Sciweavers

CIC
2006
124views Communications» more  CIC 2006»
14 years 28 days ago
Comments on the Channel Capacity of Ethernet
Ethernet is the most widely used network and many analytical models were developed to predict its capacity. Usually in these models assumptions like infinite population, no back-of...
Maher Heal
CIC
2006
141views Communications» more  CIC 2006»
14 years 28 days ago
Towards the Integration of Reliability and Traffic Engineering
The main goal of this paper is to make a step towards the development of a unified approach that incorporates both reliability and traffic engineering aspects into a common, unifie...
Andras Farago
CIC
2006
118views Communications» more  CIC 2006»
14 years 28 days ago
Policy Based QoS Support using BGP Routing
Priyadarsi Nanda, Andrew James Simmonds
CIC
2006
124views Communications» more  CIC 2006»
14 years 28 days ago
Chaotic Systems Synchronization in Secure Communication Systems
In this paper, synchronization of two chaotic signals is studied and analyzed. A nonlinear recursive backstepping scheme is utilized to design an appropriate control input signal ...
Ahmad Harb, Wajdi Ahmad
CIC
2006
119views Communications» more  CIC 2006»
14 years 28 days ago
IP Queuing Analysis
Victor A. Clincy, Ajay Sitaram
CIC
2006
184views Communications» more  CIC 2006»
14 years 28 days ago
A Data Replication Scheme based on Primary Copy for Ensuring Data Consistency in Mobile Ad hoc Networks
Abstract - A mobile ad hoc network (MANET) is a multihop wireless network capable of autonomous operations. Since MANET causes frequent network partitions, a data replication is co...
Aekyung Moon, Han Namgoong, Hyoungsun Kim, Hyun Ki...
CIC
2006
101views Communications» more  CIC 2006»
14 years 28 days ago
Non Blocking OVSF Codes Influence The Performance Of WCDMA System
In this paper the performance of OVSF and NOVSF codes in WCDMA are evaluated by calculating their blocking probability and plotting graphs between blocking probability and new call...
Shailendra Mishra, Nipur
CIC
2006
114views Communications» more  CIC 2006»
14 years 28 days ago
Tree Based Conference Key Establishment Cost Analysis and Minimization in Heterogeneous Networks
A shared secret, conference key, must be established among members to securely communicate among them. The Diffie-Hellman is often used for the conference key establishment. In a ...
Zhan Liu, Mi Lu
CIC
2006
103views Communications» more  CIC 2006»
14 years 28 days ago
Performance Analysis of Punctured Turbo Code under An AWGN Channel
Turbo code is a coding technique that enhances a reliable data transmission. Because of special structure of encoder and iterative decoder, it could obtain 1dB at low EbN0 db that...
Ya-Fen Chen, Cheng-Ying Yang