Springer

Displaying 1-40 of 209 results

  • White Papers // May 2010

    Ontology-Based Mining of Brainwaves: A Sequence Similarity Technique for Mapping Alternative Features in Event-Related Potentials (ERP) Data

    In this paper, the authors present a method for identifying correspondences, or mappings, between alternative features of brainwave activity in Event Related Potentials (ERP) data. The goal is to simulate mapping across results from heterogeneous methods that might be used in different neuroscience research labs. The input to the mapping...

    Provided By Springer

  • White Papers // Mar 2010

    Using Directionality in Mobile Routing

    The increased usage of directional methods of communications has prompted research into leveraging directionality in every layer of the network stack. In this paper, the authors explore the use of directionality in layer 3 to facilitate routing in highly mobile environments. They introduce Mobile Orthogonal Rendezvous Routing Protocol (MORRP) for...

    Provided By Springer

  • White Papers // Jul 2010

    Business Ethics Research: A Global Perspective

    Using 10 years of publication data (1999 - 2008) from 10 leading business ethics journals, the authors examine global patterns of business ethics research and contributing institutions and scholars. Although U.S. academic institutions continue to lead in the contributions toward business ethics research, Asian and European institutions have made significant...

    Provided By Springer

  • White Papers // Jul 2011

    High Sensitivity Wake-Up Radio Using Spreading Codes: Design, Evaluation, and Applications

    The sensor node has constrained energy resources, and the radio accounts for a major portion of the node's energy budget. Current research, into energy efficiency in sensor networks, puts the radio in sleep mode when there is no traffic to reduce energy consumption. These works can be classified into two...

    Provided By Springer

  • White Papers // Oct 2011

    Design of Uniformly Most Powerful Alphabets for HDF 2-Way Relaying Employing Non-Linear Frequency Modulations

    Hierarchical-Decode-and-Forward is a promising wireless-network-coding-based 2-way relaying strategy due to its potential to operate outside the classical multiple-access capacity region. Assuming a practical scenario with channel state information at the receiver and no channel adaptation, there exist modulations and exclusive codes for which even non-zero channel parameters (denoted as catastrophic)...

    Provided By Springer

  • White Papers // Nov 2011

    Probabilistic Framework for Opportunistic Spectrum Management in Cognitive Ad Hoc Networks

    Existing distributed opportunistic spectrum management schemes do not consider the inability of today's cognitive transceivers to measure interference at the primary receivers. Consequently, optimizing the constrained cognitive radio network performance based only on the local interference measurements at the cognitive senders does not lead to truly optimal performance due to...

    Provided By Springer

  • White Papers // Nov 2011

    Impacts of Impulsive Noise From Partial Discharges on Wireless Systems Performance: Application to MIMO Precoders

    To satisfy the smart grid electrical network, communication systems in high-voltage substations have to be installed in order to control equipments. Considering that those substations were not necessarily designed for adding communication networks, one of the most appropriate solutions is to use Wireless Sensor Network (WSN). However, the high voltage...

    Provided By Springer

  • White Papers // Nov 2010

    Joint Communication and Positioning Based on Soft Channel Parameter

    A joint communication and positioning system based on maximum-likelihood channel parameter estimation is proposed. The parameters of the physical channel, needed for positioning, and the channel coefficients of the equivalent discrete-time channel model, needed for communication, are estimated jointly using a priori information about pulse shaping and receive filtering. The...

    Provided By Springer

  • White Papers // May 2009

    Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks

    This paper presents middleware mechanisms to support real-time services in heterogeneous sensor networks, focusing on the evaluation of link metrics. Heterogeneous sensor networks require specific QoS (quality of service) guarantees in order to allow the coordination and cooperation among the different nodes that compose the system. In order to improve...

    Provided By Springer

  • White Papers // Mar 2012

    Ten Years of Research in Spectrum Sensing and Sharing in Cognitive Radio

    Cognitive Radio (CR) can successfully deal with the growing demand and scarcity of the wireless spectrum. To exploit limited spectrum efficiently, CR technology allows unlicensed users to access licensed spectrum bands. Since licensed users have priorities to use the bands, the unlicensed users need to continuously monitor the licensed users'...

    Provided By Springer

  • White Papers // Feb 2012

    Decision Making for Cognitive Radio Equipment: Analysis of the First 10 Years of Exploration

    This paper draws a general retrospective view on the first 10 years of Cognitive Radio (CR). More specifically, the authors explore in this paper decision making and learning for CR from an equipment perspective. Thus, this paper depicts the main decision making problems addressed by the community as general Dynamic...

    Provided By Springer

  • White Papers // Mar 2012

    Towards Ubiquitous Video Services Through Scalable Video Coding and Cross-Layer Optimization

    Video content as one of the key features of future Internet services should be made ubiquitously available to users. Moreover, this should be done in a timely fashion and with adequate support for Quality of Service (QoS). Although providing the required coverage for ubiquitous video services, wireless networks, however, pose...

    Provided By Springer

  • White Papers // Mar 2012

    Protection of Primary Users in Dynamically Varying Radio Environment: Practical Solutions and Challenges

    One of the primary objectives of deploying Cognitive Radio (CR) within a Dynamic Spectrum Access (DSA) network is to ensure that the legacy rights of incumbent licensed (primary) transmissions are protected with respect to interference mitigation when unlicensed (secondary) communications are simultaneously operating within the same spectral vicinity. In this...

    Provided By Springer

  • White Papers // Mar 2012

    Bayesian Filtering for Indoor Localization and Tracking in Wireless Sensor Networks

    In this paper, the authors investigate experimentally the suitability of several Bayesian filtering techniques for the problem of tracking a moving device by a set of wireless sensor nodes in indoor environments. In particular, they consider a setup where a robot was equipped with an Ultra-WideBand (UWB) node emitting ranging...

    Provided By Springer

  • White Papers // Mar 2012

    Traffic Models Impact on OFDMA Scheduling Design

    This paper studies the impact on the design of scheduling algorithms for Orthogonal Frequency Division Multiple Access (OFDMA) systems of two traffic models described in the evaluation methodology proposals from standardization bodies: the full buffer and the finite buffer traffic models. The results show that a gradient scheduling algorithm is...

    Provided By Springer

  • White Papers // Mar 2012

    Low Complexity Soft Demapping for Non-Binary LDPC Codes

    This paper focuses on non-binary wireless transmission, where "Non-binary" refers to the use of non-binary Low Density Parity Check (LDPC) codes for Forward Error Correction. The complexity of the non-binary soft demapper is addressed in particular when one non-binary Galois Field (GF) symbol spreads across multiple Quadrature Amplitude Modulation (QAM)...

    Provided By Springer

  • White Papers // Mar 2012

    Overview of Enabling Technologies for 3GPP LTE-Advanced

    As the Long Term Evolution (LTE) standard comes to an end, 3rd Generation Partnership Project is discussing further evolution of the LTE to meet the international mobile telecommunications advanced requirements, which is referred to as LTE-Advanced (LTE release 10 and beyond). This paper first presents the network infrastructure of the...

    Provided By Springer

  • White Papers // Mar 2012

    CDSWS: Coverage-Guaranteed Distributed Sleep/ Wake Scheduling for Wireless Sensor Networks

    Minimizing the energy consumption of battery-powered sensors is an essential consideration in sensor network applications, and sleep/wake scheduling mechanism has been proved to an efficient approach to handling this issue. In this paper, a coverage-guaranteed distributed sleep/wake scheduling scheme is presented with the purpose of prolonging network lifetime while guaranteeing...

    Provided By Springer

  • White Papers // Mar 2012

    EXIT-Constrained BICM-ID Design Using Extended Mapping

    This paper proposes a novel design framework, EXIT-constrained Binary Switching Algorithm (EBSA), for achieving near Shannon limit performance with Single parity check and Irregular repetition coded Bit Interleaved Coded Modulation and Iterative Detection with Extended Mapping (SI-BICM-ID-EM). EBSA is composed of node degree allocation optimization using Linear Programming (LP) and...

    Provided By Springer

  • White Papers // Mar 2012

    A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs

    In the case of a 3G-WLAN inter-working architecture, handoff latency is mainly caused by the delays incurred when a mobile STAtion (STA) transfers a current security context to the target access network or establishes connectivity to a new Access Point (AP). Existing handoff optimization schemes have mostly focused on reducing...

    Provided By Springer

  • White Papers // Mar 2012

    Joint Cooperative Relay Scheme for Spectrum efficient Usage and Capacity Improvement in Cognitive Radio Networks

    In order to improve the efficiency of spectrum resource usage and the capacity of wireless networks, cooperative relay techniques which utilize the vacant spectrum of primary users for secondary users' data transmission have been applied in cognitive radio networks. Considering the dynamic time-varying vacant spectrum resources and achievable rate on...

    Provided By Springer

  • White Papers // Mar 2012

    Hybrid Multi-Technology Routing in Heterogeneous Vehicular Networks

    Recent developments of wireless communication systems have resulted in the availability of heterogeneous access networks at any geographic area. To make use of this heterogeneous environment for vehicular users to access the Internet, in this paper, the authors propose a Hybrid Multi-Technology Routing (HMTR) protocol for multihop vehicular networks. HMTR...

    Provided By Springer

  • White Papers // Mar 2012

    Mobile Operators Have Set Ambitious Targets-Is It Possible to Boost Network Capacity While Reducing Its Energy Consumption?

    This paper investigates the challenges faced by operators and quantifies, through a number of case studies, the impact of specific solutions and how the energy consumption trend can be expected to develop over the next decade. With different options for upgrading capacity, studies show that a hybrid macro-pico upgrade is...

    Provided By Springer

  • White Papers // Feb 2012

    Early Disparity Estimation Skipping for Multi-View Video Coding

    Multi-View Video (MVV) and multi-view plus depth video became typical formats for 3D video systems which offer more realistic visual effects for consumers. The standard for encoding of MVV, known as Multi-view Video Coding (MVC), was produced by ISO/IEC and ITU-T and has exhibited significant compression efficiency for MVV signals....

    Provided By Springer

  • White Papers // Mar 2012

    Design and Field Evaluation of Geographical Location-Aware Service Discovery on IPv6 GeoNetworking for VANET

    Service discovery is an essential component for distributed mobile applications in vehicular communication systems. While there have been numerous service discovery protocols, applications for vehicular communication systems pose additional requirements: discover services according to geographical position inside dynamic mobile environments. In this paper, the authors propose a geographical location aware...

    Provided By Springer

  • White Papers // Oct 2011

    Forward-Looking WDM Network Reconfiguration With Per-Link Congestion Control

    The authors study reconfigurations of wavelength-routed Wavelength Division Multiplexing (WDM) networks in response to lightpath demand changes, with the objective of servicing more lightpath demands without additional network resources from a long-term network operation point of view. For the reconfiguration problem under study, they assume WDM network operators are provided...

    Provided By Springer

  • White Papers // Mar 2012

    The Spatio-Temporal Modeling for Criminal Incidents

    Law enforcement agencies monitor criminal incidents. With additional geographic and demographic data, law enforcement analysts look for spatio-temporal patterns in these incidents in order to predict future criminal activity. When done correctly these predictions can inform actions that can improve security and reduce the impact of crime. Effective prediction requires...

    Provided By Springer

  • White Papers // Feb 2012

    Detecting Unknown Malicious Code by Applying Classification Techniques on OpCode Patterns

    In previous studies classification algorithms were employed successfully for the detection of unknown malicious code. Most of these studies extracted features based on byte n-gram patterns in order to represent the inspected files. In this paper, the authors represent the inspected files using OpCode n-gram patterns which are extracted from...

    Provided By Springer

  • White Papers // Dec 2011

    Protected Control Packets to Prevent Denial of Services Attacks in IEEE 802.11 Wireless Networks

    Denial-of-Service (DoS) attack exploits inherent limitation of resources in wireless networks in attempt to overwhelm and exhaust their finite capacity. In wireless networks, clear-text form of Control Packets (CP) exhibits a security flaw that can be exploited by attackers to render the networks incapable of providing normal services. While these...

    Provided By Springer

  • White Papers // Oct 2011

    A Survey on Biometric Cryptosystems and Cancelable Biometrics

    Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable biometrics represent emerging technologies of biometric template protection addressing these concerns and improving public confidence and acceptance of biometrics. In addition, biometric cryptosystems provide mechanisms...

    Provided By Springer

  • White Papers // Jan 2012

    Intrusion Detection Model Based on Selective Packet Sampling

    Recent experimental work by Androulidakis and Papavassiliou has shown that it is possible to maintain a high level of network security while selectively inspecting packets for the existence of intrusive activity, thereby resulting in a minimal amount of processing overhead. In this paper, a statistical approach for the modeling of...

    Provided By Springer

  • White Papers // Oct 2011

    2DPCA Fractal Features and Genetic Algorithm for Efficient Face Representation and Recognition

    In this paper, the authors present an automatic face recognition system. They show that fractal features obtained from Iterated Function System allow a successful face recognition and outperform the classical approaches. They propose a new fractal feature extraction algorithm based on genetic algorithms to speed up the feature extraction step....

    Provided By Springer

  • White Papers // Jun 2011

    Two-Round Contributory Group Key Exchange Protocol for Wireless Network Environments

    With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A Group Key Exchange (GKE) protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group...

    Provided By Springer

  • White Papers // Jul 2011

    Accuracy of Depolarization and Delay Spread Predictions Using Advanced Ray-Based Modeling in Indoor Scenarios

    This paper investigates the prediction accuracy of an advanced deterministic propagation model in terms of channel depolarization and frequency selectivity for indoor wireless propagation. In addition to specular reflection and diffraction, the developed ray tracing tool considers penetration through dielectric blocks and/or diffuse scattering mechanisms. The sensitivity and prediction accuracy...

    Provided By Springer

  • White Papers // Jul 2011

    An Orthogonal Spectrum Sharing Scheme for Wireless Sensor Networks

    It is not economically viable to allocate a dedicated spectrum band to Wireless Sensor Networks (WSNs). Moreover, sharing a spectrum band with incumbent (primary) system compromises the reliability and performance of both the systems due to interference from one system to another. In this paper, the authors address this limitation...

    Provided By Springer

  • White Papers // Jun 2011

    Quality of Service Implications of Power Control and Multiuser Detection-Based Cross-Layer Design

    In order to allow for dense spatial reuse in wireless ad hoc networks, multiple access interference must be dealt with. This calls for advanced physical layer techniques, such as MultiUser Detection (MUD) or power control. However, these techniques can only be efficiently applied to ad hoc networks when they are...

    Provided By Springer

  • White Papers // Jul 2011

    Vector Perturbation Based Adaptive Distributed Precoding Scheme With Limited Feedback for CoMP Systems

    A downlink adaptive distributed precoding scheme is proposed for Coordinated Multi-Point (CoMP) transmission systems. The serving Base Station (BS) obtains the optimal precoding vector via user feedback. Meanwhile, the precoding vector of each coordinated BS is determined by adaptive gradient iteration according to the perturbation vector and the adjustment factor...

    Provided By Springer

  • White Papers // Jun 2011

    Low Complexity Antenna Selection for V-BLAST Systems With OSIC Detection

    Multiple-Input Multiple-Output (MIMO) systems have an advantage of spectral efficiency compared to single-input single-output systems, which means that the MIMO systems have significantly higher data throughput. The VBLAST (Vertical Bell Laboratories Layered Space Time) scheme is a popular transceiver structure which has relatively good performance. In the V-BLAST scheme, Ordered...

    Provided By Springer

  • White Papers // Jul 2011

    State of the Art Baseband DSP Platforms for Software Defined Radio: A Survey

    Software Defined Radio (SDR) is an innovative approach which is becoming a more and more promising technology for future mobile handsets. Several proposals in the field of embedded systems have been introduced by different universities and industries to support SDR applications. This paper presents an overview of current platforms and...

    Provided By Springer

  • White Papers // Jul 2011

    Binary De Bruijn Sequences for DS-CDMA Systems: Analysis and Results

    Code Division Multiple Access (CDMA) using Direct Sequence (DS) spread spectrum modulation provides multiple access capability essentially thanks to the adoption of proper sequences as spreading codes. The ability of a DSCDMA receiver to detect the desired signal relies to a great extent on the auto-correlation properties of the spreading...

    Provided By Springer