—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
— Push-to-talk over Cellular (PoC) is considered as one of important applications in Next Generation Networks (NGN). The main objective of this study is to investigate the perfor...
Wei-Peng Chen, Steven Licking, Takashi Ohno, Satos...
—We present a new algorithm for vertical handover and dynamic network selection, based on a combination of multiattribute utility theory, kernel learning and stochastic gradient ...
Eric van den Berg, Praveen Gopalakrishnan, Byungsu...
— This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability to improve robus...
Sangman Moh, Chansu Yu, Seung-Min Park, Heung-Nam ...
— In this paper, we discuss the information–theoretic approach to finding the pattern of transmission powers of the stations in a CDMA system which maximizes the aggregate cap...
Arash Abadpour, Attahiru Sule Alfa, Anthony C. K. ...
— Exact bit error probabilities (BEP) are derived in closed form for pulsed binary direct sequence ultra-wideband (DS-UWB) multiple access systems in flat Nakagami fading channe...
Mohammad Azizur Rahman, Shigenobu Sasaki, Hisakazu...
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Abstract— Nowadays a lot of effort is spent on developing OFDMbased inexpensive wireless transceivers. Direct-conversion radio frequency transceivers are appealing because they a...
Eduardo Lopez-Estraviz, Stefaan De Rore, Fran&cced...
Abstract— The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to e...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...