Sciweavers

ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 4 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 4 months ago
Comparing Different Transmission Strategies Using Turbo Codes for Nonuniform Memoryless Sources
— Nonuniform sources can be found in real world applications as uncompressed speech, text and medical images. In this paper we compare the performance of three different methods ...
Gilberto Titericz Jr., Richard Demo Souza, Javier ...
ICC
2007
IEEE
14 years 4 months ago
Trade-Offs of Spatial Gain for QoS-Guaranteed Services in the MIMO Broadcast Channels
— Although the capacity of multiple-input multiple output (MIMO) broadcast channels (BCs) can be achieved by dirty-paper coding (DPC), it is difficult to apply the results direct...
Seung Hwan Lee, John S. Thompson
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 4 months ago
Adaptive Data Transmission in Downlink MIMO-OFDM Systems with Pre-Equalization
Abstract— An optimization algorithm for finding user allocation, bit and power loading in the downlink of MIMO-OFDM systems is proposed. The algorithm represents a generalizatio...
Peter Trifonov, Elena Costa
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 4 months ago
Bit Error Performance of Orthogonal Space-Time Block Codes over Time-Selective Channel
— Most of the existing works on space-time block codes (STBC) assume the channels are quasi-static, i.e., they remain invariant within one block. This assumption is not always tr...
Jun He, Pooi Yuen Kam
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 4 months ago
Availability-Constrained Shared Backup Path Protection (SBPP) for GMPLS-Based Spare Capacity Reprovisioning
– Shared-backup path protection (SBPP) has been widely studied in the GMPLS networks due to its efficient spare capacity sharing and flexibility in service provisioning. This pap...
Qi Guo, Pin-Han Ho, Anwar Haque, Hussein T. Moufta...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
14 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
ICC
2007
IEEE
118views Communications» more  ICC 2007»
14 years 4 months ago
Service Roaming over Mobile Networks: A Reality Check
—Today, international mobile roaming (IMR) is experiencing changes both in terms of technology and business models. Traditionally, voice and SMS have been the only services offer...
K. R. Renjish Kumar