2006 1st International Symposium on Wireless Pervasive Computing最新文献

筛选
英文 中文
Periodic Spectrum Transmission for Single-Carrier Frequency-Domain Equalization Employing Space-Time Transmit Diversity 利用空时发射分集实现单载波频域均衡的周期频谱传输
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613604
H. Yoshida, T. Kuriyama, F. Maehara, F. Takahata
{"title":"Periodic Spectrum Transmission for Single-Carrier Frequency-Domain Equalization Employing Space-Time Transmit Diversity","authors":"H. Yoshida, T. Kuriyama, F. Maehara, F. Takahata","doi":"10.1109/ISWPC.2006.1613604","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613604","url":null,"abstract":"This paper presents the periodic spectrum transmission for single-carrier frequency-domain equalization (SC-FDE) employing space-time transmit diversity (STTD). The proposed scheme utilizes only even-numbered samples within a time domain data block to createa periodical spectrum which provides frequency redundancy. Frequency redundancy is used for sub-channel combining before FDE, which alleviates the loss of orthogonality caused by FDE under frequency selective fading channels. Therefore, the proposed scheme has an advantage of enhancing the overall frequency diversity benefit while keeping the space diversity benefit achieved by STTD. Computer simulation results show that the proposed scheme outperforms the typical SC-FDE using full samples over relatively severe frequency selective fading channels when applying 1-bit/sample transmission.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114489773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aspects of cellular planning for emergency and safety services in mobile WiMax networks 移动WiMax网络应急和安全服务的蜂窝规划方面
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613643
F. Velez, V. Carvalho, D. Santos, R. P. Marcos, R. Costa, P. Sebastião, A. Rodrigues
{"title":"Aspects of cellular planning for emergency and safety services in mobile WiMax networks","authors":"F. Velez, V. Carvalho, D. Santos, R. P. Marcos, R. Costa, P. Sebastião, A. Rodrigues","doi":"10.1109/ISWPC.2006.1613643","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613643","url":null,"abstract":"This work addresses cellular planning aspects for a WiMax (worldwide interoperability for microwave access) point-to-multipoint wireless network to be developed in the region of Beira Interior. It is concentrated in more detail in the district of Covilha, and, particularly, in the urban area of the city, in order to guarantee communications from the Health Science Faculty of University of Beira Interior (HSF/UBI)/ Hospital Pero da Covilha to all central urban area of the city. By having aspects related with the carrier-to-noise and carrier-to-interference ratios into account, one concluded that it is necessary to consider a cellular structure with sectorisation, and cell coverage distances around 3 km. Because this zone is very hilly, the optimization of the choice of the location for base stations is essential; the potentialities of the GIS (geographic information systems) tools were explored to optimise the existence of line of sight coverage in coverage. Future research directions regarding architectures for interoperability and mobile IP, security, and the impact of multimedia applications are also addressed.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Asymmetric multihop communication in large sensor networks 大型传感器网络中的非对称多跳通信
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613561
J. Neander, E. Hansen, M. Nolin, M. Bjorkman
{"title":"Asymmetric multihop communication in large sensor networks","authors":"J. Neander, E. Hansen, M. Nolin, M. Bjorkman","doi":"10.1109/ISWPC.2006.1613561","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613561","url":null,"abstract":"With the growing interest in wireless sensor networks, energy efficient communication infrastructures for such networks are becoming increasingly important. In this paper, we compare and simulate asymmetric and symmetric communication in sensor networks. We do this by extending LEACH, a well-known TDMA cluster-based sensor network architecture, to use asymmetric communication. The extension makes it possible to scale up the network size beyond what is feasible with LEACH and its variants LEACH-C and LEACH-F.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121705383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A distributed hybrid algorithm for broadcasting through a virtual backbone in wireless ad hoc networks 无线自组织网络中通过虚拟骨干网进行广播的一种分布式混合算法
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613595
D. Yuan
{"title":"A distributed hybrid algorithm for broadcasting through a virtual backbone in wireless ad hoc networks","authors":"D. Yuan","doi":"10.1109/ISWPC.2006.1613595","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613595","url":null,"abstract":"Ad hoc networking is one of the enabling technologies for wireless pervasive computing. We study the issue of constructing an energy-efficient virtual backbone for broadcast communication in wireless ad hoc networks. When nodes use constant and identical transmission power, energy-efficient broadcasting amounts to minimizing the backbone size. Typically, algorithms for backbone construction rely on either adding nodes to the backbone, or pruning nodes from the backbone. We present a distributed hybrid algorithm in which a node is allowed to join the backbone as well as to prune itself from the backbone. In addition, a node may perform these two types of operations repeatedly, if necessary. We present numerical experiments in which we evaluate the performance of the distributed hybrid algorithm and several other algorithms. The experiments show that our algorithm performs well in terms of constructing a backbone of small size. Moreover, the number of times that the algorithm repeats its steps before converging to a stable backbone is small in relation to backbone size.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Query Processing Mechanism Based on the Broadcast Queue for Broadcast Database Systems 广播数据库系统中基于广播队列的查询处理机制
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613667
S. Kitajima, Jing Cai, T. Terada, T. Hara, S. Nishio
{"title":"A Query Processing Mechanism Based on the Broadcast Queue for Broadcast Database Systems","authors":"S. Kitajima, Jing Cai, T. Terada, T. Hara, S. Nishio","doi":"10.1109/ISWPC.2006.1613667","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613667","url":null,"abstract":"In recent years, there has been an increasing interest in the broadcast database system, where the server periodically broadcasts contents of a database to mobile clients such as PDAs. There are three query processing methods in the broadcast database system: (i) the server processes a query and then broadcasts the query result to the client; (ii) the client stores all data that are necessary in processing the query and then processes it locally; and (iii) the server and the client collaborate in processing the query. Since the performance of each method changes according to the situation, such as the interval of query generation and the size of query results, it is difficult to decide the optimal method among them statically. In this paper, we propose a new query processing method which dynamically changes the order of queries submitted in the queue at the server and also changes processing methods for the queries according to the deadline of queries and the system situation. Our method not only improves the response time but also increases the success rate of query processing compared with the traditional methods.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123798864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhanced layer-3 handover using the layer-2 triggers 使用第二层触发器增强第三层切换
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613584
Seung-Hun Oh, Young Han Kim, Jong Hwa Lee
{"title":"Enhanced layer-3 handover using the layer-2 triggers","authors":"Seung-Hun Oh, Young Han Kim, Jong Hwa Lee","doi":"10.1109/ISWPC.2006.1613584","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613584","url":null,"abstract":"In this paper, we propose a fast layer-3 (L3) handover (HO) scheme optimized for the layer-2 (L2) triggers, which are proposed to represent the more detailed HO state of the wireless access system. Especially we define the more than one trigger which can arise during L2 HO procedure according to the dynamic state of the wireless environment, and design the new fast L3 HO scheme where the appropriate behaviors (fast HO components) are mapped into the proposed triggers reasonably. Then we combine these components in the order of occurring triggers. The analytic results show that the proposed scheme is able to be more adaptable to dynamic wireless state than the previous fast HO schemes.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124958891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blind turbo multiuser detector with unknown intercell interferences 具有未知小区间干扰的盲涡轮多用户检测器
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613650
T. Ploysuwan, P. Teekaput
{"title":"Blind turbo multiuser detector with unknown intercell interferences","authors":"T. Ploysuwan, P. Teekaput","doi":"10.1109/ISWPC.2006.1613650","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613650","url":null,"abstract":"We consider the problem of iterative blind multiuser detection for multi-input-multi-output (MIMO) systems, which consist of K uplink asynchronous DS-CDMA users and n/sub R/ receive antennae, in presence of both intra- and intercell interference. The proposed receiver typically has only the knowledge of the first spreading codes of K/sub in/ /spl les/ K users inside the cell and ignore unknown interference of K - K/sub in/ users outside the cell. The proposed schemes in this paper present two types of iterative blind receivers motivated from the concept of generalized sidelobe canceller (GSC) to separate the problem into two components one in constrained subspace (inner cell space : H/sub in/) and one orthogonal to it (unknown interference plus noise space). The knowledge of intracell channel matrix H/sub in/ is required for our algorithms. So, two types of blind channel estimation both subspace and POR (power of R) methods are used for comparative performances as channel estimation and bit error rate (BER) of iterative receiver. The proposed detectors utilize the computation of log likelihood ratios (LLRs) fed from their turbo decoders at previous iteration to blindly suppress intracell interferences and residuals interferences left by iterative process. The computations of LLRs from iterative blind multiuser detector are refined to their turbo decoders by iterative fashions.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125443311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lowest-ID with adaptive ID reassignment: a novel mobile ad-hoc networks clustering algorithm 具有自适应ID重分配的最低ID:一种新的移动自组织网络聚类算法
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613559
D. Gavalas, G. Pantziou, C. Konstantopoulos, B. Mamalis
{"title":"Lowest-ID with adaptive ID reassignment: a novel mobile ad-hoc networks clustering algorithm","authors":"D. Gavalas, G. Pantziou, C. Konstantopoulos, B. Mamalis","doi":"10.1109/ISWPC.2006.1613559","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613559","url":null,"abstract":"Clustering is a promising approach for building hierarchies and simplifying the routing process in mobile ad-hoc network environments. The main objective of clustering is to identify suitable node representatives, i.e. cluster heads (CHs), to store routing and topology information and maximize clusters stability. Traditional clustering algorithms suggest CH election exclusively based on node IDs or location information and involve frequent broadcasting of control packets, even when network topology remains unchanged. More recent works take into account additional metrics (such as energy and mobility) and optimize initial clustering. However, in many situations (e.g. in relatively static topologies) re-clustering procedure is hardly ever invoked; hence initially elected CHs soon reach battery exhaustion. Herein, we introduce an efficient distributed clustering algorithm that uses both mobility and energy metrics to provide stable cluster formations. CHs are initially elected based on the time and cost-efficient lowest-ID method. During clustering maintenance phase though, node IDs are re-assigned according to nodes mobility and energy status, ensuring that nodes with low-mobility and sufficient energy supply are assigned low IDs and, hence, are elected as CHs. Our algorithm also reduces control traffic volume since broadcast period is adjusted according to the nodes mobility pattern: we employ infrequent broadcasting for relative static network topologies, and increase broadcast frequency for highly mobile network configurations. Simulation results verify that energy consumption is uniformly distributed among network nodes and that signaling overhead is significantly decreased.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129709461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Mobile semantic data exchange in ad hoc networks using distributed profiles 使用分布式配置文件的自组织网络中的移动语义数据交换
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613649
A. Baumgart, H. Knapp, M. Schader
{"title":"Mobile semantic data exchange in ad hoc networks using distributed profiles","authors":"A. Baumgart, H. Knapp, M. Schader","doi":"10.1109/ISWPC.2006.1613649","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613649","url":null,"abstract":"Collecting relevant information from a heterogeneous set of data resources is a challenging problem. Moreover, the storage and search for semantic data is even more complex in mobile environments. In this paper we present an approach how to collect semantic information by underlying profile settings. We define several profile types and levels where the user's interests are stored. Information retrieval is then executed according to the profile settings. Distributed profiles for mobile semantic data exchange can personalize the exchanged information in business settings. This leads to effective data transmission with regard to the mobile (device) context and the business environment, the user is exposed to. Our realization of a prototype confirms the effective semantic data exchange. The evaluation of dynamic profile settings in ad hoc network scenarios verifies our approach experimentally.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A wireless service for product authentication in mobile RFID environment 一种用于移动RFID环境下产品认证的无线服务
2006 1st International Symposium on Wireless Pervasive Computing Pub Date : 2006-04-10 DOI: 10.1109/ISWPC.2006.1613660
Ju-Han Kim, Howon Kim
{"title":"A wireless service for product authentication in mobile RFID environment","authors":"Ju-Han Kim, Howon Kim","doi":"10.1109/ISWPC.2006.1613660","DOIUrl":"https://doi.org/10.1109/ISWPC.2006.1613660","url":null,"abstract":"EPC Class-1 Generation-2 UHF tags, one of radio frequency identification or RFID tag types, is expected that most companies are planning to use it in the supply chain in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It causes security vulnerabilities, in particular cloning the tags for counterfeits. In this paper, we propose design of a wireless service for product authentication which is anti-counterfeiting at application level and which can be applied to both the supply chain and forthcoming mobile RFID environment. It aims to become aware of distribution of spurious products with fake RFID tags and to provide a product authentication service to general consumers with mobile RFID devices like mobile phone or PDA which has a mobile RFID reader. We will discuss anti-counterfeiting mechanisms which are required to our proposed service and address requirements that the mechanisms should have.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信