Sciweavers

INTERWORKING
2000
14 years 3 months ago
Design of a Multi-layer Bandwidth Broker Architecture
Internet is widely known for lacking any kind of mechanism for the provisioning of Quality of Service guarantees. The Internet community concentrates its efforts on the Bandwidth ...
George A. Politis, Petros Sampatakos, Iakovos S. V...
INTERWORKING
2000
14 years 3 months ago
A Linux Implementation of a Differentiated Services Router
The Internet Engineering Task Force (IETF) is currently working on the development of Differentiated Services (DiffServ). DiffServ seems to be a promising technology for next-gene...
Torsten Braun, Hans Joachim Einsiedler, Matthias S...
WCNC
2010
IEEE
14 years 3 months ago
Training Sequence-Aided Single-Carrier Block Signal Detection Using QRM-MLD
—Recently, we proposed a frequency-domain block signal detection using maximum likelihood detection (MLD) employing QR decomposition and M-algorithm (QRM-MLD) for the cyclic pref...
Tetsuya Yamamoto, Kazuki Takeda, Fumiyuki Adachi
WCNC
2010
IEEE
14 years 3 months ago
A Novel Stability Weighted Clustering Algorithm for Multi-Hop Packet Radio Virtual Cellular Network
—Cooperative communications exploit the spatial diversity inherent in multiuser system by allowing cooperation among users having a wide range of channel qualities. How to search...
Qiyue Yu, Na Zhang, Weixiao Meng, Fumiyuki Adachi
WCNC
2010
IEEE
14 years 3 months ago
Socially-Aware Publish/Subscribe System for Human Networks
Abstract—The development of modern communication technologies fosters human networks (HUNETs)—an information dissemination platform comprised of human-carried wirelessenabled d...
Yaxiong Zhao, Jie Wu
WCNC
2010
IEEE
14 years 3 months ago
Novel Handoff Decision Algorithm in Hierarchical Macro/Femto-Cell Networks
Abstract—Hierarchical macro/femto-cell networks are considered as a promising technology for the improvement of indoor coverage and network capacity. In these emerging networks, ...
Jung-Min Moon, Dong-Ho Cho
ICDCSW
2000
IEEE
14 years 3 months ago
Secure Information Flow in Mobile Bootstrapping Process
Zhaoyu Liu, M. Dennis Mickunas, Roy H. Campbell
ICDCSW
2000
IEEE
14 years 3 months ago
Compositional Verification of a Third Generation Mobile Communication Protocol
Model-checking has turned out to be an efficient and relatively easy-to-use technique in the verification of formally described programs. However, there is one major drawback in u...
Sari Leppänen, Matti Luukkainen
ICNP
1998
IEEE
14 years 3 months ago
Flow Theory: An Enhancement
Flow Theory is a rich, effective theory introduced in order to study real-time network protocols. It is based on discrete mathematics in which a flow of data is represented by an ...
Alfio Lombardo, Giacomo Morabito, Sergio Palazzo, ...
ICNP
1998
IEEE
14 years 3 months ago
Reasoning About Active Network Protocols
Samrat Bhattacharjee, Kenneth L. Calvert, Ellen W....