Sciweavers

GLOBECOM
2008
IEEE
13 years 10 months ago
Perturbation-Based Distributed Beamforming for Wireless Relay Networks
—This paper deals with distributed beamforming techniques for wireless networks with half-duplex amplify-andforward relays. Existing schemes optimize the beamforming weights base...
Peter Fertl, Ari Hottinen, Gerald Matz
GLOBECOM
2008
IEEE
13 years 10 months ago
Cooperative OFDM Channel Estimation with Frequency Offsets
Abstract— This paper discusses channel estimation in a cooperative orthogonal frequency-division multiplexing (OFDM) network in the presence of frequency offsets. Both the amplif...
Zhongshan Zhang, Wei Zhang, Chintha Tellambura
GLOBECOM
2008
IEEE
13 years 10 months ago
Windowing BitTorrent for Video-on-Demand: Not All is Lost with Tit-for-Tat
—In this paper we present findings from our windowing BitTorrent simulations and show that by carefully optimizing other factors a reasonable level of performance can be achieved...
Petri Savolainen, Niklas Raatikainen, Sasu Tarkoma
GLOBECOM
2008
IEEE
13 years 10 months ago
Precoded Spatial Multiplexing MIMO for Inhome Power Line Communications
Abstract—Inhome Power Line Communications (PLC) enables new and highly convenient networking functions without any additional wires to mains-powered devices. Multiple Input Multi...
Daniel Schneider, Joachim Speidel, Lothar Stadelme...
GLOBECOM
2008
IEEE
13 years 10 months ago
Clock Skew Based Node Identification in Wireless Sensor Networks
Ding-Jie Huang, Wei-Chung Teng, Chih-Yuan Wang, Hs...
GLOBECOM
2008
IEEE
13 years 10 months ago
Signal Detection in Optical Communications through the Atmospheric Turbulence Channel
—The probability of a miss in the detection of a signal in an optical communications system through the turbulent atmosphere using intensity modulation is studied. The turbulence...
Jacob C. Brandenburg, John Q. Liu
GLOBECOM
2008
IEEE
13 years 10 months ago
Cross-Layer Rate Allocation for Multimedia Applications in Pervasive Computing Environment
Abstract— An important issue for supporting multimedia applications in multiple heterogeneous networks, a typical pervasive computing environment, is how to optimize the rate all...
Liang Zhou, Benoit Geller, Anne Wei, Baoyu Zheng, ...
GLOBECOM
2008
IEEE
13 years 10 months ago
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
—Security toolbars are used to protect naive users against phishing attacks by displaying warnings on suspicious sites. Recently, web browsers have added built-in phishing filte...
Saeed Abu-Nimeh, Suku Nair
GLOBECOM
2008
IEEE
13 years 10 months ago
Automatic Large Scale Generation of Internet PoP Level Maps
—Point of presence (PoP) level Internet maps are promising for tasks such as reasoning about the Internet evolution in time or Internet delay estimation. We thus suggest an effi...
Dima Feldman, Yuval Shavitt