Sciweavers

BROADCOM
2008
IEEE
14 years 6 months ago
Low Cost Active Antenna Arrays
Active antenna arrays are very valuable in creating reconfigurable, low-cost, wireless point-to-point networks. These wireless links can be used for a variety of applications from...
Dan Busuioc, Safieddin Safavi-Naeini
AICT
2008
IEEE
186views Communications» more  AICT 2008»
14 years 6 months ago
Towards High Quality VoIP in 3G Networks - An Empirical Study
—Third generation (3G) packet switched WCDMA networks with high-speed downlink packet access (HSPDA) are currently being deployed worldwide to provide wireless broadband connecti...
Andres Arjona, Cédric Westphal, Antti Yl&au...
AICT
2008
IEEE
14 years 6 months ago
Attaching an IMS Subscriber to an Unknown Foreign Network
The networking landscape is about to change. The multitude of different kind of operators and access networks can provide access at any time irrespective of location. However, it ...
Seppo Heikkinen
AICT
2008
IEEE
131views Communications» more  AICT 2008»
14 years 6 months ago
On the Handoff-Call Blocking Probability Calculation in W-CDMA Cellular Networks
In this paper, we investigate the call blocking probability calculations in the uplink of W-CDMA mobile cellular networks. In these networks, we distinguish two types of blocking,...
Vassilios G. Vassilakis, Georgios A. Kallos, Ioann...
AICT
2008
IEEE
14 years 6 months ago
Approximating Low Latency Queueing Buffer Latency
Martin J. Fischer, Denise M. Bevilacqua Masi, John...
AICT
2008
IEEE
114views Communications» more  AICT 2008»
14 years 6 months ago
Blocking Analysis in Hybrid TDM-WDM PONs Supporting Elastic Traffic
— The Passive Optical Network (PON) is an attractive solution for delivering services with numerous applications, such as high-definition video, video conferencing and data traff...
John S. Vardakas, Vassilios G. Vassilakis, Michael...
SIGCOMM
2009
ACM
14 years 6 months ago
Apprehending joule thieves with cinder
Energy is the critical limiting resource to mobile computing devices. Correspondingly, an operating system must track, provision, and ration how applications consume energy. The e...
Stephen M. Rumble, Ryan Stutsman, Philip Levis, Da...
SIGCOMM
2009
ACM
14 years 6 months ago
Epothecary: cost-effective drug pedigree tracking and authentication using mobile phones
Counterfeit and expired pharmaceuticals are a significant problem in the developing world, constituting up to 80% of stock on pharmacy shelves. This is due both to poor existing ...
Michael Paik, Jay Chen, Lakshminarayanan Subramani...
SIGCOMM
2009
ACM
14 years 6 months ago
PhonePoint pen: using mobile phones to write in air
Sandip Agrawal, Ionut Constandache, Shravan Gaonka...