3rd Annual Communication Networks and Services Research Conference (CNSR'05)最新文献

筛选
英文 中文
A new analytic approach to evaluation of packet error rate in wireless networks 一种新的无线网络分组错误率分析方法
R. Khalili, Kave Salamatian
{"title":"A new analytic approach to evaluation of packet error rate in wireless networks","authors":"R. Khalili, Kave Salamatian","doi":"10.1109/CNSR.2005.14","DOIUrl":"https://doi.org/10.1109/CNSR.2005.14","url":null,"abstract":"Bit error rate (BER) and packet error rate (PER) are important quality of service parameters for wireless network. Most of researches in QoS have been devoted to the analysis of BER which gives insight to the mean behavior of the wireless network. However the mean behavior is not sufficient for PER evaluation and more precise characterization of the error process is needed. Residual errors at the output of physical layer are not uniformly distributed. This is due to error correcting mechanism used at physical layer as well as the correlation induced by the memory existing in fading channels. Not taking into account the correlation in the error process and assuming for example that errors are uniformly distributed, as done in most of the published paper in wireless networking, lead to gross overestimation of PER. This over-estimation can go to tenfold factors as will be shown in this paper. In a previous paper we presented a new analytic formula for predicting packet error rate in wireless networks where convolutional codes are used jointly with Viterbi decoder over an AWGN channel. The approach was based on a precise analysis of the error process at the output of the Viterbi decoder. This formula was shown to precisely predict the PER as a function of convolutional code parameter and SNR over the AWGN channel. In this paper we extend the result obtained for the AWGN channel to the case of fading channel under block fading hypothesis. A closed form formulas approximation for derivation of PER in fading channel is proposed and it is shown that it give very tight prediction for the PER.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
ENCAST: energy-critical node aware spanning tree for sensor networks 传感器网络的能量关键节点感知生成树
Shoudong Zou, I. Nikolaidis, J. Harms
{"title":"ENCAST: energy-critical node aware spanning tree for sensor networks","authors":"Shoudong Zou, I. Nikolaidis, J. Harms","doi":"10.1109/CNSR.2005.32","DOIUrl":"https://doi.org/10.1109/CNSR.2005.32","url":null,"abstract":"Spanning trees rooted at a sink node are often employed for data collection in sensor networks. The node's double task of sensing and forwarding traffic from other nodes results in energy depletion which is dependent on the constructed spanning tree. The approach taken in this paper is to extend the lifetime of a sensor network by judiciously recalculating the data collection tree to adjust it pro-actively before nodes fail due to total energy depletion. The proposed scheme attempts to make energy-critical nodes leaf nodes, or, as a last resort, to balance the traffic load handled by them. Additionally, an exponentially decaying threshold is used for adaptively characterizing nodes as critical. Simulations demonstrate significantly improved network lifetime but also point to the need to carefully set the thresholds for characterizing nodes as critical.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115393732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A MIMO parameter estimation model taking Ricean fading channel and stochastically uncorrelated signals into account. Part II. Asymptotically efficient estimators 考虑Ricean衰落信道和随机不相关信号的MIMO参数估计模型。第二部分。渐近有效估计量
Bamrung Tau Sieskul, S. Jitapunkul
{"title":"A MIMO parameter estimation model taking Ricean fading channel and stochastically uncorrelated signals into account. Part II. Asymptotically efficient estimators","authors":"Bamrung Tau Sieskul, S. Jitapunkul","doi":"10.1109/CNSR.2005.12","DOIUrl":"https://doi.org/10.1109/CNSR.2005.12","url":null,"abstract":"The purpose of this paper is twofold; to demonstrate parameter estimation possibility of MIMO model and to propose an asymptotically efficient approach for estimating three channel parameters such as, nominal direction, angular spread and rice factor. Manipulating the estimation in efficient manner, the benchmark and the proposed estimators are based on weighted least squares (WLS) criteria. Rather than invoking the sample covariance estimate in ordinary WLS criterion, the proposed approach makes use of structured covariance estimate for computing the weight matrix. The nonparametric estimate presented here in is the way to constrain the array covariance matrix to hold the Toeplitz structure so that the residual due to imposing the structured weight matrix is less than that provided by employing the ordinary sample covariance. As a matter of course, this leads to more advantage for parameter estimation, particularly, in non-asymptotic region of temporal snapshot number. Numerical examples are conducted to validate the superiority in non-asymptotic situations.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122030951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Connectivity with static transmission range in vehicular ad hoc networks 车辆自组织网络中具有静态传输范围的连通性
M. Artimy, W. Phillips, W. Robertson
{"title":"Connectivity with static transmission range in vehicular ad hoc networks","authors":"M. Artimy, W. Phillips, W. Robertson","doi":"10.1109/CNSR.2005.29","DOIUrl":"https://doi.org/10.1109/CNSR.2005.29","url":null,"abstract":"Connectivity in mobile wireless ad-hoc networks is maintained by setting the transmission range so that a node can establish a link to any other node in the network either directly or over multiple hops. Many analytical and experimental studies have focused on determining the minimum transmission range (MTR) that provides connectivity while minimizing transceiver power for various levels of node densities. In this paper, we determine, using simulations, the MTR in vehicular ad hoc networks (VANET) of various road configurations. We show that in 1-lane, 2-lane, and 2-way roads, MTR values confirm the analytical relations developed in the literature for 1-dimensional networks until density increases beyond a critical vehicle density. Moreover, where traffic jams are forming at intersections, MTR values are not affected by the change in vehicle density. Therefore, a large static transmission range must be chosen in order to keep the network connected in all traffic scenarios.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130453727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
A framework for self-management of hybrid wireless networks using autonomic computing principles 基于自主计算原理的混合无线网络自我管理框架
Chong Shen, D. Pesch, J. Irvine
{"title":"A framework for self-management of hybrid wireless networks using autonomic computing principles","authors":"Chong Shen, D. Pesch, J. Irvine","doi":"10.1109/CNSR.2005.8","DOIUrl":"https://doi.org/10.1109/CNSR.2005.8","url":null,"abstract":"The dramatic increase in the number of mobile subscribers has put a significant resource and service provisioning strain on current cellular networks in particular in terms of multimedia and high-data rate service provision. Hybrid wireless networks, which is a novel scalable and adaptive wireless network architecture utilizing a mixture of cellular and ad hoc multi-hop routing, facilitates cellular network design with small cell systems without having to wire a large number of base stations into a core network. However, this new network design has drawbacks in terms of routing complexity, radio resource heterogeneity and network infrastructure design growth. Traditional centralised system administration methods become too inflexible to result in a manageable cellular system. A recently introduced concept-autonomic computing, based on stimulation from biological systems, may provide a remedy to the state of unmanageability. The Autonomic computing paradigm, recently coined autonomic communications, when applied to communication systems and networks, enables self-management, which is composed of self-protecting, self-healing, self-configuring and self-optimizing components. This self-management is not necessarily novel as technologies such as neural networks, fuzzy logic, genetic algorithms and evolutional methods have already been proposed to facilitate limited self-configuration and self-optimization when embedded with cellular and ad hoc networks. However, a structure or framework has been lacking so far. In this paper we propose an architecture for a framework of autonomic computing based on policies for a hybrid wireless network and investigate the merits of each of its functions.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Neural network based channel estimation and performance evaluation of time varying multipath satellite channel 基于神经网络的时变多径卫星信道估计与性能评价
Q. Rahman, M. Ibnkahla, M. Bayoumi
{"title":"Neural network based channel estimation and performance evaluation of time varying multipath satellite channel","authors":"Q. Rahman, M. Ibnkahla, M. Bayoumi","doi":"10.1109/CNSR.2005.44","DOIUrl":"https://doi.org/10.1109/CNSR.2005.44","url":null,"abstract":"Neural network (NN) based channel estimation method has been proposed for identifying the parameters of a nonlinear time varying satellite channel. A multipath time-varying Ricean-fading channel has been considered in the analysis for a down link scenario. To study the flexibility and performance of the proposed method, the channel has been varied over a reasonable range of Doppler frequencies, and the estimation for each case has been made by employing 16-quadrature amplitude modulation (16-QAM) technique. Back propagation (BP) and natural gradient (NG) algorithms have been studied for the channel identification technique. Based on different learning rates and normalized Doppler frequencies, a comparative analysis between the algorithms has been provided. Finally, a NN maximum likelihood sequence estimator (NN-MLSE) based receiver has been studied for the addressed system. Simulation results show that the NN-MLSE receiver performs close to that of the ideal MLSE receiver in terms of symbol error rate (SER).","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133167015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Optimization of three dimensional retrodirective arrays 三维反向定向阵列的优化
B. Feng, Z. Chen
{"title":"Optimization of three dimensional retrodirective arrays","authors":"B. Feng, Z. Chen","doi":"10.1109/CNSR.2005.46","DOIUrl":"https://doi.org/10.1109/CNSR.2005.46","url":null,"abstract":"Retrodirective antenna systems have presented a very attractive feature of transmitting their RF energy back in the directions of their received signals. Much of the research efforts have so far been focused on electronic parts of the systems rather than on antenna array configurations they used. In this paper, we present a numerical scheme that can optimize the retrodirective array performance by finding optimum positioning of the array elements. In it, the surfaces which the array elements are to be placed on are discretized into a numerical grid of meshes. An objective function is then constructed by taking into account of array directivity (D), side lobe level (SLL) and half power beam width (HPBW). The optimum positioning of array elements are then found by searching for minimum objective function values when elements are placed over different grid points. The simulation results are presented to demonstrate the effectiveness of the method.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123745229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing access control for presence-based services 管理基于状态的服务的访问控制
A. Dersingh, R. Liscano, A. Jost
{"title":"Managing access control for presence-based services","authors":"A. Dersingh, R. Liscano, A. Jost","doi":"10.1109/CNSR.2005.40","DOIUrl":"https://doi.org/10.1109/CNSR.2005.40","url":null,"abstract":"This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challenges. The first is to form a communication group based on an association such as physical location. The second is to dynamically create and enforce a security policy by using service description and the user association. We validate this approach by implementing a prototype based on the IETF SIP/SIMPLE presence protocol for observing a user's context to form an association group. In addition the security policy is dynamically created and enforced on a packet filtering firewall for blocking unauthorized access.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128774760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A presentation specification language for adaptive Web systems 用于自适应Web系统的表示规范语言
S. H. Sadat-Mohtasham, A. Ghorbani
{"title":"A presentation specification language for adaptive Web systems","authors":"S. H. Sadat-Mohtasham, A. Ghorbani","doi":"10.1109/CNSR.2005.15","DOIUrl":"https://doi.org/10.1109/CNSR.2005.15","url":null,"abstract":"Adaptive Web systems apply page synthesis techniques to increase the flexibility of adaptation. Page synthesis process uses various system models, such as concept model, user model and presentation model to generate the final presentation. The authors of an adaptive Web system need to express these models in a simple and reusable way. In this paper, a new language is proposed for presentation description to be used in an adaptive Web systems framework. The syntax of the language as well as its semantics has been defined and the implementation of a compiler for the language is discussed.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A self-managed predicate-based cache 基于谓词的自管理缓存
Yaomin Fu, P. Bodorik, D. Jutla
{"title":"A self-managed predicate-based cache","authors":"Yaomin Fu, P. Bodorik, D. Jutla","doi":"10.1109/CNSR.2005.16","DOIUrl":"https://doi.org/10.1109/CNSR.2005.16","url":null,"abstract":"Caching is used externally to DB systems to cache data retrieved from a DB in order to reduce delays associated with the network data transfer and to reduce the load on the DB servers. In-memory predicate caches manage data in units that are described by queries' predicates. A self-managed cache utilizes only information that it can garner from queries issued by the applications and replies from the server. We use multiple buffers in a self-managed memory predicate cache. Management of storage is performed using classification of queries based on their join predicates-each class of queries is assigned a separate buffer. We propose an allocation strategy to assign the limited memory space to the multiple buffers and evaluate the proposed scheme using the TPC-W benchmark.","PeriodicalId":166700,"journal":{"name":"3rd Annual Communication Networks and Services Research Conference (CNSR'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134521046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信