-STTC inner code can achieve full diversity, and improve the coding... View full abstract»
-
A new reliability measure for telecommunication networks
Publication Year: 2002, Page(s):400 - 402
Cited by: Papers (2)A new reliability measure is introduced. The measure takes into account service degradations once the network is disconnected. A network retailer can use this measure to choose an optimal set of paths such that the desired compromise between cost and reliability is achieved. View full abstract»
-
Measurement-based admission control using maximum burstiness
Publication Year: 2002, Page(s):403 - 405
Cited by: Papers (3)We introduce a new measurement-based admission control using the maximum burstiness (MB) of the aggregate traffic. In the MB algorithm, admission control is performed by testing the schedulability of a new flow request using the target loss probability to get a feasible value of a performance tuning parameter. The MB algorithm obtains robustness by applying the quality-of-service requirements to t... View full abstract»
-
A disjoint path selection scheme with shared risk link groups in GMPLS networks
Publication Year: 2002, Page(s):406 - 408
Cited by: Papers (72) | Patents (2)This letter proposes a disjoint path selection scheme for generalized multi-protocol label switching (GMPLS) networks with shared risk link group (SRLG) constraints. It is called the weighted-SRLG (WSRLG) scheme. It treats the number of SRLG members related to a link as part of the link cost when the k-shortest path algorithm is executed. In WSRLG, a link that has many SRLG members is rarely selec... View full abstract»
-
System performance comparison of optical CDMA and WDMA in a broadcast local area network
Publication Year: 2002, Page(s):409 - 411
Cited by: Papers (30)The performance of optical code-division multiple-access (CDMA) systems with wavelength-hopping/time-spreading codes is compared to that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as... View full abstract»
Aims & Scope
IEEE Communications Letters publishes letters on the frontiers of research within the field of interest of the IEEE Communications Society in a timely manner.
Meet Our Editors
Editor-in-Chief
Octavia Dobre
Memorial University, Canada