University of South Australia

Displaying 1-37 of 37 results

  • White Papers // Jun 2012

    Progressive Authentication: Deciding When to Authenticate on Mobile Phones

    Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but then have to inconveniently authenticate every time they use the device. Rather than exploring a new authentication scheme, the...

    Provided By University of South Australia

  • White Papers // Jan 2012

    Internet Integrated MANETs Using Mobile IP

    Mobile ad hoc networks are generally considered as stand-alone networks. However, in most practical cases of ad-hoc networking, connectivity to the wider Internet may be possible via some members of the ad-hoc network. If that connectivity is made available to other members of the ad-hoc network, an interesting case of...

    Provided By University of South Australia

  • White Papers // Jan 2012

    Classification of 8PSK Mappings for BICM

    The performance of bit-interleaved coded modulation with iterative decoding is significantly influenced by the mapping of bits to the symbol constellation. A range of mappers have been suggested in the literature, however, no attempt has been made to systematically enumerate all unique mappers for a given signal constellation. In this...

    Provided By University of South Australia

  • White Papers // Jan 2012

    Error Propagation and the Achievable Throughput-Delay Trade-Off in Wireless Networks

    This paper shows that the threefold approach of spatial reuse, multi-hopping, and time division maximizes the throughput at the expense of the degrading not only the delay, but the delay-throughput trade-off itself, due to information-theoretic limits. Secondly, while the equivalence between models such as the fixed-packet-size protocol model and those...

    Provided By University of South Australia

  • White Papers // Dec 2011

    Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise

    Jammer can jeopardize the dependability of wireless networks, and jammer's position information allows the network to cope with jamming leveraging varieties of defense strategies. Thus, in this paper, the authors address the problem of localizing jammer. Prior work relies on indirect measurements derived from jamming effects, which makes it difficult...

    Provided By University of South Australia

  • White Papers // Dec 2011

    Evaluation of Users' Perspective on VoIP's Security Vulnerabilities

    Voice over Internet Protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities. A VoIP system may face either an...

    Provided By University of South Australia

  • White Papers // Nov 2011

    On the Detection of Hidden Terrorist Cells Immersed in Peer-to-Peer Networks

    Hidden terrorist cells in high dimensional communications networks arise when terrorists camouflage connectivity to appear randomly connected to the background network. The authors investigate hidden network detectability when the background network does not support terrorist activities. Using two September 11 terrorist networks as the test bed and a network measure...

    Provided By University of South Australia

  • White Papers // Jun 2011

    IT Governance: On the Way Through Developing and Integrating Effectively

    For modern businesses with high levels of technology, IT governance frameworks with guidelines reflect the responsible actions of the Board and executive management and also maintain the organisation's fit and well-being. However, these responsible groups must ensure the organisations are in a risk-free situation and avoid negative influences which may...

    Provided By University of South Australia

  • White Papers // Mar 2011

    MIMO ARQ With Multi-Bit Feedback: Outage Analysis

    The authors study the asymptotic outage performance of INcremental Redundancy Automatic-Repeat-Request (INR-ARQ) transmission over Multiple-Input Multiple-Output (MIMO) block-fading channels with discrete input constellations. They first show that transmission with random codes using a discrete signal constellation across all transmit antennas achieves the optimal outage diversity given by the Singleton bound....

    Provided By University of South Australia

  • White Papers // Mar 2011

    Corporate Social Disclosure In Bangladesh: A Study Of The Financial Sector

    Corporate social disclosure is essential to generate a favorable investment climate and to attract foreign investment, especially in developing countries. This paper investigates corporate social reporting in the financial sector in Bangladesh. In this paper, the authors conducted content analysis of corporate social reporting by listed finance companies in Bangladesh....

    Provided By University of South Australia

  • White Papers // Jan 2011

    Optimal Data Compression and Filtering: The Case of Infinite Signal Sets

    The authors present a theory for optimal filtering of infinite sets of random signals. There are several new distinctive features of the proposed approach. First, they provide a single optimal filter for processing any signal from a given infinite signal set. Second, the filter is presented in the special form...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Throughput and Latency of Acyclic Erasure Networks With Feedback in a Finite Buffer Regime

    The exact Markov modeling analysis of erasure networks with finite buffers is an extremely hard problem due to the large number of states in the system. In such networks, packets are lost due to either link erasures or blocking by the full buffers. In this paper, the authors propose a...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Study of Throughput and Latency in Finite-Buffer Coded Networks

    Exact queuing analysis of erasure networks with network coding in a finite buffer regime is an extremely hard problem due to the large number of states in the network. In such networks, packets are lost due to either link erasures or due to blocking due to full buffers. In this...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Security Analysis of Session Initiation Protocol - A Methodology Based on Coloured Petri Nets

    In recent years Voice over Internet Protocol (VoIP) has become a popular multimedia application over the Internet. At the same time critical security issues in VoIP have started to emerge. The Session Initiation Protocol (SIP) is a predominant signaling protocol for VoIP. It is used to establish, maintain and terminate...

    Provided By University of South Australia

  • White Papers // Dec 2010

    What Are You Looking For: Identification of Remnant Communication Artefacts in Physical Memory!

    Law enforcement has sound methods for investigating and obtaining data about targets that are using traditional communication services such as the Public Switched Telephone Network. The Internet as a data transfer medium is a vastly different paradigm to that of traditional telephony networks. Information about targets using Internet communication technologies...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Anomaly Detection Over User Profiles for Intrusion Detection

    Intrusion Detection Systems (IDS) have often been used to analyze network traffic to help network administrators quickly identify and respond to intrusions. These detection systems generally operate over the entire network, identifying "Anomalies" atypical of the network's normal collective user activities. The authors show that anomaly detection could also be...

    Provided By University of South Australia

  • White Papers // Nov 2010

    Lossy Broadcasting in Two-Way Relay Networks With Common Reconstructions

    The broadcast phase (downlink transmission) of the two-way relay network is studied in the source coding and joint source-channel coding settings. The rates needed for reliable communication are characterised for a number of special cases including: small distortions, deterministic distortion measures, and jointly Gaussian sources with quadratic distortion measures. The...

    Provided By University of South Australia

  • White Papers // Oct 2010

    Fixed-Priority Scheduling to Reduce Both the Dynamic and Leakage Energy on Variable Voltage Processors

    With ever-scaling VLSI technology, the leakage is becoming an increasingly serious concern when addressing the power consumption problem for next-generation real-time embedded systems. Dynamic Voltage Scaling (DVS) is efficient in reducing the dynamic energy consumption of a CMOS processor. However, methods that employ DVS without considering the leakage current are...

    Provided By University of South Australia

  • White Papers // Sep 2010

    The Influence of Error Propagation on the Capacity of Wireless Networks

    In this paper, it is shown that the achievable throughput capacity of wireless networks suffers from a fundamental limitation under finite node resource constraints. It is shown that this reduction results from a fundamental lower bound on the error performance of the wireless-channel model. In particular, the problem is addressed...

    Provided By University of South Australia

  • White Papers // Aug 2010

    Unifying Analysis and Design of Rate-Compatible Concatenated Codes

    An improved concatenated code structure, which generalizes parallel and serially concatenated convolutional codes is presented and investigated. The structure is ideal for designing low-complexity rate-compatible code families with good performance in both the waterfall and error floor regions. As an additional feature, the structure provides a unified analysis and design...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Throughput Performance of Network-Coded Multicast in an Intermittently-Connected Network

    Consider an intermittently-connected mobile network consisting of n relay nodes, a single source node, and m destination nodes exhibiting a stochastic model for mobility. Each mobile relay node is also equipped with finite storage. The authors seek to analyze the performance of Multicast enabled by Network Coding in such a...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Accountability And Sustainability: Davidsons And Taylors Means To Engage The World

    Many accountants and accounting theorists believe that objective accounts of the external world are possible. This paper critiques such arguments via an examination of the ethical assumptions underpinning social and environmental accounting. In the early 1990s, David Solomons and Tony Tinker debated the idea that accounting was a fair, just...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Audit And Governance In Islamic Banks: Selection And Training Of Shariah Advisors

    Since its commercialization in 1970's Islamic finance has grown at a rapid pace. While there have been many studies dealing with the features of Islamic financial products, not much attention has been paid to the governance of Shari'ah (Islamic law), and the role of the Shari'ah advisors in Islamic financial...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Performance On The Right Hand Side: Organizational Performance As An Independent Variable

    Organizational performance in most survey-based management control research appears on the "Left hand side of the equation" as a dependent variable. The objective typically being to identify, predict or model the effects of management control variables presumed to be causally antecedent. However, the effects of organizational performance acting as an...

    Provided By University of South Australia

  • White Papers // Mar 2010

    Computer Security Meets Digital and Network Forensics: New Ideas in Forensically Sound Adaptive Security

    Substantial developments in security for computers and networks have happened in recent times. This progress has been marked by an increase in the range of novel protocols, novel encryption algorithms and smarter firewalls amongst other characteristics. Given the increasing requirements by the law, the paper suggests that security systems need...

    Provided By University of South Australia

  • White Papers // Jan 2010

    REIT Investment Decision Making: A Multi Step Process?

    Real Estate Investment Trusts (REITs) are multi-billion dollar property investment vehicles, well established in various countries around the world. Despite their size and prevalence, relatively little research has been undertaken into the property investment decision making processes adopted by REITs. With the aim of identifying whether the property investment decision...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading-Part I: Fundamental Limits

    Spectral efficiency for asynchronous Code Division Multiple Access (CDMA) with random spreading is calculated in the large system limit allowing for arbitrary chip waveforms and frequency-flat fading. Signal to Interference and Noise Ratios (SINRs) for suboptimal receivers, such as the linear Minimum Mean Square Error (MMSE) detectors, are derived. The...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading - Part II: Design Criteria

    Totally asynchronous Code-Division Multiple-Access (CDMA) systems are addressed. In Part I, the fundamental limits of asynchronous CDMA systems are analyzed in terms of spectral efficiency and SINR at the output of the optimum linear detector. The focus of Part II is the design of low-complexity implementations of linear multiuser detectors...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading-Part II: Design Criteria

    Totally asynchronous Code-Division Multiple-Access (CDMA) systems are addressed. In Part I, the fundamental limits of asynchronous CDMA systems are analyzed in terms of spectral efficiency and SINR at the output of the optimum linear detector. The focus of Part II is the design of low-complexity implementations of linear multiuser detectors...

    Provided By University of South Australia

  • White Papers // Aug 2009

    Current Research in the Bluetooth Security Architecture

    This paper aims to provide an overall understanding of the Bluetooth specification security architecture and its shortcomings. A technical foundation of the overall security architecture will be reviewed, primarily focusing on the standard's implementation of device authentication and encryption. The report then provides a brief review of the Security Modes...

    Provided By University of South Australia

  • White Papers // Jun 2009

    Compression and Filtering of Random Signals Under Constraint of Variable Memory

    The authors study a new technique for optimal data compression subject to conditions of causality and different types of memory. The technique is based on the assumption that some information about compressed data can be obtained from a solution of the associated problem without constraints of causality and memory. This...

    Provided By University of South Australia

  • White Papers // Apr 2009

    Decoding Network Codes by Message Passing

    In this paper, the authors show how to construct a factor graph from a network code. This provides a systematic framework for decoding using message passing algorithms. The proposed message passing decoder exploits knowledge of the underlying communications network topology to simplify decoding. For uniquely decodeable linear network codes on...

    Provided By University of South Australia

  • White Papers // Mar 2009

    Towards Data Quality and Data Mining Using Constraints in XML

    Quality data is necessary for different data mining techniques and reversely, data mining techniques can be utilized to measure quality of data. Data mining and data quality issues got much attention for relational data in past. But, as a massive amount of data is being stored and represented over the...

    Provided By University of South Australia

  • White Papers // Feb 2009

    RFID Based IT Asset Tracking: Options for South Australia Water

    Adoption of RFID technology in Australia is only recently escalating, due mainly to the new standards that have emerged which have more acceptance as opposed to the previous ones which were application specific and had narrow usability. This paper provides an application of RFID technology in tracking IT assets of...

    Provided By University of South Australia

  • White Papers // Jan 2009

    Network Coding Capacity: A Functional Dependence Bound

    Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors ?, which is known to be an extremely hard problem. On the other hand, calculating the...

    Provided By University of South Australia

  • White Papers // Jan 2009

    Towards a Definition of Referential Integrity Constraints for XML

    In relational data model, two important referential integrity constraints is Inclusion Dependency (ID) and Foreign Key (FK). In last decade, with the growing use of XML as data representation and exchange format over the web, the issue of integrity constraints in XML has received great importance to the database community....

    Provided By University of South Australia

  • White Papers // Oct 2006

    Fixed-Priority Scheduling for Reducing Both the Dynamic and Leakage Energy on Variable Voltage Processors

    With ever-scaling VLSI technology, the leakage is increasingly becoming a serious concern when addressing the power consumption problem for next-generation real-time embedded systems. Dynamic Voltage Scaling (DVS) is efficient in reducing the dynamic energy consumption of a CMOS processor. However, methods that employ DVS without considering the leakage current are...

    Provided By University of South Australia

  • White Papers // Mar 2009

    Towards Data Quality and Data Mining Using Constraints in XML

    Quality data is necessary for different data mining techniques and reversely, data mining techniques can be utilized to measure quality of data. Data mining and data quality issues got much attention for relational data in past. But, as a massive amount of data is being stored and represented over the...

    Provided By University of South Australia

  • White Papers // Aug 2009

    Current Research in the Bluetooth Security Architecture

    This paper aims to provide an overall understanding of the Bluetooth specification security architecture and its shortcomings. A technical foundation of the overall security architecture will be reviewed, primarily focusing on the standard's implementation of device authentication and encryption. The report then provides a brief review of the Security Modes...

    Provided By University of South Australia

  • White Papers // Mar 2010

    Computer Security Meets Digital and Network Forensics: New Ideas in Forensically Sound Adaptive Security

    Substantial developments in security for computers and networks have happened in recent times. This progress has been marked by an increase in the range of novel protocols, novel encryption algorithms and smarter firewalls amongst other characteristics. Given the increasing requirements by the law, the paper suggests that security systems need...

    Provided By University of South Australia

  • White Papers // Jan 2009

    Network Coding Capacity: A Functional Dependence Bound

    Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors ?, which is known to be an extremely hard problem. On the other hand, calculating the...

    Provided By University of South Australia

  • White Papers // Apr 2009

    Decoding Network Codes by Message Passing

    In this paper, the authors show how to construct a factor graph from a network code. This provides a systematic framework for decoding using message passing algorithms. The proposed message passing decoder exploits knowledge of the underlying communications network topology to simplify decoding. For uniquely decodeable linear network codes on...

    Provided By University of South Australia

  • White Papers // Nov 2010

    Lossy Broadcasting in Two-Way Relay Networks With Common Reconstructions

    The broadcast phase (downlink transmission) of the two-way relay network is studied in the source coding and joint source-channel coding settings. The rates needed for reliable communication are characterised for a number of special cases including: small distortions, deterministic distortion measures, and jointly Gaussian sources with quadratic distortion measures. The...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading - Part II: Design Criteria

    Totally asynchronous Code-Division Multiple-Access (CDMA) systems are addressed. In Part I, the fundamental limits of asynchronous CDMA systems are analyzed in terms of spectral efficiency and SINR at the output of the optimum linear detector. The focus of Part II is the design of low-complexity implementations of linear multiuser detectors...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Throughput and Latency of Acyclic Erasure Networks With Feedback in a Finite Buffer Regime

    The exact Markov modeling analysis of erasure networks with finite buffers is an extremely hard problem due to the large number of states in the system. In such networks, packets are lost due to either link erasures or blocking by the full buffers. In this paper, the authors propose a...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Study of Throughput and Latency in Finite-Buffer Coded Networks

    Exact queuing analysis of erasure networks with network coding in a finite buffer regime is an extremely hard problem due to the large number of states in the network. In such networks, packets are lost due to either link erasures or due to blocking due to full buffers. In this...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Accountability And Sustainability: Davidsons And Taylors Means To Engage The World

    Many accountants and accounting theorists believe that objective accounts of the external world are possible. This paper critiques such arguments via an examination of the ethical assumptions underpinning social and environmental accounting. In the early 1990s, David Solomons and Tony Tinker debated the idea that accounting was a fair, just...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Performance On The Right Hand Side: Organizational Performance As An Independent Variable

    Organizational performance in most survey-based management control research appears on the "Left hand side of the equation" as a dependent variable. The objective typically being to identify, predict or model the effects of management control variables presumed to be causally antecedent. However, the effects of organizational performance acting as an...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Audit And Governance In Islamic Banks: Selection And Training Of Shariah Advisors

    Since its commercialization in 1970's Islamic finance has grown at a rapid pace. While there have been many studies dealing with the features of Islamic financial products, not much attention has been paid to the governance of Shari'ah (Islamic law), and the role of the Shari'ah advisors in Islamic financial...

    Provided By University of South Australia

  • White Papers // Jan 2011

    Optimal Data Compression and Filtering: The Case of Infinite Signal Sets

    The authors present a theory for optimal filtering of infinite sets of random signals. There are several new distinctive features of the proposed approach. First, they provide a single optimal filter for processing any signal from a given infinite signal set. Second, the filter is presented in the special form...

    Provided By University of South Australia

  • White Papers // Jun 2009

    Compression and Filtering of Random Signals Under Constraint of Variable Memory

    The authors study a new technique for optimal data compression subject to conditions of causality and different types of memory. The technique is based on the assumption that some information about compressed data can be obtained from a solution of the associated problem without constraints of causality and memory. This...

    Provided By University of South Australia

  • White Papers // Jan 2009

    Towards a Definition of Referential Integrity Constraints for XML

    In relational data model, two important referential integrity constraints is Inclusion Dependency (ID) and Foreign Key (FK). In last decade, with the growing use of XML as data representation and exchange format over the web, the issue of integrity constraints in XML has received great importance to the database community....

    Provided By University of South Australia

  • White Papers // Jan 2010

    REIT Investment Decision Making: A Multi Step Process?

    Real Estate Investment Trusts (REITs) are multi-billion dollar property investment vehicles, well established in various countries around the world. Despite their size and prevalence, relatively little research has been undertaken into the property investment decision making processes adopted by REITs. With the aim of identifying whether the property investment decision...

    Provided By University of South Australia

  • White Papers // Mar 2011

    Corporate Social Disclosure In Bangladesh: A Study Of The Financial Sector

    Corporate social disclosure is essential to generate a favorable investment climate and to attract foreign investment, especially in developing countries. This paper investigates corporate social reporting in the financial sector in Bangladesh. In this paper, the authors conducted content analysis of corporate social reporting by listed finance companies in Bangladesh....

    Provided By University of South Australia

  • White Papers // Feb 2009

    RFID Based IT Asset Tracking: Options for South Australia Water

    Adoption of RFID technology in Australia is only recently escalating, due mainly to the new standards that have emerged which have more acceptance as opposed to the previous ones which were application specific and had narrow usability. This paper provides an application of RFID technology in tracking IT assets of...

    Provided By University of South Australia

  • White Papers // Jul 2010

    Throughput Performance of Network-Coded Multicast in an Intermittently-Connected Network

    Consider an intermittently-connected mobile network consisting of n relay nodes, a single source node, and m destination nodes exhibiting a stochastic model for mobility. Each mobile relay node is also equipped with finite storage. The authors seek to analyze the performance of Multicast enabled by Network Coding in such a...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading-Part II: Design Criteria

    Totally asynchronous Code-Division Multiple-Access (CDMA) systems are addressed. In Part I, the fundamental limits of asynchronous CDMA systems are analyzed in terms of spectral efficiency and SINR at the output of the optimum linear detector. The focus of Part II is the design of low-complexity implementations of linear multiuser detectors...

    Provided By University of South Australia

  • White Papers // Nov 2009

    Asynchronous CDMA Systems With Random Spreading-Part I: Fundamental Limits

    Spectral efficiency for asynchronous Code Division Multiple Access (CDMA) with random spreading is calculated in the large system limit allowing for arbitrary chip waveforms and frequency-flat fading. Signal to Interference and Noise Ratios (SINRs) for suboptimal receivers, such as the linear Minimum Mean Square Error (MMSE) detectors, are derived. The...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Security Analysis of Session Initiation Protocol - A Methodology Based on Coloured Petri Nets

    In recent years Voice over Internet Protocol (VoIP) has become a popular multimedia application over the Internet. At the same time critical security issues in VoIP have started to emerge. The Session Initiation Protocol (SIP) is a predominant signaling protocol for VoIP. It is used to establish, maintain and terminate...

    Provided By University of South Australia

  • White Papers // Dec 2010

    What Are You Looking For: Identification of Remnant Communication Artefacts in Physical Memory!

    Law enforcement has sound methods for investigating and obtaining data about targets that are using traditional communication services such as the Public Switched Telephone Network. The Internet as a data transfer medium is a vastly different paradigm to that of traditional telephony networks. Information about targets using Internet communication technologies...

    Provided By University of South Australia

  • White Papers // Dec 2010

    Anomaly Detection Over User Profiles for Intrusion Detection

    Intrusion Detection Systems (IDS) have often been used to analyze network traffic to help network administrators quickly identify and respond to intrusions. These detection systems generally operate over the entire network, identifying "Anomalies" atypical of the network's normal collective user activities. The authors show that anomaly detection could also be...

    Provided By University of South Australia

  • White Papers // Nov 2011

    On the Detection of Hidden Terrorist Cells Immersed in Peer-to-Peer Networks

    Hidden terrorist cells in high dimensional communications networks arise when terrorists camouflage connectivity to appear randomly connected to the background network. The authors investigate hidden network detectability when the background network does not support terrorist activities. Using two September 11 terrorist networks as the test bed and a network measure...

    Provided By University of South Australia

  • White Papers // Dec 2011

    Evaluation of Users' Perspective on VoIP's Security Vulnerabilities

    Voice over Internet Protocol (VoIP) represents a major newish trend in telecommunications and an alternative to traditional phone systems. VoIP uses IP networks and therefore inherits their vulnerabilities. Adding voice traffic to IP networks complicates security issues and introduces a range of vulnerabilities. A VoIP system may face either an...

    Provided By University of South Australia

  • White Papers // Jun 2011

    IT Governance: On the Way Through Developing and Integrating Effectively

    For modern businesses with high levels of technology, IT governance frameworks with guidelines reflect the responsible actions of the Board and executive management and also maintain the organisation's fit and well-being. However, these responsible groups must ensure the organisations are in a risk-free situation and avoid negative influences which may...

    Provided By University of South Australia

  • White Papers // Jan 2012

    Internet Integrated MANETs Using Mobile IP

    Mobile ad hoc networks are generally considered as stand-alone networks. However, in most practical cases of ad-hoc networking, connectivity to the wider Internet may be possible via some members of the ad-hoc network. If that connectivity is made available to other members of the ad-hoc network, an interesting case of...

    Provided By University of South Australia

  • White Papers // Aug 2010

    Unifying Analysis and Design of Rate-Compatible Concatenated Codes

    An improved concatenated code structure, which generalizes parallel and serially concatenated convolutional codes is presented and investigated. The structure is ideal for designing low-complexity rate-compatible code families with good performance in both the waterfall and error floor regions. As an additional feature, the structure provides a unified analysis and design...

    Provided By University of South Australia

  • White Papers // Sep 2010

    The Influence of Error Propagation on the Capacity of Wireless Networks

    In this paper, it is shown that the achievable throughput capacity of wireless networks suffers from a fundamental limitation under finite node resource constraints. It is shown that this reduction results from a fundamental lower bound on the error performance of the wireless-channel model. In particular, the problem is addressed...

    Provided By University of South Australia

  • White Papers // Jan 2012

    Classification of 8PSK Mappings for BICM

    The performance of bit-interleaved coded modulation with iterative decoding is significantly influenced by the mapping of bits to the symbol constellation. A range of mappers have been suggested in the literature, however, no attempt has been made to systematically enumerate all unique mappers for a given signal constellation. In this...

    Provided By University of South Australia

  • White Papers // Mar 2011

    MIMO ARQ With Multi-Bit Feedback: Outage Analysis

    The authors study the asymptotic outage performance of INcremental Redundancy Automatic-Repeat-Request (INR-ARQ) transmission over Multiple-Input Multiple-Output (MIMO) block-fading channels with discrete input constellations. They first show that transmission with random codes using a discrete signal constellation across all transmit antennas achieves the optimal outage diversity given by the Singleton bound....

    Provided By University of South Australia

  • White Papers // Jan 2012

    Error Propagation and the Achievable Throughput-Delay Trade-Off in Wireless Networks

    This paper shows that the threefold approach of spatial reuse, multi-hopping, and time division maximizes the throughput at the expense of the degrading not only the delay, but the delay-throughput trade-off itself, due to information-theoretic limits. Secondly, while the equivalence between models such as the fixed-packet-size protocol model and those...

    Provided By University of South Australia

  • White Papers // Jun 2012

    Progressive Authentication: Deciding When to Authenticate on Mobile Phones

    Mobile users are often faced with a trade-off between security and convenience. Either users do not use any security lock and risk compromising their data, or they use security locks but then have to inconveniently authenticate every time they use the device. Rather than exploring a new authentication scheme, the...

    Provided By University of South Australia

  • White Papers // Oct 2010

    Fixed-Priority Scheduling to Reduce Both the Dynamic and Leakage Energy on Variable Voltage Processors

    With ever-scaling VLSI technology, the leakage is becoming an increasingly serious concern when addressing the power consumption problem for next-generation real-time embedded systems. Dynamic Voltage Scaling (DVS) is efficient in reducing the dynamic energy consumption of a CMOS processor. However, methods that employ DVS without considering the leakage current are...

    Provided By University of South Australia

  • White Papers // Oct 2006

    Fixed-Priority Scheduling for Reducing Both the Dynamic and Leakage Energy on Variable Voltage Processors

    With ever-scaling VLSI technology, the leakage is increasingly becoming a serious concern when addressing the power consumption problem for next-generation real-time embedded systems. Dynamic Voltage Scaling (DVS) is efficient in reducing the dynamic energy consumption of a CMOS processor. However, methods that employ DVS without considering the leakage current are...

    Provided By University of South Australia

  • White Papers // Dec 2011

    Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise

    Jammer can jeopardize the dependability of wireless networks, and jammer's position information allows the network to cope with jamming leveraging varieties of defense strategies. Thus, in this paper, the authors address the problem of localizing jammer. Prior work relies on indirect measurements derived from jamming effects, which makes it difficult...

    Provided By University of South Australia