Sciweavers

ICC
2009
IEEE
165views Communications» more  ICC 2009»
14 years 6 months ago
Arbitrarily Tight Upper and Lower Bounds on the Gaussian Q-Function and Related Functions
—We present a new family of tight lower and upper bounds on the Gaussian Q-function Q(x). It is first shown that, for any x, the integrand ϕ(θ; x) of the Craig representation ...
Giuseppe Thadeu Freitas de Abreu
ICC
2009
IEEE
132views Communications» more  ICC 2009»
14 years 6 months ago
Resource Management in Stargate-Based Ethernet Passive Optical Networks (SG-EPONs)
—At present there is a strong worldwide push toward bringing fiber closer to individual homes and businesses. Another evolutionary step is the cost-effective all-optical integra...
Lehan Meng, Chadi Assi, Martin Maier, Ahmad R. Dha...
ICC
2009
IEEE
112views Communications» more  ICC 2009»
14 years 6 months ago
Towards Secure Spectrum Decision
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
Goce Jakimoski, K. P. Subbalakshmi
ICC
2009
IEEE
103views Communications» more  ICC 2009»
14 years 6 months ago
FSA: A Fast Coordination Scheme for Opportunistic Routing
—Opportunistic Routing (OR) has been considered as one promising technique to overcome the unreliability of the wireless medium by collaborating multiple neighboring receivers/ca...
Zhenyu Yang, Kai Zeng, Wenjing Lou
ICC
2009
IEEE
233views Communications» more  ICC 2009»
14 years 6 months ago
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks
— In this paper, we present an analytical model as well as a practical mechanism to detect denial of service (DoS) attacks on secondary users in dynamic spectrum access (DSA) net...
Z. Jin, S. Anand, K. P. Subbalakshmi
ICC
2009
IEEE
110views Communications» more  ICC 2009»
14 years 6 months ago
Delay Constrained Scheduling over Fading Channels: Optimal Policies for Monomial Energy-Cost Functions
— A point-to-point discrete-time scheduling problem of transmitting B information bits within T hard delay deadline slots is considered assuming that the underlying energy-bit co...
Juyul Lee, Nihar Jindal
ICC
2009
IEEE
147views Communications» more  ICC 2009»
14 years 6 months ago
A Distributed Protocol for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, in MANETs, enables users to generate, on-the-fly, complex strong specific systems. Current work ...
Eric Karmouch, Amiya Nayak
ICC
2009
IEEE
14 years 6 months ago
Nash Bargaining over MIMO Interference Systems
—In this paper, the source covariance matrices of multiple-input multiple-output (MIMO) interference channels (IFCs) are investigated from a game-theoretic perspective. It is pro...
Zengmao Chen, Sergiy A. Vorobyov, Cheng-Xiang Wang...
ICC
2009
IEEE
14 years 6 months ago
A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks
—The changes in the communication paradigm envisioned for future networks, with peer-to-peer/symmetric attachments gaining momentum and two IP (Internet Protocol) versions coexis...
Rui Campos, Manuel Ricardo
ICC
2009
IEEE
195views Communications» more  ICC 2009»
14 years 6 months ago
A Cross Layer Fast Handover Scheme in VANET
—This study presents a cross-layer fast handover scheme for VANET, called vehicular fast handover scheme (VFHS), where the physical layer information is shared with the MAC layer...
Kuan-Lin Chiu, Ren-Hung Hwang, Yuh-Shyan Chen