—This paper aims to address the problem of inter-cell interference fluctuation, which is inherent on the uplink direction of future cellular systems employing OFDMA or single car...
Abstract— Adding SDMA capabilities to modern wireless communication systems like IEEE 802.16 WiMAX promises high system capacity gains but raises the problem of combining orthogo...
Christian Hoymann, Jan Ellenbeck, Ralf Pabst, Marc...
—In this paper, a new sorting initial codebook algorithm for learning vector quantization (LVQ) based upon selforganizing feature maps (SOM) has been proposed. The basic idea is ...
Abstract— We propose a power and constellation-size adaptation scheme for the multicast system employing multilevel quadrature amplitude modulation (MQAM) with discrete constella...
This paper presents a new decoding method inspired by Mitzenmacher’s idea of adding a different pseudo-random number to each packet, in a packet-symbol (n, k) code, for verificat...
— Application of Discrete Multi-tone (DMT) signaling to high-speed backplane interconnects requires major modifications to the well-known analysis methods applied to wireline com...
Amir Amirkhany, Ali-Azam Abbasfar, Vladimir Stojan...
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. With increase in number and size of VPNs, providers nee...
—Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energ...
Ming Liu, Yuan Zheng, Jiannong Cao, Guihai Chen, L...
— In this paper, we study the link layer scheduling problem in wireless ad hoc networks. In such a network, the communication links compete for the scarce and time-varying wirele...
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...