Springer

Displaying 1-40 of 209 results

  • White Papers // May 2010

    Ontology-Based Mining of Brainwaves: A Sequence Similarity Technique for Mapping Alternative Features in Event-Related Potentials (ERP) Data

    In this paper, the authors present a method for identifying correspondences, or mappings, between alternative features of brainwave activity in Event Related Potentials (ERP) data. The goal is to simulate mapping across results from heterogeneous methods that might be used in different neuroscience research labs. The input to the mapping...

    Provided By Springer

  • White Papers // Mar 2010

    Using Directionality in Mobile Routing

    The increased usage of directional methods of communications has prompted research into leveraging directionality in every layer of the network stack. In this paper, the authors explore the use of directionality in layer 3 to facilitate routing in highly mobile environments. They introduce Mobile Orthogonal Rendezvous Routing Protocol (MORRP) for...

    Provided By Springer

  • White Papers // Jul 2010

    Business Ethics Research: A Global Perspective

    Using 10 years of publication data (1999 - 2008) from 10 leading business ethics journals, the authors examine global patterns of business ethics research and contributing institutions and scholars. Although U.S. academic institutions continue to lead in the contributions toward business ethics research, Asian and European institutions have made significant...

    Provided By Springer

  • White Papers // Jul 2011

    High Sensitivity Wake-Up Radio Using Spreading Codes: Design, Evaluation, and Applications

    The sensor node has constrained energy resources, and the radio accounts for a major portion of the node's energy budget. Current research, into energy efficiency in sensor networks, puts the radio in sleep mode when there is no traffic to reduce energy consumption. These works can be classified into two...

    Provided By Springer

  • White Papers // Oct 2011

    Design of Uniformly Most Powerful Alphabets for HDF 2-Way Relaying Employing Non-Linear Frequency Modulations

    Hierarchical-Decode-and-Forward is a promising wireless-network-coding-based 2-way relaying strategy due to its potential to operate outside the classical multiple-access capacity region. Assuming a practical scenario with channel state information at the receiver and no channel adaptation, there exist modulations and exclusive codes for which even non-zero channel parameters (denoted as catastrophic)...

    Provided By Springer

  • White Papers // Nov 2011

    Probabilistic Framework for Opportunistic Spectrum Management in Cognitive Ad Hoc Networks

    Existing distributed opportunistic spectrum management schemes do not consider the inability of today's cognitive transceivers to measure interference at the primary receivers. Consequently, optimizing the constrained cognitive radio network performance based only on the local interference measurements at the cognitive senders does not lead to truly optimal performance due to...

    Provided By Springer

  • White Papers // Nov 2011

    Impacts of Impulsive Noise From Partial Discharges on Wireless Systems Performance: Application to MIMO Precoders

    To satisfy the smart grid electrical network, communication systems in high-voltage substations have to be installed in order to control equipments. Considering that those substations were not necessarily designed for adding communication networks, one of the most appropriate solutions is to use Wireless Sensor Network (WSN). However, the high voltage...

    Provided By Springer

  • White Papers // Nov 2010

    Joint Communication and Positioning Based on Soft Channel Parameter

    A joint communication and positioning system based on maximum-likelihood channel parameter estimation is proposed. The parameters of the physical channel, needed for positioning, and the channel coefficients of the equivalent discrete-time channel model, needed for communication, are estimated jointly using a priori information about pulse shaping and receive filtering. The...

    Provided By Springer

  • White Papers // May 2009

    Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks

    This paper presents middleware mechanisms to support real-time services in heterogeneous sensor networks, focusing on the evaluation of link metrics. Heterogeneous sensor networks require specific QoS (quality of service) guarantees in order to allow the coordination and cooperation among the different nodes that compose the system. In order to improve...

    Provided By Springer

  • White Papers // Mar 2012

    Traffic Models Impact on OFDMA Scheduling Design

    This paper studies the impact on the design of scheduling algorithms for Orthogonal Frequency Division Multiple Access (OFDMA) systems of two traffic models described in the evaluation methodology proposals from standardization bodies: the full buffer and the finite buffer traffic models. The results show that a gradient scheduling algorithm is...

    Provided By Springer

  • White Papers // Mar 2012

    Low Complexity Soft Demapping for Non-Binary LDPC Codes

    This paper focuses on non-binary wireless transmission, where "Non-binary" refers to the use of non-binary Low Density Parity Check (LDPC) codes for Forward Error Correction. The complexity of the non-binary soft demapper is addressed in particular when one non-binary Galois Field (GF) symbol spreads across multiple Quadrature Amplitude Modulation (QAM)...

    Provided By Springer

  • White Papers // Mar 2012

    Overview of Enabling Technologies for 3GPP LTE-Advanced

    As the Long Term Evolution (LTE) standard comes to an end, 3rd Generation Partnership Project is discussing further evolution of the LTE to meet the international mobile telecommunications advanced requirements, which is referred to as LTE-Advanced (LTE release 10 and beyond). This paper first presents the network infrastructure of the...

    Provided By Springer

  • White Papers // Sep 2011

    CRLBs for WSNs Localization in NLOS Environment

    Determination of Cramer-Rao Lower Bound (CRLB) as an optimality criterion for the problem of localization in Wireless Sensor Networks (WSNs) is a very important issue. Currently, CRLBs have been derived for Line-Of-Sight (LOS) situation in WSNs. However, one of major problems for accurate localization in WSNs is Non-Line-Of-Sight (NLOS) propagation....

    Provided By Springer

  • White Papers // Jul 2011

    Design of Zone-Based Bandwidth Management Scheme in IEEE 802.16 Multi-Hop Relay Networks

    IEEE 802.16 Wireless Network technology is a hot research issue in recent years. It provides wider coverage of radio and higher speed wireless access, and Quality-of-Service plays an important part in the standard. For mobile multihop wireless network, IEEE 802.16j/MR network not only can supply large area wireless deployment, but...

    Provided By Springer

  • White Papers // Aug 2011

    Distributed Wireless Information Flow Allocation in Multiple Access Networks

    The authors present a general framework for distributed wireless information flow allocation problem in multiple access networks, where the End Users (EUs) can seek wireless flows from multiple Access Points (APs). They aim to minimize the power consumption while satisfying each EU's minimum data rate requirement but not violating peak...

    Provided By Springer

  • White Papers // Jul 2011

    Ubiquitous Robust Communications for Emergency Response Using Multi-Operator Heterogeneous Networks

    A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust...

    Provided By Springer

  • White Papers // Jun 2011

    Two-Round Contributory Group Key Exchange Protocol for Wireless Network Environments

    With the popularity of group-oriented applications, secure group communication has recently received much attention from cryptographic researchers. A Group Key Exchange (GKE) protocol allows that participants cooperatively establish a group key that is used to encrypt and decrypt transmitted messages. Hence, GKE protocols can be used to provide secure group...

    Provided By Springer

  • White Papers // Jul 2011

    Accuracy of Depolarization and Delay Spread Predictions Using Advanced Ray-Based Modeling in Indoor Scenarios

    This paper investigates the prediction accuracy of an advanced deterministic propagation model in terms of channel depolarization and frequency selectivity for indoor wireless propagation. In addition to specular reflection and diffraction, the developed ray tracing tool considers penetration through dielectric blocks and/or diffuse scattering mechanisms. The sensitivity and prediction accuracy...

    Provided By Springer

  • White Papers // Jul 2011

    An Orthogonal Spectrum Sharing Scheme for Wireless Sensor Networks

    It is not economically viable to allocate a dedicated spectrum band to Wireless Sensor Networks (WSNs). Moreover, sharing a spectrum band with incumbent (primary) system compromises the reliability and performance of both the systems due to interference from one system to another. In this paper, the authors address this limitation...

    Provided By Springer

  • White Papers // Jun 2011

    Quality of Service Implications of Power Control and Multiuser Detection-Based Cross-Layer Design

    In order to allow for dense spatial reuse in wireless ad hoc networks, multiple access interference must be dealt with. This calls for advanced physical layer techniques, such as MultiUser Detection (MUD) or power control. However, these techniques can only be efficiently applied to ad hoc networks when they are...

    Provided By Springer

  • White Papers // Jul 2011

    Vector Perturbation Based Adaptive Distributed Precoding Scheme With Limited Feedback for CoMP Systems

    A downlink adaptive distributed precoding scheme is proposed for Coordinated Multi-Point (CoMP) transmission systems. The serving Base Station (BS) obtains the optimal precoding vector via user feedback. Meanwhile, the precoding vector of each coordinated BS is determined by adaptive gradient iteration according to the perturbation vector and the adjustment factor...

    Provided By Springer

  • White Papers // Jun 2011

    Low Complexity Antenna Selection for V-BLAST Systems With OSIC Detection

    Multiple-Input Multiple-Output (MIMO) systems have an advantage of spectral efficiency compared to single-input single-output systems, which means that the MIMO systems have significantly higher data throughput. The VBLAST (Vertical Bell Laboratories Layered Space Time) scheme is a popular transceiver structure which has relatively good performance. In the V-BLAST scheme, Ordered...

    Provided By Springer

  • White Papers // Jul 2011

    State of the Art Baseband DSP Platforms for Software Defined Radio: A Survey

    Software Defined Radio (SDR) is an innovative approach which is becoming a more and more promising technology for future mobile handsets. Several proposals in the field of embedded systems have been introduced by different universities and industries to support SDR applications. This paper presents an overview of current platforms and...

    Provided By Springer

  • White Papers // Jul 2011

    Binary De Bruijn Sequences for DS-CDMA Systems: Analysis and Results

    Code Division Multiple Access (CDMA) using Direct Sequence (DS) spread spectrum modulation provides multiple access capability essentially thanks to the adoption of proper sequences as spreading codes. The ability of a DSCDMA receiver to detect the desired signal relies to a great extent on the auto-correlation properties of the spreading...

    Provided By Springer

  • White Papers // Mar 2012

    An Economic Perspective of Message-Dropping Attacks in Peer-to-Peer Overlays

    Peer-to-peer networks have many advantageous security properties, including decentralization, natural load-balancing, and data replication. However, one disadvantage of decentralization is its exclusion of any central authority who can detect and evict malicious peers from the network. It is therefore, relatively easy to sustain distributed denial-of-service attacks against these networks; malicious...

    Provided By Springer

  • White Papers // Sep 2011

    A Mobile and Portable Trusted Computing Platform

    The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, the authors propose a mobile...

    Provided By Springer

  • White Papers // Nov 2011

    Location Based Spectrum Sensing Evaluation in Cognitive Radio Networks

    This paper addresses the problem of spectrum sensing over fading channel, in which a licensee and multiple unlicensed users coexist and operate in the licensed channel in a local area. The authors derive the overall average probabilities of detection and false alarm by jointly taking the fading and the location...

    Provided By Springer

  • White Papers // Oct 2011

    Clustering-Based Routing for Top-K Querying in Wireless Sensor Networks

    A large-scale Wireless Sensor Networks (WSNs) can be deployed for top-k querying applications. There are many top-k querying algorithms which are based on traditional routing approaches. In this paper, the authors proposed a Clustering-based Routing for Top-k Querying (CRTQ) in WSNs to save the energy consumption and extend the network...

    Provided By Springer

  • White Papers // Sep 2011

    Cooperative Localization in Wireless Ad Hoc and Sensor Networks Using Hybrid Distance and Bearing (angle of Arrival) Measurements

    This paper provides the graphical properties which can ensure unique localizability in cooperative networks with hybrid distance and bearing (angle of arrival) measurements. Furthermore, within the networks satisfying these graphical properties, this paper identifies further sets of conditions so that the associated computational complexity becomes linear in the number of...

    Provided By Springer

  • White Papers // Sep 2011

    On the Feasibility of a Channel-Dependent Scheduling for the SC-FDMA in 3GPP-LTE (Mobile Environment) Based on a Prioritizedbifacet Hungarian Method

    The authors propose a methodology based on the prioritization and opportunistic reuse of the optimization algorithm known as Hungarian method for the feasible implementation of a channel-dependent scheduler in the long-term evolution uplink (single carrier frequency division multiple access system). This proposal aims to offer a solution to the third...

    Provided By Springer

  • White Papers // Sep 2011

    DRO: Domain-Based Route Optimization Scheme for Nested Mobile Networks

    The NEtwork MObility (NEMO) basic support protocol is designed to support NEMO management, and to ensure communication continuity between nodes in mobile networks. However, in nested mobile networks, NEMO suffers from the pinball routing problem, which results in long packet transmission delays. To solve the problem, the authors propose a...

    Provided By Springer

  • White Papers // Oct 2011

    Adaptive QoS Provision for IEEE 802.16e BWA Networks Based on Cross-Layer Design

    This paper proposes an integrated framework for adaptive QoS provision in IEEE 802.16e broadband wireless access networks based on cross-layer design. On one hand, an efficient Admission Control (AC) algorithm is proposed along with a semi-reservation scheme to guarantee the connection-level QoS. First, to guarantee the service continuity for handoff...

    Provided By Springer

  • White Papers // Sep 2011

    Channel Length Assisted Symbol Synchronization for OFDM Systems in Multipath Fading Channels

    Despite the promising role of Orthogonal Frequency-Division Multiplexing (OFDM) technology in communication systems, its synchronization in multipath fading channels remains an important and challenging issue. This paper describes a novel synchronization algorithm that exploits channel length information for use in OFDM systems. A timing function that can identify the ISI-free...

    Provided By Springer

  • White Papers // Sep 2011

    A Cross-Layer Resource Allocation Scheme for Spatial Multiplexing-Based MIMO-OFDMA Systems

    The authors investigate the resource allocation problem for the downlink of a Multiple-Input Multiple-Output Orthogonal Frequency Division Multiple Access (MIMO-OFDMA) system. The sum rate maximization itself cannot cope with fairness among users. Hence, they address this problem in the context of the utility-based resource allocation presented in earlier papers. This...

    Provided By Springer

  • White Papers // Sep 2011

    DSC and Universal Bit-Level Combining for HARQ Systems

    This paper proposes a Dempster-Shafer theory based combining scheme for Single-Input Single-Output (SISO) systems with Hybrid Automatic Retransmission reQuest (HARQ), referred to as DSC, in which two methods for soft information calculations are developed for EquiProbable (EP) and Non-Equiprobable (NEP) sources, respectively. One is based on the distance from the...

    Provided By Springer

  • White Papers // Oct 2011

    Multihop Relaying and Multiple Antenna Techniques: Performance Trade-Offs in Cellular Systems

    Two very important and active areas of wireless research are multihop relaying and multiple antenna techniques. Wireless multihop relaying can increase the aggregate network data capacity and improve coverage of cellular systems by reducing path loss, mitigating shadowing, and enabling spatial reuse. In particular, multihop relaying can improve the throughput...

    Provided By Springer

  • White Papers // Sep 2011

    PKIS: Practical Keyword Index Search on Cloud Datacenter

    This paper highlights the importance of the interoperability of the encrypted DB in terms of the characteristics of DB and efficient schemes. Although most prior researches have developed efficient algorithms under the provable security, the authors do not focus on the interoperability of the encrypted DB. In order to address...

    Provided By Springer

  • White Papers // Sep 2011

    A Review on Synchronous CDMA Systems: Optimum Overloaded Codes, Channel Capacity, and Power Control

    This paper is a review on important issues related to Code-Division Multiple-Access (CDMA) systems such as channel capacity, power control, and optimum codes; specifically, the authors consider optimum overloaded codes that achieve errorless transmission in the absence of noise for the binary and non-binary cases. A survey of lower and...

    Provided By Springer

  • White Papers // Aug 2011

    An OFDMA Resource Allocation Algorithm Based on Coalitional Games

    This paper investigates a fair adaptive resource management criterion (in terms of transmit powers and subchannel assignment) for the uplink of an orthogonal frequency-division multiple access network, populated by mobile users with constraints in terms of target data rates. The inherent optimization problem is tackled with the analytical tools of...

    Provided By Springer

  • White Papers // Jun 2011

    Coherence Time-Based Cooperative MAC Protocol for Wireless Ad Hoc Networks

    In this paper, the authors address the goal of achieving performance gains under heavy-load and fast fading conditions. CoopMACI protocol proposed in Proceedings of the IEEE International Conference on Communications (ICC), Seoul, Korea, picks either direct path or relay path based on rate comparison to enhance average throughput and delay...

    Provided By Springer