Sciweavers

ICC
2009
IEEE
162views Communications» more  ICC 2009»
14 years 6 months ago
Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks
Abstract—Impulse Radio Ultra-wideband (IR-UWB) communication has proven an important technique for supporting highrate, short-range, low-power communication. These are necessary ...
Tianqi Wang, Wendi B. Heinzelman, Alireza Seyedi
ICC
2009
IEEE
149views Communications» more  ICC 2009»
14 years 6 months ago
Performance of Host Identity Protocol on Symbian OS
—The Host Identity Protocol (HIP) has been specified by the IETF as a new solution for secure host mobility and multihoming in the Internet. HIP uses self-certifying publicpriva...
Andrey Khurri, Dmitriy Kuptsov, Andrei Gurtov
ICC
2009
IEEE
123views Communications» more  ICC 2009»
14 years 6 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
14 years 6 months ago
Idle Channel Time Estimation in Multi-Hop Wireless Networks
—This paper presents a theoretical estimation for idle channel time in a multi-hop environment. Idle channel time is the time proportion of a node during which the channel state ...
Simon Odou, Steven Martin, Khaldoun Al Agha
ICC
2009
IEEE
14 years 6 months ago
Separable Implementation of L2-Orthogonal STC CPM with Fast Decoding
In this paper we present an alternative separable implementation of L2 -orthogonal space-time codes (STC) for continuous phase modulation (CPM). In this approach, we split the STC...
Matthias Hesse, Jérôme Lebrun, Lutz H...
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 6 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
ICC
2009
IEEE
142views Communications» more  ICC 2009»
14 years 6 months ago
Revealing Social Networks of Spammers Through Spectral Clustering
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 6 months ago
Rate Distortion Optimization for Mesh-Based P2P Video Streaming
—This paper addresses the problem of optimal rate allocation for video streaming in a multi-path peer-to-peer mesh network. We present a distributed rate allocation algorithm tha...
Tareq Hossain, Yi Cui, Yuan Xue
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 6 months ago
Degrees of Freedom of Cooperative MIMO in Cellular Networks
— In cellular networks, relays and/or mobiles can cooperate to improve the overall system performance. For example, once the transmission from a base station with multiple antenn...
Si-Hyeon Lee, Sae-Young Chung
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 6 months ago
Restless Watchdog: Monitoring Multiple Bands with Blind Period in Cognitive Radio Systems
— Spectrum sensing, which monitors the spectrum activity, is studied for cognitive radio systems using multiple frequency bands with non-negligible band switching time (blind per...
Husheng Li