Sciweavers

ICC
2009
IEEE
117views Communications» more  ICC 2009»
13 years 9 months ago
NetCluster: A Clustering-Based Framework for Internet Tomography
In this paper, Internet data collected via passive measurement are analyzed to obtain localization information on nodes by clustering (i.e., grouping together) nodes that exhibit s...
Elena Baralis, Andrea Bianco, Tania Cerquitelli, L...
ICC
2009
IEEE
144views Communications» more  ICC 2009»
13 years 9 months ago
Green DSL: Energy-Efficient DSM
Dynamic spectrum management (DSM) has been recognized as a key technology for tackling multi-user crosstalk interference for DSL broadband access. Up to now, DSM design has mainly ...
Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc M...
ICC
2009
IEEE
13 years 9 months ago
Multiple-Ring Based Modeling and Simulation of Wideband Space-Time-Frequency MIMO Channels
In this paper, based on the concept of the Tapped Delay Line (TDL) structure, we first propose a new wideband multiple-ring Multiple Input Multiple Output (MIMO) channel reference ...
Xiang Cheng, Cheng-Xiang Wang, David I. Laurenson
ICC
2009
IEEE
116views Communications» more  ICC 2009»
13 years 9 months ago
Capacity Evaluation of a Land Mobile Satellite System Utilizing Multiple Element Antennas
Land Mobile Satellite (LMS) systems can exploit multiple-input-multiple-output (MIMO) techniques in order to achieve high transmission rates. This paper evaluates theoretically the...
Nektarios Moraitis, Argyris Kyriazos, Philip Const...
ICC
2009
IEEE
127views Communications» more  ICC 2009»
13 years 9 months ago
Starburst SSD: An Efficient Protocol for Selective Dissemination
Abstract--We present Starburst, a routing-based protocol designed to efficiently disseminate data items to small subsets within a sensor network. Starburst constructs a routing hie...
Tahir Azim, Qasim Mansoor, Philip Levis
ICC
2009
IEEE
113views Communications» more  ICC 2009»
13 years 9 months ago
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic
When employing cryptographic tunnels such as the ones provided by Secure Shell (SSH) to protect their privacy on the Internet, users expect two forms of protection. First, they aim...
Maurizio Dusi, Alice Este, Francesco Gringoli, Luc...
ICC
2009
IEEE
151views Communications» more  ICC 2009»
13 years 9 months ago
Mapping Techniques for UWB Positioning
This paper deals with a wireless indoor positioning problem in which the location of a tag is estimated from range measurements taken by fixed beacons. The measurements may be affe...
E. Arias-de-Reyna, Umberto Mengali
ICC
2009
IEEE
13 years 9 months ago
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning
A future where Internet Telephony will constitute a target valuable to attack is not so unrealistic. E-mail spam botnets software can be updated to send voice spam (commonly referr...
Federico Menna, Renato Lo Cigno, Saverio Niccolini...
ICC
2009
IEEE
124views Communications» more  ICC 2009»
13 years 9 months ago
Routing Games for Traffic Engineering
Abstract--Current data network scenario makes Traffic Engineering (TE) a very challenging task. The ever growing access rates and new applications running on end-hosts result in mo...
Federico Larroca, Jean-Louis Rougier
ICC
2009
IEEE
13 years 9 months ago
Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference
In this paper the interference channel is extended by additional relay nodes in order to investigate the influence of interference on the design and performance of relaying protoco...
Peter Rost, Gerhard Fettweis, J. Nicholas Laneman