Shanghai Jiao Tong University

Displaying 1-40 of 67 results

  • White Papers // Apr 2012

    PHED: Pre-Handshaking Neighbor Discovery Protocols in Full Duplex Wireless Ad Hoc Networks

    Neighbor Discovery (ND) is a basic and crucial step for initializing wireless ad hoc networks. A fast, precise, and energy-efficient ND protocol has significant importance to subsequent operations in wireless networks. However, many existing protocols have high probabilities to generate idle slots in their neighbor discovering processes, which extends the...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2012

    Generic Construction of Certificate Based Encryption From Certificateless Encryption Revisited

    CertificateLess public key Encryption (CLE) and Certificate Based Encryption (CBE) are two novel public key cryptographic primitives requiring no authenticity verification of the recipient's public key. Both of them are motivated to simultaneously solve the heavy certificate management problem inherent in the traditional Public Key Encryption (PKE) and the key...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2012

    Provably Secure Generic Construction of Certificate Based Signature From Certificateless Signature in Standard Model

    Similar to certificateless cryptography, certificate-based cryptography is another novel public key setting which combines the merits of traditional Public Key Cryptography (PKC) and Identity-Based Cryptography (IBC). Both certificateless cryptography and certificate based cryptography do not have the key escrow problem in identity-based cryptography, and greatly reduce the overhead of certificate...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2012

    Efficient Identity-Based Threshold Decryption Scheme From Bilinear Pairings

    Taking advantage of a technique that allows to safely distribute a private key among decryption servers the authors introduce a new identity-based threshold scheme, proven secure in the random oracle model. This new paring-based scheme features a lot of improvements compared to other schemes that can be found in this...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2012

    Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks

    The authors study the fundamental lower bound for node buffer size in intermittently connected wireless networks. The intermittent connectivity is caused by the possibility of node inactivity due to some external constraints. They find even with infinite channel capacity and node processing speed, buffer occupation in each node does not...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2012

    Security and Privacy of Collaborative Spectrum Sensing in Cognitive Radio Networks

    Collaborative spectrum sensing is regarded as a promising approach to significantly improve the performance of spectrum sensing in Cognitive Radio Networks (CRNs). However, due to the open nature of wireless communications and the increasingly available software-defined radio platforms, collaborative spectrum sensing also poses many new research challenges, especially in the...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2012

    Impact of Secrecy on Capacity in Large-Scale Wireless Networks

    Since, wireless channel is vulnerable to eavesdroppers, the secrecy during message delivery is a major concern in many applications such as commercial, governmental and military networks. This paper investigates information-theoretic secrecy in large-scale networks and studies how capacity is affected by the secrecy constraint where the locations and Channel State...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2012

    On the Topology of Wireless Sensor Networks

    In this paper, the authors investigate the throughput capacity of heterogeneous WSNs with different network topologies and analyze the impact of topologies on network properties. They find that compared to sub-networks of the same scale, combined networks have a larger overall throughput capacity. They also find that uniformly distributed sensor...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2012

    Scaling Laws for Cognitive Radio Network With Heterogeneous Mobile Secondary Users

    In this paper, the authors study the impact of mobility heterogeneity on the capacity and delay scaling laws in cognitive radio network. They propose the heterogeneous speed-restricted mobility model for SUs, and put forward the corresponding routing and scheduling scheme which exploits the heterogeneity of SUs. In particular, they show...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2012

    Energy and Latency Analysis for In-Network Computation With Compressive Sensing in Wireless Sensor Networks

    In this paper, the authors study data gathering with compressive sensing from the perspective of in-network computation in random networks, in which n nodes are uniformly and independently deployed in a unit square area. They formulate the problem of data gathering to compute multiround random linear function. They study the...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2011

    Multicast Capacity in Mobile Wireless Ad Hoc Network With Infrastructure Support

    The authors study the multicast capacity under a network model featuring both node's mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been shown effective ways to increase capacity. In this paper, they jointly consider the impact of the above three...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2011

    Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256

    The block cipher Camellia was jointly proposed by NTT and Mitsubishi Electric Corporations. It was then submitted to several standardization and evaluation projects such as the NESSIE Project and the Japanese CRYPTREC Evaluation. In 2002, Camellia was selected to be a CRYPTREC e-government recommended block cipher. In 2003, it was...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2011

    Incentive-Compatible Multirate Opportunistic Routing in Non-Cooperative Wireless Mesh Networks

    Wireless mesh networks have emerged as an efficient alternative to deploy broadband network infrastructures in local communities at low cost. To overcome the problem caused by the lossy and dynamic wireless links, opportunistic routing was proposed to achieve high throughput by exploiting multi-user diversity. Since wireless channels exhibit different packet...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2011

    Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing

    Collaborative spectrum sensing has been recognized as a promising approach to improve the sensing performance via exploiting the spatial diversity of the secondary users. Such kind of cooperation, however, might be easily disrupted by the selfish users, especially for the distributed collaborative spectrum sensing. In this paper, the authors identify...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2011

    Adaptive Security of Concurrent Non-Malleable Zero-Knowledge

    A zero-knowledge protocol allows a prover to convince a verifier of the correctness of a statement without disclosing any other information to the verifier. It is a basic tool and widely used in many other cryptographic applications. However, when stand-alone zero-knowledge protocols are used in complex environments, e.g., the Internet,...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2011

    Achieving Full View Coverage With Randomly-Deployed Heterogeneous Camera Sensors

    A brand-new concept about the coverage problem of camera sensor networks, full view coverage, has been proposed recently to judge whether an object's face is guaranteed to be captured. It is specially significant for camera networks since image shotted at the frontal viewpoint considerably increases the possibility to recognize the...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2011

    Auction-Based Optimal Power Allocation in Multiuser Cooperative Networks

    This paper considers a wireless network where users cooperate with each other to improve the network performance. The authors' goal is to design an optimal power allocation algorithm for user cooperation in a distributed fashion. Their formulate the power allocation problem as a multi-auctioneer multi-bidder power auction. Specifically, each user...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2011

    Linear Precoding Designs for Amplify-and-Forward Multiuser Two-Way Relay Systems

    The authors investigate the linear precoding designs for Multi-User Two-Way Relay System (MU-TWRS) where a multi-antenna Base-Station (BS) communicates with multiple single-antenna Mobile Stations (MSs) via a multi-antenna Relay Station (RS). The Amplify-and-Forward (AF) relay protocol is employed. The design goal is to optimize the precodings at BS, RS or...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jun 2011

    RISE-IS: A Semantic Bridge Between EPC Network And RDF-based EPCIS Accessing Applications

    With the rapid development of RFID technology and EPC Network, more and more physical things from the real world are going to be tagged and connected to the web. Since the semantic web aims at connecting all things on the web, physical things, as parts of 'Things' on the web,...

    Provided By Shanghai Jiao Tong University

  • White Papers // May 2011

    Attacks on a Double Length Blockcipher-Based Hash Proposal

    Cryptographic hash functions are one of the most important primitives in cryptography. A hash function maps from inputs of arbitrary length to a binary sequence of some fixed length. A hash function usually consists of iteration of a compression function with fixed input and output length. One first designs a...

    Provided By Shanghai Jiao Tong University

  • White Papers // Apr 2011

    Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing

    Collaborative spectrum sensing has been proposed recently to facilitate precise detection of primary users in Cognitive Radio networks. However, it simultaneously introduces new security issue that the selfish or even misbehaving users could cheat a secondary user by depriving its access opportunity. To address this problem, the authors propose a...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks

    In this paper, the authors investigate the coverage of mobile heterogeneous Wireless Sensor Networks (WSNs). By the term heterogeneous, they mean that sensors in the network have various sensing radii, which is an inherent property of many applied WSNs. Two sensor deployment schemes are considered - uniform and Poisson schemes....

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks

    Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, the authors formulate an analytical framework for resource allocation in a down-link OFDMA-based broadband network with coexistence of Secure Users (SU) and Normal Users (NU). The problem is formulated...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Joint Source and Relay Precoding Designs for MIMO Two-Way Relay Systems

    The authors investigate the source and relay precoding based on the minimum Mean-Square-Error (MSE) criterion for Amplify-and-Forward (AF) MIMO two-way relay systems. This joint design problem is a highly non-convex optimization problem. In this paper, they present two efficient design algorithms. The first one aims to minimize the total MSE...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Pseudo Exclusive-OR for LDPC Coded Two-Way Relay Block Fading Channels

    The authors present a new adaptive Physical Layer Network Coding (PLNC) method, called Pseudo eXclusive-OR (PXOR), for LDPC coded Two-Way Relay (TWR) block fading channels. Based on the Pairwise Check Decoding (PCD) they proposed earlier, the check relationship table generated by the PXOR mapping obtains the same Hamming distances of...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Converge-Cast With MIMO

    This paper investigates throughput and delay based on a newly predominant traffic pattern, called converge-cast, where each of the n nodes in the network act as a destination with k randomly chosen sources corresponding to it. Adopting Multiple-Input-Multiple-Output (MIMO) technology, the authors devise two many-to-one cooperative schemes under converge-cast for...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks

    Scaling properties of capacity, connectivity and delay of large-scale wireless networks has received considerable attention in the past several years since the seminal work on capacity of wireless networks by Gupta and Kumar. Traditionally study on these topics focuses on the assumption of maintaining always full connectivity. However, there is...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Throughput and Delay Scaling of General Cognitive Networks

    There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m secondary nodes. Two important metrics, i.e., throughput and delay, are studied in this paper. The authors first propose a simple and extendable decision model, i.e.,...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Heterogeneity Increases Multicast Capacity in Clustered Network

    In this paper, the authors investigate the multicast capacity for static network with heterogeneous clusters. They study the effect of heterogeneities on the achievable capacity from two aspects, including Heterogeneous Cluster Traffic (HCT) and Heterogeneous Cluster Size (HCS). HCT means cluster clients are more likely to appear near the cluster...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Optimal Multicast Capacity and Delay Tradeoffs in MANETs: A Global Perspective

    In this paper, the authors give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc NETworks (MANETs). Specifically, they consider two node mobility models: two-dimensional i.i.d. mobility, one-dimensional i.i.d. mobility. Two mobility time-scales are included in this paper: fast mobility where node mobility is at the same...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Mobility Limited Flip-Based Sensor Networks Deployment

    An important phase of sensor networks operation is deployment of sensors in the field of interest. Critical goals during sensor networks deployment include coverage, connectivity, load balancing etc. A class of work has recently appeared, where mobility in sensors is leveraged to meet deployment objectives. In this paper, the authors...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2010

    On the Relation Between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption

    Identity-Based Proxy Re-Encryption (IBPRE) is a useful primitive, in the sense that a semi-trust proxy can translate ciphertexts originally intended for one identity into ciphertexts intended for another identity. The proxy, however, cannot learn anything about the underlying plaintexts. Mediated Identity-Based Encryption (MIBE), introduced by Ding et al., is particularly...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    A Calculus of Consistent Component-Based Software Updates

    Dynamic update is a general, software-based technique: there is no need for redundant hardware or special-purpose software architecture, and application state can be naturally preserved between updated versions, so that current processing is not compromised or interrupted. Most current works about software update concentrate on techniques and implementations of bug-fixes...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    Improved Preimage Attack on One-Block MD4

    The authors propose an improved preimage attack on one-block MD4 with the time complexity MD4 compression function operations, as compared to 2107 in. They research the attack procedure in and formulate the complexity for computing a preimage attack on one-block MD4. They attain the result mainly through the following two...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    A Study on Event-Driven TDMA Protocol for Wireless Sensor Networks

    MAC protocol controls the activity of wireless radio of sensor nodes directly so that it is the major consumer of sensor energy and the energy efficiency of MAC protocol makes a strong impact on the network performance. TDMA-based MAC protocol is inherently collision-free and can rule out idle listening since...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    Use of RFID for Intelligent Pre-Shipment Inspection

    Pre-shipment inspection is usually undertaken by customs administrations and standards bureaus to address security, smuggling, tax evasion and counterfeit goods challenges of imports. The process has predominantly been undertaken using manual based methods which have had considerable shortcomings. Manual methods of inspection at source and manual tracking are subject to...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Physical-Layer Network Coding for Wireless Cooperative Networks

    Cooperative communication is an intriguing topic that has aroused a frenzy of heat in the wireless networking research. The notion of cooperative communication is to enable transmit and receive cooperation at the user level by exploiting the broadcast nature of wireless radio waveform so that the overall system performance including...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Extended List Scheduling for Optical Grid Applications

    The authors propose a more practical resource model for optical grid applications by extending the classic list scheduling algorithm to achieve communication contention aware scheduling of optical grid applications. An effective adaptive routing scheme is also proposed to improve the performance of the extended list scheduling. The impacts of different...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Throughput Optimization in Multi-Hop Wireless Networks With Multi-Packet Reception and Directional Antennas

    Recent advances in the physical layer have enabled the simultaneous reception of multiple packets by a node in wireless networks. The authors address the throughput optimization problem in wireless networks that support Multi-Packet Reception (MPR) capability. The problem is modeled as a joint routing and scheduling problem, which is known...

    Provided By Shanghai Jiao Tong University

  • White Papers // Sep 2010

    Stronger Security Model of Group Key Agreement

    In PKC 2009, Gorantla, Boyd and Gonz?alez Nieto presented a nice result on modeling security for Group Key Agreement (GKA) protocols. They proposed a novel security model (GBG model) that better supports the adversaries' queries than previous models for GKA protocols by considering KCI resilience. However, ephemeral key leakage attack...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jun 2009

    Performances of Label Switched Path Dynamic Provisioning in GMPLS Networks - Standardization and Our Testing Experiences

    It has been widely agreed that Generalized Multi-Protocol Label Switching (GMPLS) and Multi-Protocol Label Switching Traffic Engineering (MPLS-TE) can provide the necessary signaling and routing functionalities for automated Label Switched Path (LSP) provisioning and fast recovery upon failure. Significant efforts have thus been made to take advantage of this characteristic...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2010

    Performances of Label Switched Path Dynamic Provisioning in GMPLS Networks

    Given the fact that control channels in GMPLS/MPLS-TE networks use packet based forwarding, and the processing of control messages may be subject to various factors, the provisioning delay of an LSP could be highly random. To bridge the gap between the variable performance and demanding application needs, it is imperative...

    Provided By Shanghai Jiao Tong University

  • White Papers // Apr 2009

    Topology Control, Routing and the Better Transmission Path in Wireless Ad Hoc Networks

    In wireless ad hoc networks, different applications may have different requirements on data transfer which are not limited to being energy-efficient. Even in a single application, there may be different requirements. However, the existing topology control and routing algorithms usually considered only one factor, which could not satisfy the various...

    Provided By Shanghai Jiao Tong University

  • White Papers // Sep 2008

    Cryptanalysis of LU Decomposition-Based Key Pre-Distribution Scheme for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are gaining popularity quickly because of their flexibility and low cost to solve a variety of real-world challenges. The nodes in WSNs are equipped with may low power devices, such as environmental sensors, signal processing chips, wireless transceivers, etc. As the information collected by the sensors...

    Provided By Shanghai Jiao Tong University

  • White Papers // Sep 2010

    Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks

    This paper considers a relay-assisted bidirectional cellular network where the Base Station (BS) communicates with each Mobile Station (MS) using OFDMA for both uplink and downlink. The goal is to improve the overall system performance by exploring the full potential of the network in various dimensions including user, subcarrier, relay,...

    Provided By Shanghai Jiao Tong University

  • White Papers // Mar 2009

    Fast Cycle Frequency Domain Feature Detection for Cognitive Radio Systems

    In cognitive radio systems, one of the main requirements is to detect the presence of the primary users' transmission, especially in weak signal cases. Cyclostationary detection is always used to solve weak signal detection, however, the computational complexity prevents it from wide usage. In this paper, a fast cycle frequency...

    Provided By Shanghai Jiao Tong University

  • White Papers // Apr 2009

    Theoretical Analysis of Cyclic Frequency Domain Noise and Feature Detection for Cognitive Radio Systems

    In cognitive radio systems, cyclostationary feature detection plays an important role in spectrum sensing, especially in low SNR cases. To configure the detection threshold under a certain noise level and a pre-set miss detection probability Pf, it's important to derive the theoretical distribution of the observation variable. In this paper,...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jun 2010

    On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption

    Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is a system for realizing complex access control on encrypted data, in which attributes are used to describe a user's credentials and a party encrypting data determines a policy over attributes for who can decrypt. In CP-ABE schemes, access policy is attached to the ciphertext to be...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    Improved Preimage Attack on One-Block MD4

    The authors propose an improved preimage attack on one-block MD4 with the time complexity MD4 compression function operations, as compared to 2107 in. They research the attack procedure in and formulate the complexity for computing a preimage attack on one-block MD4. They attain the result mainly through the following two...

    Provided By Shanghai Jiao Tong University

  • White Papers // Sep 2010

    Stronger Security Model of Group Key Agreement

    In PKC 2009, Gorantla, Boyd and Gonz?alez Nieto presented a nice result on modeling security for Group Key Agreement (GKA) protocols. They proposed a novel security model (GBG model) that better supports the adversaries' queries than previous models for GKA protocols by considering KCI resilience. However, ephemeral key leakage attack...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2008

    Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem

    Currently, there are a lot of Authenticated Key Exchange (AKE) protocols in literature. However, the security proofs of this kind of protocols have been established to be a non-trivial task. The main issue is that without static private key it is difficult for simulator to fully support the SessionKeyReveal and...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Mobility Limited Flip-Based Sensor Networks Deployment

    An important phase of sensor networks operation is deployment of sensors in the field of interest. Critical goals during sensor networks deployment include coverage, connectivity, load balancing etc. A class of work has recently appeared, where mobility in sensors is leveraged to meet deployment objectives. In this paper, the authors...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2009

    Comparison of Parametric and Nonparametric Techniques for Non-Peak Traffic Forecasting

    Accurately predicting non-peak traffic is crucial to daily traffic for all forecasting models. In the paper, Least Squares Support Vector Machines (LS-SVMs) are investigated to solve such a practical problem. It is the first time to apply the approach and analyze the forecast performance in the domain. For comparison purpose,...

    Provided By Shanghai Jiao Tong University

  • White Papers // May 2011

    Attacks on a Double Length Blockcipher-Based Hash Proposal

    Cryptographic hash functions are one of the most important primitives in cryptography. A hash function maps from inputs of arbitrary length to a binary sequence of some fixed length. A hash function usually consists of iteration of a compression function with fixed input and output length. One first designs a...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Throughput Optimization in Multi-Hop Wireless Networks With Multi-Packet Reception and Directional Antennas

    Recent advances in the physical layer have enabled the simultaneous reception of multiple packets by a node in wireless networks. The authors address the throughput optimization problem in wireless networks that support Multi-Packet Reception (MPR) capability. The problem is modeled as a joint routing and scheduling problem, which is known...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Impact of Mobility and Heterogeneity on Coverage and Energy Consumption in Wireless Sensor Networks

    In this paper, the authors investigate the coverage of mobile heterogeneous Wireless Sensor Networks (WSNs). By the term heterogeneous, they mean that sensors in the network have various sensing radii, which is an inherent property of many applied WSNs. Two sensor deployment schemes are considered - uniform and Poisson schemes....

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Throughput and Delay Scaling of General Cognitive Networks

    There has been recent interest within the networking research community to understand how performance scales in cognitive networks with overlapping n primary nodes and m secondary nodes. Two important metrics, i.e., throughput and delay, are studied in this paper. The authors first propose a simple and extendable decision model, i.e.,...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Heterogeneity Increases Multicast Capacity in Clustered Network

    In this paper, the authors investigate the multicast capacity for static network with heterogeneous clusters. They study the effect of heterogeneities on the achievable capacity from two aspects, including Heterogeneous Cluster Traffic (HCT) and Heterogeneous Cluster Size (HCS). HCT means cluster clients are more likely to appear near the cluster...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks

    Scaling properties of capacity, connectivity and delay of large-scale wireless networks has received considerable attention in the past several years since the seminal work on capacity of wireless networks by Gupta and Kumar. Traditionally study on these topics focuses on the assumption of maintaining always full connectivity. However, there is...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Converge-Cast With MIMO

    This paper investigates throughput and delay based on a newly predominant traffic pattern, called converge-cast, where each of the n nodes in the network act as a destination with k randomly chosen sources corresponding to it. Adopting Multiple-Input-Multiple-Output (MIMO) technology, the authors devise two many-to-one cooperative schemes under converge-cast for...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jan 2011

    Optimal Multicast Capacity and Delay Tradeoffs in MANETs: A Global Perspective

    In this paper, the authors give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc NETworks (MANETs). Specifically, they consider two node mobility models: two-dimensional i.i.d. mobility, one-dimensional i.i.d. mobility. Two mobility time-scales are included in this paper: fast mobility where node mobility is at the same...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2008

    Recursive Analysis for Soft Handoff Schemes in CDMA Cellular Systems

    In this paper, the authors study the performance of the call admission control for a CDMA based cellular system. They describe the soft handoff procedure and the cellular geometry in CDMA system under certain assumptions and present analytical model for this scheme based on Continuous Time Markov Chain. They obtain...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Extended List Scheduling for Optical Grid Applications

    The authors propose a more practical resource model for optical grid applications by extending the classic list scheduling algorithm to achieve communication contention aware scheduling of optical grid applications. An effective adaptive routing scheme is also proposed to improve the performance of the extended list scheduling. The impacts of different...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2010

    Physical-Layer Network Coding for Wireless Cooperative Networks

    Cooperative communication is an intriguing topic that has aroused a frenzy of heat in the wireless networking research. The notion of cooperative communication is to enable transmit and receive cooperation at the user level by exploiting the broadcast nature of wireless radio waveform so that the overall system performance including...

    Provided By Shanghai Jiao Tong University

  • White Papers // Oct 2009

    A Survey on Multicast Capacity of Wireless Ad Hoc Networks

    Studies of throughput capacity of wireless ad hoc networks attracts many attention since the year 2000. In these paper, the fundamental capacity limits of wireless networks is studied. These results are of great importance because they are not only critical for theoretical analysis, but also provide guidelines in designing wireless...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2010

    A Study on Event-Driven TDMA Protocol for Wireless Sensor Networks

    MAC protocol controls the activity of wireless radio of sensor nodes directly so that it is the major consumer of sensor energy and the energy efficiency of MAC protocol makes a strong impact on the network performance. TDMA-based MAC protocol is inherently collision-free and can rule out idle listening since...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2011

    Linear Precoding Designs for Amplify-and-Forward Multiuser Two-Way Relay Systems

    The authors investigate the linear precoding designs for Multi-User Two-Way Relay System (MU-TWRS) where a multi-antenna Base-Station (BS) communicates with multiple single-antenna Mobile Stations (MSs) via a multi-antenna Relay Station (RS). The Amplify-and-Forward (AF) relay protocol is employed. The design goal is to optimize the precodings at BS, RS or...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2011

    Auction-Based Optimal Power Allocation in Multiuser Cooperative Networks

    This paper considers a wireless network where users cooperate with each other to improve the network performance. The authors' goal is to design an optimal power allocation algorithm for user cooperation in a distributed fashion. Their formulate the power allocation problem as a multi-auctioneer multi-bidder power auction. Specifically, each user...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Power and Subcarrier Allocation for Physical-Layer Security in OFDMA Networks

    Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, the authors formulate an analytical framework for resource allocation in a down-link OFDMA-based broadband network with coexistence of Secure Users (SU) and Normal Users (NU). The problem is formulated...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Joint Source and Relay Precoding Designs for MIMO Two-Way Relay Systems

    The authors investigate the source and relay precoding based on the minimum Mean-Square-Error (MSE) criterion for Amplify-and-Forward (AF) MIMO two-way relay systems. This joint design problem is a highly non-convex optimization problem. In this paper, they present two efficient design algorithms. The first one aims to minimize the total MSE...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2011

    Pseudo Exclusive-OR for LDPC Coded Two-Way Relay Block Fading Channels

    The authors present a new adaptive Physical Layer Network Coding (PLNC) method, called Pseudo eXclusive-OR (PXOR), for LDPC coded Two-Way Relay (TWR) block fading channels. Based on the Pairwise Check Decoding (PCD) they proposed earlier, the check relationship table generated by the PXOR mapping obtains the same Hamming distances of...

    Provided By Shanghai Jiao Tong University

  • White Papers // Aug 2010

    A Spectrum Access Game in Bidirectional Cognitive Relay Networks

    The authors consider a cognitive relay network where two secondary users can access the un-utilized spectrum and conduct bidirectional communication via the help of primary users. The primary users are regarded as relay nodes of the secondary users and adopt amplify-and-forward relaying strategy. Physical-layer network coding is used when both...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2010

    Pairwise Check Decoding for LDPC Coded Two-Way Relay Fading Channels

    The authors present a novel partial decoding method at the relay, called Pairwise Check Decoding (PCD), for two-way relay fading channels. The proposed PCD method forms a so-called check-relationship table for the superimposed Low-Density Parity-Check (LDPC)-coded packet pair during the multiple access phase. Meanwhile, it incorporates adaptive network coding by...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2010

    Finite-SNR Diversity-Multiplexing Tradeoff for Two-Way Relay Fading Channel

    This paper studies the performance limits of Two-Way Relay Channel (TWRC) at finite Signal-to-Noise Ratio (SNR) in Rayleigh fading environment. A two-phase Decode-and-Forward (DF) protocol is considered. The authors first derive closed-form expressions for both outage probability and Diversity-Multiplexing Tradeoff (DMT). Their results are general and suitable for any time...

    Provided By Shanghai Jiao Tong University

  • White Papers // Feb 2010

    Precoding Strategy Selection for Cognitive MIMO Multiple Access Channels Using Learning Automata

    In this paper, the authors study the quantized precoding strategy selection for Multiple-Input Multiple-Output (MIMO) Multiple Access Channels (MAC) in Cognitive Radio (CR) networks through a game-theoretic perspective. Since the secondary users in such system are difficult to be coordinated by a centralized authority, they are non-cooperative and attempt to...

    Provided By Shanghai Jiao Tong University

  • White Papers // Dec 2009

    The New Interference Alignment Scheme for the MIMO Interference Channel

    In this paper, the authors propose a new Interference Alignment (IA) scheme designing jointly the linear transmitter and receiver for the MIMO interference channel system, using minimum total mean square error criterion, subject to individual transmit power constraints. They show that transmitter and receiver under such criterion could be realized...

    Provided By Shanghai Jiao Tong University

  • White Papers // Jul 2009

    User Based Adaptive Joint Channel Assignment in Multi-Cell OFDMA Systems

    This paper considers coordinated scheduling in multi-cell OFDMA systems. The authors propose a user-based adaptive joint channel assignment scheme. In the proposed scheme, all the cell-edge users from multiple cells are scheduled jointly while cell-centre users are scheduled in each individual cell. The method exploits both multi-user diversity and frequency...

    Provided By Shanghai Jiao Tong University

  • White Papers // Aug 2009

    Superimposed XOR: A New Physical Layer Network Coding Scheme for Two-Way Relay Channels

    The authors present a new Physical Layer Network Coding (PLNC) scheme, called superimposed XOR, for two-way relay channels. The new scheme specifically takes into account the channel as well as information asymmetry in the broadcast phase of two-way relaying. It is based upon both bit-wise XOR and symbol-level superposition coding....

    Provided By Shanghai Jiao Tong University

  • White Papers // May 2009

    Rate Regions of a Two-Way Gaussian Relay Channel

    The authors study two-way communications over a three-node Gaussian relay channel. Several practical relaying strategies are considered, including bit-wise XOR-based Decode-and-Forward (DF), superposition-based DF, and Amplify-and-Forward (AF). For each considered two-way relay scheme, they show that its achievable rate pair is governed by a set of linear inequalities. As a...

    Provided By Shanghai Jiao Tong University

  • White Papers // Nov 2011

    Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing

    Collaborative spectrum sensing has been recognized as a promising approach to improve the sensing performance via exploiting the spatial diversity of the secondary users. Such kind of cooperation, however, might be easily disrupted by the selfish users, especially for the distributed collaborative spectrum sensing. In this paper, the authors identify...

    Provided By Shanghai Jiao Tong University