IEEE

Displaying 1-35 of 35 results

  • White Papers // Apr 2013

    Self-Adaptive and Sensitivity-Aware QoS Modeling for the Cloud

    Given the elasticity, dynamicity and on-demand nature of the cloud, cloud-based applications require dynamic models for Quality of Service (QoS), especially when the sensitivity of QoS tends to fluctuate at runtime. These models can be autonomically used by the cloud-based application to correctly self-adapt its QoS provision. The authors present...

    Provided By IEEE

  • White Papers // Nov 2012

    Increasing Lifetime and Reducing Energy Consumption of a Wireless Sensor Network Using a New Approach CTT (cooperative Threshold Transition)

    Wireless Sensor networks are dense wireless networks of small sensors, which collect and disseminate environmental data. The collected data or information is processed, interpreted and accordingly actions are performed. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. One of the major issues...

    Provided By IEEE

  • White Papers // Nov 2012

    Enhancing Performance of a Wireless Sensor Network by Applying an Energy Contributive Approach

    Wireless Sensor networks are dense wireless networks of small sensors, which collect and disseminate environmental data. Wireless sensors, and the arrangement of these small, electronic devices into radio networks, have introduced the capability of remotely monitoring a physical environment for a wide variety of parameters. There are many issues in...

    Provided By IEEE

  • White Papers // Nov 2012

    Survey on User Behavior Trust Evaluation in Cloud Computing

    Cloud computing may be defined as management and provision of resources, software, applications and information as services over the cloud (Internet) on demand. Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released...

    Provided By IEEE

  • White Papers // Nov 2012

    Maximizing Security and Advancing Performance of a Wireless Mesh Network by Implementing a New Approach "Reference Broadcast System"

    A wireless mesh network can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area Wireless mesh networks often consist of mesh clients, mesh...

    Provided By IEEE

  • White Papers // Oct 2012

    Issues, Research and Implementation of Cloud Computing

    Cloud computing - a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on demand services and...

    Provided By IEEE

  • White Papers // Sep 2012

    A Modified Remote User Authentication Scheme Using Smart Cards

    In this paper, the authors have shown that the Hwang-Li scheme is vulnerable to the different masquerade attack from. An evil user can masquerades as another legal user to login a remote server via derive a legal user's password. For the above attacks, they shall present an enhanced scheme to...

    Provided By IEEE

  • White Papers // Jul 2012

    Selective On-Demand Protocol for Finding Reliable Nodes to form Stable Paths in Ad hoc Networks

    A wireless ad hoc network consists of a group of wireless nodes which can dynamically self-organize themselves into a temporary topology to form a network without using any existing infrastructure. Generally ad hoc networks are formed only when there is need and maintained for one time purpose. Node mobility is...

    Provided By IEEE

  • White Papers // Jun 2011

    Volatility Of Power Grids Under Real-time Pricing

    The paper proposes a framework for modeling and analysis of the dynamics of supply, demand, and clearing prices in power system with real-time retail pricing and information asymmetry. Real-time retail pricing is characterized by passing on the real-time wholesale electricity prices to the end consumers, and is shown to create...

    Provided By IEEE

  • White Papers // Jun 2010

    Location Privacy Against Traffic Analysis Attacks in Wireless Sensor Networks

    Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis...

    Provided By IEEE

  • White Papers // Apr 2010

    Bit Error Rate Analysis in IEEE 802.15.3a UWB Channels

    In this paper, the authors present a computable Bit Error Rate (BER) expression for the binary signals in the IEEE 802.15.3a Ultra-WideBand (UWB) channel. In the literature, the impacts of the RAKE receiver's finger numbers and lognormal shadowing on the BER performance have not been reported yet. They propose a...

    Provided By IEEE

  • White Papers // Mar 2010

    Demonstration of Channel Assignment in a Wireless Metropolitan MESH Network

    The authors demonstrate the channel assignment in a metropolitan wireless multi-radio mesh network with directional antennas. A channel assignment approach is presented using suitable algorithms with key components the interference model, the link ordering and the channel selection metric. They have implemented and evaluated the proposed channel assignment in an...

    Provided By IEEE

  • White Papers // Mar 2010

    Demonstration of Automatic Address and Radio Parameters Assignment in MANET Using DHCP Protocol Extensions

    The authors propose procedures for autoconfiguration of multi-hop wireless ad-hoc networks based on DHCP protocol. The proposed mechanism provides automatic address and radio parameters set-up for nodes with multiple radio interfaces, allowing to fully automatically form and to start a wireless mesh network and to route packets. The autoconfiguration schema...

    Provided By IEEE

  • White Papers // Mar 2010

    Performance Analysis of Scheduling in Multiuser MIMO Systems With Zero-Forcing Receivers

    Despite its low-complexity, the zero-forcing receiver is known to suffer from noise enhancement to restore the spatially multiplexed data in a single-user MIMO system. Nevertheless, in the multiuser system, the poor-channel avoidance property of the scheduling technique provides a natural way to overcome the drawback of noise enhancement. In this...

    Provided By IEEE

  • White Papers // Mar 2010

    Statistical Analysis of a Mobile-to-Mobile Rician Fading Channel Model

    Mobile-to-mobile communication is an important application for intelligent transport systems and mobile ad hoc networks. In these systems, both the transmitter and receiver are in motion, subjecting the signals to Rician fading and different scattering effects. In this paper, the authors present a double-ring with a Line-Of-Sight (LOS) component scattering...

    Provided By IEEE

  • White Papers // Mar 2010

    A Cellular Neural Network and Utility-Based Radio Resource Scheduler for Multimedia CDMA Communication Systems

    The paper proposes a Cellular Neural Network and Utility (CNNU)-based radio resource scheduler for multimedia CDMA communication systems supporting differentiated Quality-of-Service (QoS). Here, the authors define a relevant utility function for each connection, which is its radio resource function weighted by a QoS requirement deviation function and a fairness compensation...

    Provided By IEEE

  • White Papers // Feb 2010

    A Rule-Based Web Service Composition Approach

    Web services are rapidly changing the landscape of software engineering. One of the most important technologies introduced by them is Web Service Composition (WSC). This paper proposes a rule-based service composition framework that supports user requirements and predefined business rules very well. The selection engine uses a multi objective Non-dominated...

    Provided By IEEE

  • White Papers // Feb 2010

    A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network

    Instant Wireless Sensor Network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and transmitting sensory data, e.g., volcanic eruption monitoring or nuclear leakage detection. In this paper, having a cluster-based WSN, the authors present a...

    Provided By IEEE

  • White Papers // Feb 2010

    Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks

    Denial of Service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of Wireless Sensor Networks (WSNs). In this paper, the authors propose a solution using one-way hash function to generate dynamic keys...

    Provided By IEEE

  • White Papers // Jan 2010

    Proxying: The Next Step In Reducing IT Energy Use

    At the core of Green IT is reducing the energy use of the electronic devices that help to acquire, store, process, and display information. The energy use of PCs, set-top boxes, and even most servers is mostly driven by their operating patterns and low utilization. This results in annual energy...

    Provided By IEEE

  • White Papers // Jan 2010

    Transmit Diversity Vs. Spatial Multiplexing in Modern MIMO Systems

    A contemporary perspective on transmit antenna diversity and spatial multiplexing is provided. It is argued that, in the context of most modern wireless systems and for the operating points of interest, transmission techniques that utilize all available spatial degrees of freedom for multiplexing outperform techniques that explicitly sacrifice spatial multiplexing...

    Provided By IEEE

  • White Papers // Nov 2009

    Technical and Cultural Impacts on Development of the Telecommunication Services the Case of Mobile Payment Market

    Mobile phones develop increasingly as a significant channel for fundamental banking services in the countries with a low level of material well being (developing countries). Mobile Payment with mobile phones indicates the partial convergence of banking and telecommunication. There are important differences in usage as well as in the acceptance...

    Provided By IEEE

  • White Papers // Aug 2009

    Opportunistic Scanning: Interruption-Free Network Topology Discovery for Wireless Mesh Networks

    This paper presents the concept and preliminary performance evaluation of a stochastic network discovery approach named opportunistic scanning. Therein, a station only pauses its communication for an extremely short time interval to scan for other technologies/systems. The selected scanning duration is short enough not to be noticeable by higher layer...

    Provided By IEEE

  • White Papers // Jun 2009

    A Framework for Interference Mitigation in Multi-BSS 802.11 Wireless LANs

    This paper proposes a framework for interference mitigation in multi-BSS infrastructure 802.11 WLANs. The authors' interference mitigation approach is based on Access Point (AP) Coordination. With this approach, interfering BSSs negotiate and switch from the 802.11 CSMA/CA to a time slotted mechanism if users' QoS is observed to be degraded,...

    Provided By IEEE

  • White Papers // Jun 2009

    Selecting Vertical Handover Candidates in IEEE 802.11 Mesh Networks

    The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded by multiple heterogeneous access technologies such as UMTS and WiMax. These technologies differ greatly regarding medium access scheme, network capacity, QoS support,...

    Provided By IEEE

  • White Papers // Apr 2009

    Autoconfiguration Procedures for Multiradio Wireless Mesh Networks Based on DHCP Protocol

    The authors propose procedures for autoconfiguration of wireless mesh networks based on DHCP protocol. The proposed mechanism provides automatic address and radio parameters set-up for nodes with multiple radio interfaces, allowing them to fully automatically form and to start a wireless mesh network, and to route packets. It supports mesh...

    Provided By IEEE

  • White Papers // Apr 2009

    A Queuing Modeling Approach for Load-Aware Route Selection in Heterogeneous Mesh Networks

    Wireless mesh networks are primarily used to provide Internet access by sharing the Internet connections of a limited number of gateways. If traffic is routed in the mesh without considering load distribution, unevenly network congestion may arise and some gateways may rapidly get overloaded, which causes a significant reduction of...

    Provided By IEEE

  • White Papers // Dec 2008

    Experiences From Cyberinfrastructure Development for Multi-User Remote Instrumentation

    Computer-controlled scientific instruments such as electron microscopes, spectrometers, and telescopes are expensive to purchase and maintain. Also, they generate large amounts of raw and processed data that has to be annotated and archived. Cyber-enabling these instruments and their data sets using remote instrumentation cyber-infrastructures can improve user convenience and significantly...

    Provided By IEEE

  • White Papers // Oct 2008

    Reduced-Rank Adaptive Filtering Using Localized Processing for CDMA Systems

    An integrated beamforming (spatial processing) and multiuser-detection (temporal processing) scheme is an effective approach to increase system capacity but is also impractical due to the high associated computational costs. To overcome this problem, researchers have developed reduced-rank approaches. Adding to this class of algorithms, this paper introduces a joint-domain adaptive...

    Provided By IEEE

  • White Papers // Oct 2008

    Improved Sum-Rate Optimization in the Multiuser MIMO Downlink

    The authors consider linear precoding and decoding in the downlink of a multiuser Multiple-Input, Multiple-Output (MIMO) system. In this scenario, the transmitter and the receivers may each be equipped with multiple antennas, and each user may receive more than one data stream. They examine the relationship between the sum capacity...

    Provided By IEEE

  • White Papers // Oct 2008

    User Assignment for MIMO-OFDM Systems With Multiuser Linear Precoding

    Recent work has developed single-carrier linear precoding for the multiuser downlink for Multiple-Input Multiple-Output (MIMO) systems. This paper addresses the problem of user selection in Orthogonal Frequency Division Multiplexing (OFDM) based MIMO systems using such multiuser precoding. The authors propose an effective scheme to assign multiple users, chosen from a...

    Provided By IEEE

  • White Papers // Oct 2008

    Using the Bhattacharyya Parameter for Design and Analysis of Cooperative Wireless Systems

    A simplified method of analysis and design based on the Bhattacharyya Parameter (BP) in conjunction with the union bound and weight enumeration is presented for relay channels using coded cooperation. This method is particularly suitable for low-complexity relay systems employing demodulate-and-forward, focusing on the problems of relay selection and outage...

    Provided By IEEE

  • White Papers // Sep 2008

    Modeling of Multi-Resolution Active Network Measurement Time-Series

    Active measurements on network paths provide end-to-end network health status in terms of metrics such as bandwidth, delay, jitter and loss. Hence, they are increasingly being used for various network control and management functions on the Internet. For purposes of network health anomaly detection and forecasting involved in these functions,...

    Provided By IEEE

  • White Papers // Sep 2008

    Collaborative Setting of RTS/CTS in Multi-Rate Multi-BSS IEEE 802.11 Wireless LANs

    Despite the fact that the Request-To-Send/Clear-To-Send (RTS/CTS) protocol significantly reduces collisions and retransmissions due to the hidden node problem, it is well known that it adds considerable overhead specially with small payload packets. The IEEE 802.11 standard defined a manageable parameter, RTS threshold, above which a data packet should be...

    Provided By IEEE

  • White Papers // May 2008

    Towards Secure Mobile Payment Based on SIP

    Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile payment solutions rely heavily on underlying communication infrastructures, which are platform-dependent and have no unified implementation criteria. This limitation is reducing, however, through the rapid spread...

    Provided By IEEE

  • White Papers // Nov 2012

    Survey on User Behavior Trust Evaluation in Cloud Computing

    Cloud computing may be defined as management and provision of resources, software, applications and information as services over the cloud (Internet) on demand. Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released...

    Provided By IEEE

  • White Papers // Nov 2012

    Increasing Lifetime and Reducing Energy Consumption of a Wireless Sensor Network Using a New Approach CTT (cooperative Threshold Transition)

    Wireless Sensor networks are dense wireless networks of small sensors, which collect and disseminate environmental data. The collected data or information is processed, interpreted and accordingly actions are performed. Wireless sensor networks facilitate monitoring and controlling of physical environments from remote locations with better accuracy. One of the major issues...

    Provided By IEEE

  • White Papers // Nov 2012

    Enhancing Performance of a Wireless Sensor Network by Applying an Energy Contributive Approach

    Wireless Sensor networks are dense wireless networks of small sensors, which collect and disseminate environmental data. Wireless sensors, and the arrangement of these small, electronic devices into radio networks, have introduced the capability of remotely monitoring a physical environment for a wide variety of parameters. There are many issues in...

    Provided By IEEE

  • White Papers // Nov 2012

    Maximizing Security and Advancing Performance of a Wireless Mesh Network by Implementing a New Approach "Reference Broadcast System"

    A wireless mesh network can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area Wireless mesh networks often consist of mesh clients, mesh...

    Provided By IEEE

  • White Papers // Oct 2012

    Issues, Research and Implementation of Cloud Computing

    Cloud computing - a relatively recent term, builds on decades of research in virtualization, distributed computing, utility computing, and more recently networking, web and software services. It implies a service oriented architecture, reduced information technology overhead for the end-user, great flexibility, reduced total cost of ownership, on demand services and...

    Provided By IEEE

  • White Papers // Jul 2012

    Selective On-Demand Protocol for Finding Reliable Nodes to form Stable Paths in Ad hoc Networks

    A wireless ad hoc network consists of a group of wireless nodes which can dynamically self-organize themselves into a temporary topology to form a network without using any existing infrastructure. Generally ad hoc networks are formed only when there is need and maintained for one time purpose. Node mobility is...

    Provided By IEEE

  • White Papers // Apr 2013

    Self-Adaptive and Sensitivity-Aware QoS Modeling for the Cloud

    Given the elasticity, dynamicity and on-demand nature of the cloud, cloud-based applications require dynamic models for Quality of Service (QoS), especially when the sensitivity of QoS tends to fluctuate at runtime. These models can be autonomically used by the cloud-based application to correctly self-adapt its QoS provision. The authors present...

    Provided By IEEE

  • White Papers // Feb 2010

    A Rule-Based Web Service Composition Approach

    Web services are rapidly changing the landscape of software engineering. One of the most important technologies introduced by them is Web Service Composition (WSC). This paper proposes a rule-based service composition framework that supports user requirements and predefined business rules very well. The selection engine uses a multi objective Non-dominated...

    Provided By IEEE

  • White Papers // Sep 2012

    A Modified Remote User Authentication Scheme Using Smart Cards

    In this paper, the authors have shown that the Hwang-Li scheme is vulnerable to the different masquerade attack from. An evil user can masquerades as another legal user to login a remote server via derive a legal user's password. For the above attacks, they shall present an enhanced scheme to...

    Provided By IEEE

  • White Papers // Nov 2009

    Technical and Cultural Impacts on Development of the Telecommunication Services the Case of Mobile Payment Market

    Mobile phones develop increasingly as a significant channel for fundamental banking services in the countries with a low level of material well being (developing countries). Mobile Payment with mobile phones indicates the partial convergence of banking and telecommunication. There are important differences in usage as well as in the acceptance...

    Provided By IEEE

  • White Papers // May 2008

    Towards Secure Mobile Payment Based on SIP

    Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile payment solutions rely heavily on underlying communication infrastructures, which are platform-dependent and have no unified implementation criteria. This limitation is reducing, however, through the rapid spread...

    Provided By IEEE

  • White Papers // Jan 2010

    Proxying: The Next Step In Reducing IT Energy Use

    At the core of Green IT is reducing the energy use of the electronic devices that help to acquire, store, process, and display information. The energy use of PCs, set-top boxes, and even most servers is mostly driven by their operating patterns and low utilization. This results in annual energy...

    Provided By IEEE

  • White Papers // Sep 2008

    Modeling of Multi-Resolution Active Network Measurement Time-Series

    Active measurements on network paths provide end-to-end network health status in terms of metrics such as bandwidth, delay, jitter and loss. Hence, they are increasingly being used for various network control and management functions on the Internet. For purposes of network health anomaly detection and forecasting involved in these functions,...

    Provided By IEEE

  • White Papers // Dec 2008

    Experiences From Cyberinfrastructure Development for Multi-User Remote Instrumentation

    Computer-controlled scientific instruments such as electron microscopes, spectrometers, and telescopes are expensive to purchase and maintain. Also, they generate large amounts of raw and processed data that has to be annotated and archived. Cyber-enabling these instruments and their data sets using remote instrumentation cyber-infrastructures can improve user convenience and significantly...

    Provided By IEEE

  • White Papers // Jun 2011

    Volatility Of Power Grids Under Real-time Pricing

    The paper proposes a framework for modeling and analysis of the dynamics of supply, demand, and clearing prices in power system with real-time retail pricing and information asymmetry. Real-time retail pricing is characterized by passing on the real-time wholesale electricity prices to the end consumers, and is shown to create...

    Provided By IEEE

  • White Papers // Apr 2009

    Autoconfiguration Procedures for Multiradio Wireless Mesh Networks Based on DHCP Protocol

    The authors propose procedures for autoconfiguration of wireless mesh networks based on DHCP protocol. The proposed mechanism provides automatic address and radio parameters set-up for nodes with multiple radio interfaces, allowing them to fully automatically form and to start a wireless mesh network, and to route packets. It supports mesh...

    Provided By IEEE

  • White Papers // Apr 2009

    A Queuing Modeling Approach for Load-Aware Route Selection in Heterogeneous Mesh Networks

    Wireless mesh networks are primarily used to provide Internet access by sharing the Internet connections of a limited number of gateways. If traffic is routed in the mesh without considering load distribution, unevenly network congestion may arise and some gateways may rapidly get overloaded, which causes a significant reduction of...

    Provided By IEEE

  • White Papers // Jun 2009

    A Framework for Interference Mitigation in Multi-BSS 802.11 Wireless LANs

    This paper proposes a framework for interference mitigation in multi-BSS infrastructure 802.11 WLANs. The authors' interference mitigation approach is based on Access Point (AP) Coordination. With this approach, interfering BSSs negotiate and switch from the 802.11 CSMA/CA to a time slotted mechanism if users' QoS is observed to be degraded,...

    Provided By IEEE

  • White Papers // Aug 2009

    Opportunistic Scanning: Interruption-Free Network Topology Discovery for Wireless Mesh Networks

    This paper presents the concept and preliminary performance evaluation of a stochastic network discovery approach named opportunistic scanning. Therein, a station only pauses its communication for an extremely short time interval to scan for other technologies/systems. The selected scanning duration is short enough not to be noticeable by higher layer...

    Provided By IEEE

  • White Papers // Jun 2009

    Selecting Vertical Handover Candidates in IEEE 802.11 Mesh Networks

    The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded by multiple heterogeneous access technologies such as UMTS and WiMax. These technologies differ greatly regarding medium access scheme, network capacity, QoS support,...

    Provided By IEEE

  • White Papers // Oct 2008

    Reduced-Rank Adaptive Filtering Using Localized Processing for CDMA Systems

    An integrated beamforming (spatial processing) and multiuser-detection (temporal processing) scheme is an effective approach to increase system capacity but is also impractical due to the high associated computational costs. To overcome this problem, researchers have developed reduced-rank approaches. Adding to this class of algorithms, this paper introduces a joint-domain adaptive...

    Provided By IEEE

  • White Papers // Mar 2010

    Performance Analysis of Scheduling in Multiuser MIMO Systems With Zero-Forcing Receivers

    Despite its low-complexity, the zero-forcing receiver is known to suffer from noise enhancement to restore the spatially multiplexed data in a single-user MIMO system. Nevertheless, in the multiuser system, the poor-channel avoidance property of the scheduling technique provides a natural way to overcome the drawback of noise enhancement. In this...

    Provided By IEEE

  • White Papers // Mar 2010

    Statistical Analysis of a Mobile-to-Mobile Rician Fading Channel Model

    Mobile-to-mobile communication is an important application for intelligent transport systems and mobile ad hoc networks. In these systems, both the transmitter and receiver are in motion, subjecting the signals to Rician fading and different scattering effects. In this paper, the authors present a double-ring with a Line-Of-Sight (LOS) component scattering...

    Provided By IEEE

  • White Papers // Mar 2010

    A Cellular Neural Network and Utility-Based Radio Resource Scheduler for Multimedia CDMA Communication Systems

    The paper proposes a Cellular Neural Network and Utility (CNNU)-based radio resource scheduler for multimedia CDMA communication systems supporting differentiated Quality-of-Service (QoS). Here, the authors define a relevant utility function for each connection, which is its radio resource function weighted by a QoS requirement deviation function and a fairness compensation...

    Provided By IEEE

  • White Papers // Apr 2010

    Bit Error Rate Analysis in IEEE 802.15.3a UWB Channels

    In this paper, the authors present a computable Bit Error Rate (BER) expression for the binary signals in the IEEE 802.15.3a Ultra-WideBand (UWB) channel. In the literature, the impacts of the RAKE receiver's finger numbers and lognormal shadowing on the BER performance have not been reported yet. They propose a...

    Provided By IEEE

  • White Papers // Sep 2008

    Collaborative Setting of RTS/CTS in Multi-Rate Multi-BSS IEEE 802.11 Wireless LANs

    Despite the fact that the Request-To-Send/Clear-To-Send (RTS/CTS) protocol significantly reduces collisions and retransmissions due to the hidden node problem, it is well known that it adds considerable overhead specially with small payload packets. The IEEE 802.11 standard defined a manageable parameter, RTS threshold, above which a data packet should be...

    Provided By IEEE

  • White Papers // Mar 2010

    Demonstration of Channel Assignment in a Wireless Metropolitan MESH Network

    The authors demonstrate the channel assignment in a metropolitan wireless multi-radio mesh network with directional antennas. A channel assignment approach is presented using suitable algorithms with key components the interference model, the link ordering and the channel selection metric. They have implemented and evaluated the proposed channel assignment in an...

    Provided By IEEE

  • White Papers // Mar 2010

    Demonstration of Automatic Address and Radio Parameters Assignment in MANET Using DHCP Protocol Extensions

    The authors propose procedures for autoconfiguration of multi-hop wireless ad-hoc networks based on DHCP protocol. The proposed mechanism provides automatic address and radio parameters set-up for nodes with multiple radio interfaces, allowing to fully automatically form and to start a wireless mesh network and to route packets. The autoconfiguration schema...

    Provided By IEEE

  • White Papers // Jan 2010

    Transmit Diversity Vs. Spatial Multiplexing in Modern MIMO Systems

    A contemporary perspective on transmit antenna diversity and spatial multiplexing is provided. It is argued that, in the context of most modern wireless systems and for the operating points of interest, transmission techniques that utilize all available spatial degrees of freedom for multiplexing outperform techniques that explicitly sacrifice spatial multiplexing...

    Provided By IEEE

  • White Papers // Feb 2010

    A Compensation-Based Reliable Data Delivery for Instant Wireless Sensor Network

    Instant Wireless Sensor Network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and transmitting sensory data, e.g., volcanic eruption monitoring or nuclear leakage detection. In this paper, having a cluster-based WSN, the authors present a...

    Provided By IEEE

  • White Papers // Feb 2010

    Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks

    Denial of Service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of Wireless Sensor Networks (WSNs). In this paper, the authors propose a solution using one-way hash function to generate dynamic keys...

    Provided By IEEE

  • White Papers // Jun 2010

    Location Privacy Against Traffic Analysis Attacks in Wireless Sensor Networks

    Traffic analysis attacks are passive attacks that try to deduce the traffic pattern based on the eavesdropped information. Through analyzing the packet traffic, it can deduce the location of strategic nodes, and then launch an active attack to those locations, such as DoS attack. Therefore, defending against a traffic analysis...

    Provided By IEEE

  • White Papers // Oct 2008

    Improved Sum-Rate Optimization in the Multiuser MIMO Downlink

    The authors consider linear precoding and decoding in the downlink of a multiuser Multiple-Input, Multiple-Output (MIMO) system. In this scenario, the transmitter and the receivers may each be equipped with multiple antennas, and each user may receive more than one data stream. They examine the relationship between the sum capacity...

    Provided By IEEE

  • White Papers // Oct 2008

    Using the Bhattacharyya Parameter for Design and Analysis of Cooperative Wireless Systems

    A simplified method of analysis and design based on the Bhattacharyya Parameter (BP) in conjunction with the union bound and weight enumeration is presented for relay channels using coded cooperation. This method is particularly suitable for low-complexity relay systems employing demodulate-and-forward, focusing on the problems of relay selection and outage...

    Provided By IEEE

  • White Papers // Oct 2008

    User Assignment for MIMO-OFDM Systems With Multiuser Linear Precoding

    Recent work has developed single-carrier linear precoding for the multiuser downlink for Multiple-Input Multiple-Output (MIMO) systems. This paper addresses the problem of user selection in Orthogonal Frequency Division Multiplexing (OFDM) based MIMO systems using such multiuser precoding. The authors propose an effective scheme to assign multiple users, chosen from a...

    Provided By IEEE