Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)最新文献

筛选
英文 中文
MP&A Mixed Decoding Algorithm for LDPC Codes LDPC码的MP&A混合解码算法
C. L. Ho, Hsu-Hung Yang
{"title":"MP&A Mixed Decoding Algorithm for LDPC Codes","authors":"C. L. Ho, Hsu-Hung Yang","doi":"10.1109/CNSR.2007.43","DOIUrl":"https://doi.org/10.1109/CNSR.2007.43","url":null,"abstract":"Because the message passing (MP) method is suboptimum and optimum solutions are not guaranteed, we present a hybrid decoding method by combing the MP and the A* methods. We first make comparison between the MP and A* method and then show their combined performance. Using the hybrid structure, its decoding gain is the same as that of A* method. Moreover, decoding complexity is slightly greater than that of MP one. For codeword length 96 bits and coding rate 1/2 and BER = 10-5 , the hybrid structure outperforms 1.4 dB decoding gain than the MP method. This improvement only required 1% received sequences to be transferred to A* decoding block. Our newly designed hybrid structure can solve both of the high decoding gain and low decoding complexity while it has the ability to yield the optimum solution.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128326403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive IEEE 802.11 Scheme for Voice and Data Services in Wireless LANs 无线局域网中语音和数据业务的自适应IEEE 802.11方案
Changle Li, J. Almhana, Jiandong Li, Zikuan Liu, R. McGorman
{"title":"An Adaptive IEEE 802.11 Scheme for Voice and Data Services in Wireless LANs","authors":"Changle Li, J. Almhana, Jiandong Li, Zikuan Liu, R. McGorman","doi":"10.1109/CNSR.2007.12","DOIUrl":"https://doi.org/10.1109/CNSR.2007.12","url":null,"abstract":"In this paper we propose an adaptive transmission algorithm over an IEEE 802.11 WLAN that supports integrated voice and data services, where data traffic is transmitted with the Distributed Coordination Function (DCF), while voice transmission is carried out with the Point Coordination Function (PCF). The proposed algorithm defines an updating period. At the beginning of each period and based on the transmission statistics of the previous one, our algorithm adjusts the protocol parameters to improve data transmission without compromising voice transmissions, i.e., maximum allowable delay is respected. To show the efficiency of the proposed algorithm, we compare it with a previous work we did in Li et al. (2006). The simulation results are provided and show the advantage of using such algorithm in term of protocol performance.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133695973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Topology Optimization for Backbone Wireless Mesh Networks 骨干无线网状网络的拓扑优化
Mani Malekesmaeili, M. Shiva, M. Soltan
{"title":"Topology Optimization for Backbone Wireless Mesh Networks","authors":"Mani Malekesmaeili, M. Shiva, M. Soltan","doi":"10.1109/CNSR.2007.67","DOIUrl":"https://doi.org/10.1109/CNSR.2007.67","url":null,"abstract":"Nowadays, wireless access is experiencing and developing a new technology called, wireless mesh networks (WMNs). Many wireless standards like IEEE 802.11,15, and 16 have included this technology, as it proposes many facilities and enhancements to wireless access schemes. High throughput, and low delay that are the essential requirements of a backbone WMN, as well as any other network infrastructure, demand new algorithms and metrics other than the ones used in conventional ad-hoc networks. In this paper, we introduce a new metric for Topology Control (TC) in WMNs that aims at maximizing the capacity and throughput of these networks. This metric, namely collision domain (CD) load is shown to be superior to conventional metrics, like distance or interference, used in ad-hoc networks. Applications of this metric are shown to have increases up to 150% and even more in the maximum download rate compared to the conventional metrics.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Improved Remote User Authentication Scheme Preserving User Anonymity 改进的远程用户认证方案,保护用户匿名性
Lanlan Hu, Yixian Yang, Xinxin Niu
{"title":"Improved Remote User Authentication Scheme Preserving User Anonymity","authors":"Lanlan Hu, Yixian Yang, Xinxin Niu","doi":"10.1109/CNSR.2007.38","DOIUrl":"https://doi.org/10.1109/CNSR.2007.38","url":null,"abstract":"Most of smart card-based remote authentication schemes proposed didn 't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many e-commerce applications. In 2004, Das et al. proposed a remote authentication scheme to authenticate users while preserving the users' anonymity. Their scheme adopted dynamic identification to achieve this function. Then in 2005, Chien and Chen pointed out Das et al. 's scheme fails to protect the user's anonymity and proposed a new remote authentication scheme preserving user anonymity. This paper, however, will demonstrate that Chien and Chen's scheme has also some problems: it cannot resist strong masquerading server/user attack, insider attack, denial of service attack and restricted replay attack; it also has the problem of slow wrong password detection. Therefore, an improved scheme is proposed to conquer these problems.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
Antenna Load Mismatch Effects in EER-Based Transmitters for Digital Audio Broadcasting 基于eer的数字音频广播发射机中的天线负载失配效应
S. Melvin, Manmeet S. Goldy, J. Ilow
{"title":"Antenna Load Mismatch Effects in EER-Based Transmitters for Digital Audio Broadcasting","authors":"S. Melvin, Manmeet S. Goldy, J. Ilow","doi":"10.1109/CNSR.2007.16","DOIUrl":"https://doi.org/10.1109/CNSR.2007.16","url":null,"abstract":"As terrestrial audio broadcasting is moving from the analog to the digital era, there is an interest from the broadcasting industry to re-examine the existing amplitude modulation (AM) and frequency modulation (FM) hardware. The objective is to identify potential problems which may arise when using digital signals with the existing systems. In particular, this paper analyzes the effects that an antenna impedance mismatch has on the spectrum regrowth of a hybrid analog-digital AM signal at the passband. The interest in this research stems from the difficulty in controlling the antenna impedance as it may vary with weather conditions e.g., icing on the antenna. Spectrum regrowth results are first presented in this paper when modelling the antenna load as a resonant circuit for both series and shunt load topologies when the inverse Chebychev reconstruction filter is deployed in the envelope elimination and restoration (EER) amplifier. Different selectivity factors, Q, for antenna resonant circuit are considered. Following this, attempts to design more robust filters are offered that would be of the same order and would provide improved spectral performance when working with the antenna impedance deviations from the nominal resistive value of 50 Omega.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116721709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols 以安全为中心的PLEASE与现有GKM协议的比较研究
V. R. Uthariaraj, T. C. Rangarajan, S. Srinivasan
{"title":"A Security-Centric Comparative Study of PLEASE with Existing GKM Protocols","authors":"V. R. Uthariaraj, T. C. Rangarajan, S. Srinivasan","doi":"10.1109/CNSR.2007.7","DOIUrl":"https://doi.org/10.1109/CNSR.2007.7","url":null,"abstract":"Since group communication is an upcoming technology, research on secure multicasting has been attracting wide attention. In this context, the already proven PLEASE, p' LEAder SElection model has much to contribute to the security and key management of the multicast group communication. In this paper, the PLEASE model is mathematically compared with other well-known group key management protocols like GKMP, DEP, Iolus etc, in terms of security related parameters. The IGKMP has been implemented in NS-2 and compared with PLEASE model graphically.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems 自适应Web系统的通用用户建模服务器
Jie Zhang, A. Ghorbani
{"title":"GUMSAWS: A Generic User Modeling Server for Adaptive Web Systems","authors":"Jie Zhang, A. Ghorbani","doi":"10.1109/CNSR.2007.35","DOIUrl":"https://doi.org/10.1109/CNSR.2007.35","url":null,"abstract":"In this paper we focus on the architecture, design and implementation of a generic user modeling server for adaptive web systems (GUMSAWS), reaching the goals of generality, extendability and replaceability. GUMSAWS acts as a centralized user modeling server to assist several adaptive Web systems (possibly in different domains) concurrently. It incrementally builds up user models, provides functions of storing, updating and deleting entries in user profiles, and maintains consistency of user models. Our system is also able to infer missing entries in user profiles from different information sources, including direct information, groups information, association rules and general facts. We further evaluate its inference performance within the context of e-commerce. Experimental results show that the average accuracy of inferring user missing property values from different information resources is found to be almost 70%. We also use a personalized electronic news system to demonstrate the example of our system in use.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology 基于星盘方法的关键基础设施系统风险分析
E. Bagheri, A. Ghorbani
{"title":"Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology","authors":"E. Bagheri, A. Ghorbani","doi":"10.1109/CNSR.2007.56","DOIUrl":"https://doi.org/10.1109/CNSR.2007.56","url":null,"abstract":"Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smooth conduct of the society has made their role more and more prominent. A failure in any of these important components of todays industrial society can well affect the lives of millions of people. For this reason it is required that proper risk analysis and management models be devised so that the vulnerabilities, threats, and risks of/to critical infrastructure systems are exhaustively understood and revealed. In this paper, we show how the Astrolabe risk analysis methodology can be exploited to perform a comprehensive risk analysis process on any critical infrastructure system. The strength of the Astrolabe risk analysis methodology is that it focuses on the deviation of a system from its original goals. It also incorporates information from multiple sources through the notion of perspectives.","PeriodicalId":266936,"journal":{"name":"Fifth Annual Conference on Communication Networks and Services Research (CNSR '07)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116851823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信