GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference最新文献

筛选
英文 中文
IBI Cancellation Based on Limited Channel Feedback for OFDM Systems over Channels with Large Delay Spreads 基于有限信道反馈的OFDM系统大时延信道IBI抵消
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5426165
Xia Wang, Geoffrey Y. Li, Hongjie Hu, L. Qin, A. Soong
{"title":"IBI Cancellation Based on Limited Channel Feedback for OFDM Systems over Channels with Large Delay Spreads","authors":"Xia Wang, Geoffrey Y. Li, Hongjie Hu, L. Qin, A. Soong","doi":"10.1109/GLOCOM.2009.5426165","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426165","url":null,"abstract":"While cyclic prefix (CP) is no larger than the delay span of wireless channels in an orthogonal frequency division multiplexing (OFDM) system, inter-block interference (IBI) and inter-carrier interference (ICI) will occur and the performance of the system will be deteriorated. If OFDM is designed with long enough CP, the efficiency of OFDM modulation is significantly reduced. To effectively mitigate interference over channel with large delay spreads, pre-processing approaches at transmitters based on full channel state information (CSI) have been proposed. However, feeding full CSI back will occupy significant bandwidth and is impractical sometimes. Therefore, pre-processing optimization exploiting limited CSI feedback is investigated in this paper. An pre-processing optimization approaches for IBI and ICI mitigation has been developed and tested. Computer simulation result shows that the proposed optimization algorithm can effectively cancel IBI and ICI over channels with large delay spreads and significantly improve the performance for OFDM systems.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124947308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI 有限CSI下多分支合作分集网络的最优/次最优检测
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425456
Peng Liu, Il Kim
{"title":"Optimum/Sub-Optimum Detection for Multi-Branch Cooperative Diversity Networks with Limited CSI","authors":"Peng Liu, Il Kim","doi":"10.1109/GLOCOM.2009.5425456","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425456","url":null,"abstract":"We study the optimum maximum-likelihood (ML) detection and sub-optimum detection with limited channel state information (CSI) for a multi-branch dual-hop cooperative diversity network which consists of a source, multiple relays, and a destination without a direct source-destination path. With the limited CSI, the signalling overhead at each relay is reduced by 50%. We first derive the optimum ML detection with the limited CSI, which involves numerical integral evaluations. To reduce the computational complexity, we then propose a closed-form suboptimum detection rule. It is demonstrated that the proposed sub-optimum detection rule performs almost identically to the optimum ML detection when the non-Gaussianity in the added noise component dominates.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Radio-Aware Scheduler for WiMAX Systems Based on Time-Utility Function and Game Theory 基于时间效用函数和博弈论的WiMAX系统无线电感知调度
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425581
R. Garroppo, S. Giordano, D. Iacono
{"title":"Radio-Aware Scheduler for WiMAX Systems Based on Time-Utility Function and Game Theory","authors":"R. Garroppo, S. Giordano, D. Iacono","doi":"10.1109/GLOCOM.2009.5425581","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425581","url":null,"abstract":"The paper presents a scheduling algorithm for WiMAX systems, which exploits Time-Utility Functions (TUFs) and game theory. The scheduling decision is performed by means of two steps: the intra-class scheduling step and the interclass scheduling step. In the first one, each user exploits TUFs to choice the packets to transmit according to QoS requirements. In the second one, the scheduler exploits the game theory to select a specific game solution that provides more or less fairness among the users that have to be served. The available physical network resources (i.e. slots) are taken into account as a constraint to the scheduling decision. The proposed scheduling algorithm follows a cross-layer approach that takes into account application requirements by means of TUFs and physical Channel State Information (CSI) of each user. Several game solutions are compared by means of simulation results in terms of user fairness, user throughput, packet delay and packet expiration rate. The TUFs introduction is also evaluated comparing the different applications performance.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123195112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Block Diagonalization in the MIMO Broadcast Channel with Delayed CSIT 具有延迟CSIT的MIMO广播信道中的块对角化
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5426132
Jun Zhang, J. Andrews, R. Heath
{"title":"Block Diagonalization in the MIMO Broadcast Channel with Delayed CSIT","authors":"Jun Zhang, J. Andrews, R. Heath","doi":"10.1109/GLOCOM.2009.5426132","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5426132","url":null,"abstract":"This paper investigates the impact of delayed channel state information at the transmitter (CSIT) on the MIMO broadcast channel with block diagonalization (BD) precoding. First, an upper bound for the achievable throughput is provided, which shows that BD is more robust to imperfect CSIT than zeroforcing precoding as it has fewer inter-user interfering streams. Due to residual inter-user interference, the throughput of BD still saturates at high SNR, which motivates switching between single-user and multi-user precoding. An accurate closed-form approximation is derived for the achievable throughput of the BD system, which provides guidance on the preferred transmission technique for a given scenario.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123511836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems 大规模RFID系统的随机多通道询问算法
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425452
Hamed Mohsenian Rad, V. Shah-Mansouri, V. Wong, R. Schober
{"title":"Randomized Multi-Channel Interrogation Algorithm for Large-Scale RFID Systems","authors":"Hamed Mohsenian Rad, V. Shah-Mansouri, V. Wong, R. Schober","doi":"10.1109/GLOCOM.2009.5425452","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425452","url":null,"abstract":"A radio frequency identification (RFID) system consists of a set of readers and several objects, equipped with small computer chips, called tags. In a dense RFID system, where several readers are placed together to improve the read rate and correctness, readers and tags can frequently experience packet collision. A common approach to avoid collision is to use a distinct frequency channel for interrogation for each reader. Various multi-channel anti-collision protocols have been proposed for RFID readers. However, due to their heuristic nature, most algorithms may not fully utilize the achievable system performance. In this paper, we develop an optimization-based distributed randomized multi-channel interrogation algorithm, called FDFA, for large-scale RFID systems. For this purpose, we develop elaborate models for reader-to-tag and reader-to-reader collision problems. FDFA algorithm is guaranteed to find a local optimum of a max-min fair resource allocation problem to balance the processing load among readers. Simulation results show that FDFA has a significantly better performance than the existing heuristic algorithms in terms of the number of successful interrogations. It also better utilizes the frequency spectrum.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Packet Coding Performance with Correlated Fading and Shadowing 基于相关衰落和阴影的分组编码性能
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425780
M. Papaleo, R. Firrincieli, G. Corazza, A. Vanelli-Coralli
{"title":"Packet Coding Performance with Correlated Fading and Shadowing","authors":"M. Papaleo, R. Firrincieli, G. Corazza, A. Vanelli-Coralli","doi":"10.1109/GLOCOM.2009.5425780","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425780","url":null,"abstract":"Providing low-latency high-quality data services to mobile terminals has become a mandatory requirement for all mobile broadband standards. Therefore, effective countermeasures against mobile channel impairments, like small- and large-scale fading, are of the utmost importance whenever traditional physical layer channel codes do not provide sufficient resilience or request too much hardware resources. Among the possible countermeasures, the paper investigates the application of packet layer coding, which basically consists in applying forward error control techniques at upper layer (UL-FEC). In the paper the UL-FEC decoder performance analytical model already developed by authors is generalized and extended to include nonperiodic shadowing and small-scale fading. Analytical results are then validated through numerical simulation considering a real application scenario.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123752726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew 隐形IP前缀劫持:不要贪多嚼不破
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425977
Christian McArthur, Mina Guirguis
{"title":"Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew","authors":"Christian McArthur, Mina Guirguis","doi":"10.1109/GLOCOM.2009.5425977","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425977","url":null,"abstract":"In prefix hijacking, an Autonomous System (AS) advertises routes for prefixes that are owned by another AS, and ends up hijacking traffic that is intended to the owner. While misconfigurations and/or misunderstandings of policies are the likely reasons behind the majority of those incidents, malicious incidents have also been reported. Recent works have focused on malicious scenarios that aim to maximize the amount of hijacked traffic from all ASes, without considering scenarios where the attacker is aiming to avoid detection. In this paper, we expose a new class of prefix hijacking that is stealthy in nature. The idea is to craft path(s) - of tunable lengths - that deceive only a small subset of ASes. By finely tuning the degree to which ASes are effected, the attacker can handle the hijacked traffic while the victimized AS would not observe a major reduction in its incoming traffic that would raise an alarm. We give upper bounds on the impact of those attacks via simulations on real BGP Internet announcements obtained from Route-Views. We discuss shortcomings in current proposed defense mechanisms against attackers which can falsify traceroute replies. We also present a defense mechanism against stealthy prefix hijacking attacks.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Beamforming in Multiuser Multi-Relay Networks with Guaranteed QoS 具有保证QoS的多用户多中继网络中的分布式波束形成
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425247
D. Nguyen, Ha H. Nguyen, Tung T. Pham
{"title":"Distributed Beamforming in Multiuser Multi-Relay Networks with Guaranteed QoS","authors":"D. Nguyen, Ha H. Nguyen, Tung T. Pham","doi":"10.1109/GLOCOM.2009.5425247","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425247","url":null,"abstract":"This paper considers optimal distributed beamforming designs in a multi-relay network with multiple sources and multiple destinations. It is assumed that all source-destination pairs operate in orthogonal channels to avoid inter-user interference at the destinations. The distributed beamforming designs are carried out to minimize the sum relay power with guaranteed quality of service (QoS) in terms of signal-to-noise-ratio (SNR) at the destinations. Considered are optimization problems with and without per-relay power constraints. Although the two optimization problems can be readily transformed into convex second-order conic programs (SOCPs), the paper proposes simple and fast iterative algorithms to efficiently solve them.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125559736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Multi-Window Spectrum Sensing of Unsynchronized OFDM Signal at Very Low SNR 极低信噪比下不同步OFDM信号的多窗频谱检测
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425957
Cong Wang, Xianbin Wang, Hao Li, P. Ho
{"title":"Multi-Window Spectrum Sensing of Unsynchronized OFDM Signal at Very Low SNR","authors":"Cong Wang, Xianbin Wang, Hao Li, P. Ho","doi":"10.1109/GLOCOM.2009.5425957","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425957","url":null,"abstract":"Reliable spectrum sensing in low signal-to-noise ratio (SNR) condition is one of the major technical challenges in cognitive radio network. In this paper, we propose a robust spectrum sensing algorithm for unsynchronized low SNR OFDM signal by mitigating the impacts of time and frequency offsets with multiple processing time window and sliding frequency correlator, respectively. In addition, considering that the noise's statistics are unknown to the devices and varying over time, our proposed algorithm is based on a ratio threshold and hence it is not sensitive to the noise power level. Our theoretical and simulation results show that this algorithm works effectively at very low SNR, while being insensitive to time and frequency offsets, and requires no information of the noise's statistics.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic Routing of Connections with Known Duration in WDM Networks WDM网络中已知持续时间连接的动态路由
GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference Pub Date : 2009-11-30 DOI: 10.1109/GLOCOM.2009.5425391
Diego Lucerna, M. Tornatore, B. Mukherjee, A. Pattavina
{"title":"Dynamic Routing of Connections with Known Duration in WDM Networks","authors":"Diego Lucerna, M. Tornatore, B. Mukherjee, A. Pattavina","doi":"10.1109/GLOCOM.2009.5425391","DOIUrl":"https://doi.org/10.1109/GLOCOM.2009.5425391","url":null,"abstract":"Recently, new solutions for automatized management in optical networks promise to allow customers to specify on-demand the terms of the Service Level Agreement (SLA) to be guaranteed by the service provider. In this paper we show that is possible to design a highly efficient load balancing algorithm, called RABBIT, for the dynamic provisioning of connections exploiting the knowledge, among the other Service Level Specifications (SLS), of the connections duration. The core idea of RABBIT consists in routing connections based on the transient probability of future-link congestion, that can be estimated with higher precision when the knowledge of connections durations is given. So, we introduce a time-dependent link-weight assignment that evaluates future link congestions probability based on the transient analysis of the Markovian model of the link, making it computationally feasible by means of an effective approximation technique. By means of an extensive set of simulative experiments, we compare our approach to other traditional holding-time agnostic, yet efficient, dynamic routing algorithms. We consider different performance metrics, among which the Blocking Probability (BP), in a wavelength-convertible WDM mesh network scenario. For a typical US nationwide network, RABBIT obtains savings on BP of up to 20% for practical scenarios.","PeriodicalId":405624,"journal":{"name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信