Sciweavers

IWCMC
2010
ACM
13 years 10 months ago
Joint network coding and beamforming techniques for downlink channels
We propose a joint optimization of Network Coding and MIMO techniques to improve the downlink channel throughput of a wireless base station. Specifically, we consider a MIMO base...
Monchai Lertsutthiwong, Thinh Nguyen, Bechir Hamda...
IWCMC
2010
ACM
13 years 10 months ago
Packet level scheduling schemes for multi-user MIMO systems with beamforming
We investigate the packet-level scheduling for the downlink of multiple-input multiple-output (MIMO) multi-user systems using beamforming. We consider the traffic arrival process ...
Masoomeh Torabzadeh, Wessam Ajib
IWCMC
2010
ACM
13 years 10 months ago
Secure wireless communication platform for EV-to-Grid research
"Vehicle to Grid" power or V2G will be a new green energy scheme that allows electricity to flow from Electric Vehicles (EVs) to power lines. The objective of this paper...
Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra...
IWCMC
2010
ACM
13 years 10 months ago
Synthetic aperture radar construction of spectrum map for cognitive radio networking
To network cognitive radios that require spectrum sensing to identify transmission opportunities emerges as a critical technology to facilitate spectrum efficient wireless communi...
Tsung-Wei Chiang, Kwang-Cheng Chen
IWCMC
2010
ACM
13 years 10 months ago
Decentralized service composition in pervasive computing environments
In a pervasive computing environment, the devices are embedded in the physical world, providing services and interconnected by a communication network. Composition of these servic...
Joanna Izabela Siebert, Jiannong Cao, Long Cheng, ...
APNOMS
2008
Springer
13 years 10 months ago
A Hop by Hop Rate Control Based QoS Management for Real Time Traffic in Wireless Sensor Networks
Wireless Sensor Network typically assimilates various real time applications that must meet some QoS requirements (e.g. delay, jitter, throughput, packet loss) under severe resourc...
Muhammad Mostafa Monowar, Md. Obaidur Rahman, Byun...
APNOMS
2008
Springer
13 years 10 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
APNOMS
2008
Springer
13 years 10 months ago
Empirical Analysis of Application-Level Traffic Classification Using Supervised Machine Learning
Accurate application traffic classification and identification are important for network monitoring and analysis. The accuracy of traditional Internet application traffic classific...
Byungchul Park, Young J. Won, Mi-Jung Choi, Myung-...
APNOMS
2008
Springer
13 years 10 months ago
A Management Framework for IMS Using Service Managed Objects
In this paper we identify the needs and critical issues of management and monitoring in IP Multimedia Subsystem (IMS). As an IMS provides a layered architecture converging heteroge...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...