Sciweavers

ICC
2008
IEEE
14 years 6 months ago
Unveiling Near-Capacity Code Design: The Realization of Shannon's Communication Theory for MIMO Channels
— In this contribution we show how Shannon’s coding theory could be realized for Multiple-Input Multiple-Output (MIMO) channels with the aid of EXtrinsic Information Transfer (...
Soon Xin Ng, Jin Wang, Lajos Hanzo
ICC
2008
IEEE
128views Communications» more  ICC 2008»
14 years 6 months ago
Experimental Analysis of Super-Seeding in BitTorrent
—With the popularity of BitTorrent, improving its performance has been an active research area. Super-seeding, a special upload policy for initial seeds, improves the efficiency ...
Zhijia Chen, Yang Chen, Chuang Lin, Vaibhav Nivarg...
ICC
2008
IEEE
14 years 6 months ago
Multilink Performance of the Load-Level-Based Admission Control Mechanism for OBS Networks
— In this paper, we analyze the performance of the Load-Level-Based Admission Control mechanism (LLAC) for optical burst-switched networks in a multilink scenario. The goal of th...
Igor M. Moraes, Otto Carlos M. Duarte
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 6 months ago
Low-Complexity Pattern-Eliminating Codes for ISI-Limited Channels
— This paper introduces low-complexity block codes, termed pattern-eliminating codes (PEC), which achieve a potentially large performance improvement over channels with residual ...
Natasa Blitvic, Lizhong Zheng, Vladimir Stojanovic
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 6 months ago
Non-Differential DSTBCs for Partially-Coherent Cooperative Communication
— In a distributed space-time coding scheme, based on the relay channel model, the relay nodes co-operate to linearly process the transmitted signal from the source and forward t...
Jagadeesh Harshan, B. Sundar Rajan
ICC
2008
IEEE
14 years 6 months ago
Sizes of Minimum Connected Dominating Sets of a Class of Wireless Sensor Networks
— We consider an important performance measure of wireless sensor networks, namely, the least number of nodes, N, required to facilitate routing between any pair of nodes, allowi...
Ji Li, Chuan Heng Foh, Lachlan L. H. Andrew, Moshe...
ICC
2008
IEEE
163views Communications» more  ICC 2008»
14 years 6 months ago
A Virtual Password Scheme to Protect Passwords
—People enjoy the convenience of on-line services, but online environments may bring many risks. In this paper, we discuss how to prevent users’ passwords from being stolen by ...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
ICC
2008
IEEE
158views Communications» more  ICC 2008»
14 years 6 months ago
Improving WSN Simulation and Analysis Accuracy Using Two-Tier Channel Models
— Accurate simulation and analysis of wireless protocols and systems is inherently dependent on an accurate model of the underlying channel. In this paper, we show that residual ...
Adnan Iqbal, Syed Ali Khayam
ICC
2008
IEEE
114views Communications» more  ICC 2008»
14 years 6 months ago
Iterative DA/DD Channel Estimation for KSP-OFDM
—In this paper, we propose an iterative joint DA/DD channel estimation algorithm for known symbol padding (KSP) OFDM. The pilot symbols used to estimate the channel are not only ...
Dieter Van Welden, Heidi Steendam, Marc Moeneclaey
ICC
2008
IEEE
126views Communications» more  ICC 2008»
14 years 6 months ago
Backlog Aware Scheduling for Large Buffered Crossbar Switches
—A novel architecture was proposed in [1] to address scalability issues in large, high speed packet switches. The architecture proposed in [1], namely OBIG (output buffers with i...
Aditya Dua, Benjamin Yolken, Nicholas Bambos, Wlad...