2010 International Conference on Communications and Mobile Computing最新文献

筛选
英文 中文
Block-Wise MIMO Detection with Near-Optimal Performance and Low Complexity 具有接近最优性能和低复杂度的分块MIMO检测
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.55
Rongrong Qian, Tao Peng, Yuan Qi, Wenbo Wang
{"title":"Block-Wise MIMO Detection with Near-Optimal Performance and Low Complexity","authors":"Rongrong Qian, Tao Peng, Yuan Qi, Wenbo Wang","doi":"10.1109/CMC.2010.55","DOIUrl":"https://doi.org/10.1109/CMC.2010.55","url":null,"abstract":"A block-wise MIMO detection scheme which reduces the search space greatly comparing with the ML detection but still achieves the near-optimal performance is proposed. The specific feature of the proposed detection scheme is that, the search space is reduced as much as possible before performing the exhaustive search, in other words, the required search space that is large enough to guarantee the acceptable performance is obtained in a search space pre-determination stage. Based on the output of ZF equalization, the metrics used for determining the reduced search space, which are the posterior probabilities in this paper, can be computed. According to the simulation results, the near-optimal performance can be obtained while the detection complexity is far less than that of the ideal ML detection.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134218518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trusted Channels with Password-Based Authentication and TPM-Based Attestation 具有基于密码的身份验证和基于tpm的认证的可信通道
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.232
Lingli Zhou, Zhenfeng Zhang
{"title":"Trusted Channels with Password-Based Authentication and TPM-Based Attestation","authors":"Lingli Zhou, Zhenfeng Zhang","doi":"10.1109/CMC.2010.232","DOIUrl":"https://doi.org/10.1109/CMC.2010.232","url":null,"abstract":"Trusted channels establish trust of endpoint by linking endpoint configuration information to secure channels. Many trusted channels for client-server applications are established based on Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols. Two existing solutions for building trusted channels are shown to be vulnerable to collusion attacks in this paper. Then we propose a protocol to establish trusted channels using password-based authenticated key exchange and TPM-based attestation. Our protocol uses an efficient but different binding approach to resist the proposed collusion attack. Furthermore, we propose an extended protocol to achieve enhanced privacy for clients.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Efficient User Scheduling Scheme for MU-MIMO Systems with Limited Feedback 有限反馈MU-MIMO系统的一种高效用户调度方案
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.148
Fang Liang, Yang Maofan, Gong Ping, Wu Weiling
{"title":"An Efficient User Scheduling Scheme for MU-MIMO Systems with Limited Feedback","authors":"Fang Liang, Yang Maofan, Gong Ping, Wu Weiling","doi":"10.1109/CMC.2010.148","DOIUrl":"https://doi.org/10.1109/CMC.2010.148","url":null,"abstract":"On the MU-MIMO broadcast channel, Per-User Unitary and Rate Control (PU2RC) as a practical design is proposed for emerging cellular standards in 3GPP LTE. Unfortunately, when the number of users is small, the performance of PU2RC would be degraded with the increase of codebook size. In this paper, we propose an efficient user scheduling scheme to overcome this defect in PU2RC by enlargement of user scheduling space. The key feature of the proposed scheme is that at the BS each user is associated with at least one codebook vectors with the help of a predetermined threshold value. Simulation results show that the proposed scheme can be efficient to solute the problem of conventional scheme in PU2RC at the small number of users.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130334088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks 认知无线网络中发射机识别的一种物理层认证方法
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.36
Caidan Zhao, Liang Xie, Xueyuan Jiang, Lianfeng Huang, Yan Yao
{"title":"A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks","authors":"Caidan Zhao, Liang Xie, Xueyuan Jiang, Lianfeng Huang, Yan Yao","doi":"10.1109/CMC.2010.36","DOIUrl":"https://doi.org/10.1109/CMC.2010.36","url":null,"abstract":"Cognitive radio (CR) was proposed as the key technologies to achieve the secondary usage of the spectrum. The security problems of CR networks have not been intensively studied, such as the primary user emulation (PUE) attacks. In this paper, we study the non-interactive security issues for wireless networks and propose a physical layer authentication approach to prevent PUE attacks in CR networks. We extract transmitter location fingerprints from the wireless medium in the multipath propagation environment. Wavelet transform is used to extract the characteristics of these fingerprints. Simulation and experiment results show that our approach can identify the PUE attackers and the legitimate primary users effectively.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115328746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Implementation of Wireless Mesh Network Protocol Research Platform 无线网状网络协议研究平台的实现
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.116
Hui Zhong, B. Zhang, Jiwei Cheng
{"title":"Implementation of Wireless Mesh Network Protocol Research Platform","authors":"Hui Zhong, B. Zhang, Jiwei Cheng","doi":"10.1109/CMC.2010.116","DOIUrl":"https://doi.org/10.1109/CMC.2010.116","url":null,"abstract":"Study of the wireless mesh network protocol, it be constructed that embedded Linux operating system platform which dedicated to the wireless mesh network protocols. The performance parameters and indexes of OLSR protocol can be experimental in different environment. Using of NET4526 embedded development board, build Linux operating system and various service needed for OLSR environment, transplant Madwifi wireless drivers and olsr services as well as routing protocols of OLSR, edit and compile the program of OLSR to achieve running wireless mesh network protocol research platform. Experimental results achieve the wireless mesh network as well as configure it in web. Multiple wireless mesh network protocol debugging platforms can be created. The use of more than 486 desktop configured to run the built Linux operating system instead of simulated experimental platform to compensate for the deficiencies caused by the deficiencies in the number of embedded platform for routing protocol.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114113038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Interconnection and Correspondence Between Relational Database and Embedded Database SQLite 关系型数据库与嵌入式数据库SQLite的互连与对应研究
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.188
Yang Xu, Hai-Yang Li
{"title":"Research on Interconnection and Correspondence Between Relational Database and Embedded Database SQLite","authors":"Yang Xu, Hai-Yang Li","doi":"10.1109/CMC.2010.188","DOIUrl":"https://doi.org/10.1109/CMC.2010.188","url":null,"abstract":"Considering agricultural product’s feature and the current sale status of China's agricultural products, our system aims to use the Heterogeneous Database Synchronization technology to achieve the goal of Synchronous communication of Embedded Database SQLite and Relational Database MySQL. The system use JDBC technology connecting to the database and use an improved method of Change Capture Technology (Triggered Scanning Method) to accelerate the speed of scanning logs and improve the rate of data synchronization. The combination of Heterogeneous Database Synchronization technology and embedded technology can promote the application of the network of agricultural products marketing information.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114266362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Online Kannada Text Transliteration System for Mobile Phones 手机联机卡纳达语文字音译系统
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.307
R. Aravindhan, G. Rathna, Vipin Gupta
{"title":"An Online Kannada Text Transliteration System for Mobile Phones","authors":"R. Aravindhan, G. Rathna, Vipin Gupta","doi":"10.1109/CMC.2010.307","DOIUrl":"https://doi.org/10.1109/CMC.2010.307","url":null,"abstract":"Transliteration system for mobile phone is an area that is always in demand given the difficulties and constraints we face in its implementation. In this paper we deal with automatic transliteration system for Kannada which has a non-uniform geometry and inter-character spacing unlike non-oriental language text like English. So it is even more a challenging problem. Working model consists of part of the process taking place on a mobile with remaining on a server. Good results are achieved.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114359975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preserving Density-Based Outlier Detection 基于隐私保护密度的离群点检测
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.274
Zaisheng Dai, Liusheng Huang, Youwen Zhu, Wei Yang
{"title":"Privacy Preserving Density-Based Outlier Detection","authors":"Zaisheng Dai, Liusheng Huang, Youwen Zhu, Wei Yang","doi":"10.1109/CMC.2010.274","DOIUrl":"https://doi.org/10.1109/CMC.2010.274","url":null,"abstract":"Outlier detection can find its tremendous applications in areas such as intrusion detection, fraud detection, and image processing. Among many outlier detection algorithms, LOF is a very important density-based algorithm in which one critical step is to find the k-distance neighbors. In some privacy preserving circumstances, the cooperation between data holders is necessary while the privacy of the participators should be guaranteed. In this paper, we focus on privacy preserving LOF. We propose a novel algorithm for privacy preserving k-distance neighbors search. Combining it with other secure multiparty computation techniques, we detect outliers by LOF in a privacy preserving way.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123207688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SINR or SLNR: In Successive User Scheduling in MU-MIMO Broadcast Channel with Finite Rate Feedback 有限速率反馈MU-MIMO广播信道中连续用户调度的SINR或SLNR
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.295
Xin Xia, Gang Wu, Shu Fang, Shaoqian Li
{"title":"SINR or SLNR: In Successive User Scheduling in MU-MIMO Broadcast Channel with Finite Rate Feedback","authors":"Xin Xia, Gang Wu, Shu Fang, Shaoqian Li","doi":"10.1109/CMC.2010.295","DOIUrl":"https://doi.org/10.1109/CMC.2010.295","url":null,"abstract":"In this paper, an SLNR-based scheduling method is proposed in the MU-MIMO broadcast channel with finite rate feedback. In the proposed scheme, a user's leakage power to others is an important factor to determine whether the user should be selected. The sum rate of the proposed SLNR scheme and the traditional SINR-based scheme are compared with different system parameter settings. Simulation results shows that the SLNR scheme is preferred mainly in the case of larger feedback bits, lower SNR region and smaller number of active users. These observations are useful in practical system design.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122949425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Blind Identification and Digital Compensation of Memory Nonlinearities for Multiband Systems 多波段系统记忆非线性的盲辨识与数字补偿
2010 International Conference on Communications and Mobile Computing Pub Date : 2010-04-12 DOI: 10.1109/CMC.2010.59
Jiang Jin, Juan Peng
{"title":"Blind Identification and Digital Compensation of Memory Nonlinearities for Multiband Systems","authors":"Jiang Jin, Juan Peng","doi":"10.1109/CMC.2010.59","DOIUrl":"https://doi.org/10.1109/CMC.2010.59","url":null,"abstract":"Memory nonlinearities exist in electronic devices or transmission links. A blind identification method is proposed to estimate the Volterra inverse of memory nonlinearities for multiband system by minimizing the strong out-of-band spurs above the preset threshold based on domain transformation and spur classification. The inverse model is employed to recover the noisy sampled signal or improve the spurious-free dynamic range of memory nonlinear system by applying post-distortion or pre-distortion compensation. It can also used as multiband digital filter with varying intermediate frequency or bandwidth. In time-varying system, the filter coefficients can be updated adaptively by iterate search. The experiment results demonstrate the effectiveness.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123640826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信