


default search action
ICC 2009: Dresden, Germany
- Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009. IEEE 2009

Mobility in Sensor Networks
- Anand Oka, Lutz H.-J. Lampe:

Distributed Scalable Multi-Target Tracking with a Wireless Sensor Network. 1-6 - Waleed Alsalih, Hossam S. Hassanein

, Selim G. Akl:
Routing to a Mobile Data Collector on a Predefined Trajectory. 1-5 - Anna Abbagnale, Emanuele Cipollone, Francesca Cuomo

:
A Case Study for Evaluating IEEE 802.15.4 Wireless Sensor Network Formation with Mobile Sinks. 1-5 - Neelofer Tamboli, Mohamed F. Younis:

Coverage-Aware Connectivity Restoration in Mobile Sensor Networks. 1-5 - Sonia A. Hashish

, Ahmed Karmouch:
Mobility-Based Generic Infrastructure for Large Scale Sensor Network Architecture. 1-6
Localization and Synchronization
- Chengqun Wang, Jiming Chen, Youxian Sun, Xuemin (Sherman) Shen

:
Wireless Sensor Networks Localization with Isomap. 1-5 - Qasim M. Chaudhari, Erchin Serpedin

, Yik-Chung Wu
:
Improved Estimation of Clock Offset in Sensor Networks. 1-4 - Li Liu, Yang Xiao

, Jingyuan Zhang:
A Linear Time Synchronization Algorithm for Underwater Wireless Sensor Networks. 1-5 - Chia-Hung Chang, Wanjiun Liao

:
Revisiting Relative Location Estimation in Wireless Sensor Networks. 1-5 - Giacomo Binazzi, Luigi Chisci

, Francesco Chiti
, Romano Fantacci
, Simone Menci:
Localization of a Swarm of Mobile Agents via Unscented Kalman Filtering. 1-5
Optimization through Selective Engagement
- Vinay Joseph

, Vinod Sharma, Utpal Mukherji:
Optimal Sleep-Wake Policies for an Energy Harvesting Sensor Node. 1-6 - Ben Harrison, Alan Marshall:

Location Based Sleep Scheduling for Target Tracking Applications in Smart Space Environments. 1-6 - Jiming Chen, Kejie Cao, Youxian Sun, Xuemin (Sherman) Shen

:
Adaptive Sensor Activation for Target Tracking in Wireless Sensor Networks. 1-5 - Jue Hong, Jiannong Cao

, Wenzhong Li, Sanglu Lu, Daoxu Chen:
Sleeping Schedule-Aware Minimum Latency Broadcast in Wireless Ad Hoc Networks. 1-5 - Tahir Azim, Qasim Mansoor, Philip Alexander Levis:

Starburst SSD: An Efficient Protocol for Selective Dissemination. 1-6
AHSN Poster Session 1
- Hady S. AbdelSalam, Stephan Olariu:

A Lightweight Skeleton Construction Algorithm for Self-Organizing Sensor Networks. 1-5 - Tomotaka Wada, Norie Uchitomi, Yuuki Ota, Toshihiro Hori, Kouichi Mutsuura, Hiromi Okada:

A Novel Scheme for Spatial Localization of Passive RFID Tags; Communication Range Recognition (CRR) Scheme. 1-6 - Amir Mahdi Khodaian, Babak Hossein Khalaj, Hamed Shah-Mansouri:

Optimal Utility-Energy Tradeoff in Delay Constrained Random Access Networks. 1-5 - Felix Hoffmann, Daniel Medina:

Optimum Internet Gateway Selection in Ad Hoc Networks. 1-5 - Jarno Nousiainen, Pasi E. Lassila:

Approximating Maximum Directed Flow in a Large Wireless Network. 1-6 - Yufeng Xiao, Xin Li, Yuhong Li, Shanzhi Chen:

Evaluate Reliability of Wireless Sensor Networks with OBDD. 1-5 - Zhaoliang Zhang, Guangquan Zhang, Xiaofang Zhang, Jianxi Fan:

TAP: An Adjustable Planar Structure for Adaptive Topology Control in Wireless Ad Hoc Networks. 1-6 - Xi Li, Hong Ji, F. Richard Yu

, Ruiming Zheng:
A FCM-Based Peer Grouping Scheme for Node Failure Recovery in Wireless P2P File Sharing. 1-5 - Pedro Henrique Juliano Nardelli

, Giuseppe Thadeu Freitas de Abreu
, Paulo Cardieri
:
Multi-Hop Aggregate Information Efficiency in Wireless Ad Hoc Networks. 1-6 - Bin Zhen, Kenichi Takizawa, Takahiro Aoyagi, Ryuji Kohno:

A Body Surface Coordinator for Implanted Biosensor Networks. 1-5 - Steven Lanzisera, Ankur Mehta, Kristofer S. J. Pister

:
Reducing Average Power in Wireless Sensor Networks through Data Rate Adaptation. 1-6 - Fehmi Ben Abdesslem, Artur Ziviani

, Marcelo Dias de Amorim, Petia Todorova:
Fair and Flexible Budget-Based Clustering. 1-5 - Kuan-Lin Kuo, Hung-Yun Hsieh, Ping-Cheng Yeh:

A Study on Collaborative Beamforming with Protocol Defects in Wireless Ad Hoc Networks. 1-6 - Alex Wang, Vikram Krishnamurthy:

Target Identification and Distributed Cooperative Control of Sensor Networks. 1-5
Cross Layer Optimization in Wireless Sensor Networks
- Fatma Bouabdallah, Nizar Bouabdallah, Raouf Boutaba:

Cross-Layer Design for Energy Conservation in Wireless Sensor Networks. 1-6 - Turkmen Canli, Ashfaq A. Khokhar:

PRMAC: Pipelined Routing Enhanced MAC Protocol for Wireless Sensor Networks. 1-5 - Zijian Wang, Eyuphan Bulut, Boleslaw K. Szymanski

:
Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks. 1-5 - Xinguo Wang, Xinming Zhang, Qian Zhang

, Guoliang Chen:
An Energy-Efficient Integrated MAC and Routing Protocol for Wireless Sensor Networks. 1-6 - Max do Val Machado, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro:

A Combined Approach for Receiver-Based MAC and Network Layers in Wireless Sensor Networks. 1-6
Cross Layer Optimization
- Matteo Trivellato, Nevio Benvenuto:

Cross-Layer Design of Networked Control Systems. 1-5 - Jun Hasegawa, Hiroyuki Yomo, Yoshihisa Kondo, Peter Davis, Ryutaro Suzuki, Sadao Obana, Katsumi Sakakibara:

Bidirectional Packet Aggregation and Coding for VoIP Transmission in Wireless Multi-Hop Networks. 1-6 - Marjan A. Baghaie, Bhaskar Krishnamachari:

Fast Flooding using Cooperative Transmissions in Wireless Networks. 1-5 - Ki Jin An, Hwangjun Song:

An Effective Cross-Layer Packet Scheduling and Routing Algorithm for Delay-Sensitive Media Transmission over MANET. 1-4 - Ioannis Spyropoulos, James R. Zeidler:

A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes. 1-5
AHSN Poster Session 2
- Takuya Yoshihiro:

Loop-Free Link Stability Metrics for Proactive Routing in Wireless Ad Hoc Networks. 1-5 - Gérard Chalhoub, Nassima Hadid, Alexandre Guitton, Michel Misson:

Deference Mechanisms Significantly Increase the MAC Delay of Slotted CSMA/CA. 1-5 - Paolo Barsocchi

, Stefano Lenzi
, Stefano Chessa
, Gaetano Giunta
:
Virtual Calibration for RSSI-Based Indoor Localization with IEEE 802.15.4. 1-5 - Lei Xu, Qilian Liang:

Radar Sensor Network Using a New Triphase Coded Waveform: Theory and Application. 1-5 - Bo Peng, Andrew H. Kemp, Hemat K. Maheshwari:

Power-Saving Geographic Routing in the Presence of Location Errors. 1-5 - Wei Ni, Haifeng Wang, Zhenhong Li:

Coordinated Transmission in Distributed Ad Hoc Peer-To-Peer (P2P) Communications. 1-5 - Yahya E. Osais, Marc St-Hilaire, F. Richard Yu

:
On Sensor Placement for Directional Wireless Sensor Networks. 1-5 - Franco Davoli

, Mario Marchese
, Maurizio Mongelli:
A Decision Theoretic Approach to Gaussian Sensor Networks. 1-5 - Ting-Ge Li, Chih-Cheng Hsu, Cheng-Fu Chou:

On Reliable Transmission by Adaptive Network Coding in Wireless Sensor Networks. 1-5 - Chin-Liang Wang, Yan-Wun Huang, Yu-Chih Huang

:
An Energy-Efficient Cooperative SIMO Transmission Scheme for Wireless Sensor Networks. 1-5 - Deepthi Chander, Bhushan G. Jagyasi, Uday B. Desai, S. N. Merchant:

DVD Based Moving Event Localization in Multihop Cellular Sensor Networks. 1-5 - Chen Liu, Mike H. MacGregor, Janelle J. Harms, Candace Phelps:

Hybrid Resource Allocation in Wireless Ad Hoc Networks. 1-6 - Azzedine Boukerche, Regina Borges de Araujo, Anis Zarrad:

A Dynamic Ultrapeers Selection Policy for Collaborative Virtual Environments over Mobile Ad Hoc Networks. 1-5 - Eugène David Ngangue Ndih, Nadia Khaled, Giovanni De Micheli:

An Analytical Model for the Contention Access Period of the Slotted IEEE 802.15.4 with Service Differentiation. 1-6 - Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, Ashikur Rahman

:
Load Aware Broadcast in Mobile Ad Hoc Networks. 1-5
Quality of Service
- Andrew Newell, Kemal Akkaya:

Self-Actuation of Camera Sensors for Redundant Data Elimination in Wireless Multimedia Sensor Networks. 1-5 - Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wolff, Shen Wan, Neeraj Gurdasani, Doug Galarus:

QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety. 1-5 - Rui Dai, Ian F. Akyildiz:

Joint Effect of Multiple Correlated Cameras in Wireless Multimedia Sensor Networks. 1-5 - Luciano Bononi

, Lorenzo Donatiello, Marco Furini
:
Real-Time Traffic in Ad-Hoc Sensor Networks. 1-5 - Eren Gürses, Yuan Lin, Raouf Boutaba:

Distributed Quality-Lifetime Maximization in Wireless Video Sensor Networks. 1-6
Cognitive and Mesh Networks
- Juncheng Jia, Jin Zhang, Qian Zhang

:
Relay-Assisted Routing in Cognitive Radio Networks. 1-5 - Ping Wang, Dusit Niyato

, Hai Jiang
:
Voice Service Support over Cognitive Radio Networks. 1-5 - Qian Zhang

, Christopher Lim:
Optimizing Access Radio in Multi-Radio Mesh Network. 1-5 - Jin Zhang, Qian Zhang

:
Contention-Aware Cooperative Routing in Wireless Mesh Networks. 1-5 - Chungui Liu, Yantai Shu, Lianfang Zhang:

Capacity Analysis and Experimental Study with Multiple Interfaces and Multiple Channels in 802.11 Mesh Networks. 1-5
Topology Management
- Hui Guo, Yi Qian, Kejie Lu, Nader Moayeri:

Backbone Construction for Heterogeneous Wireless Ad Hoc Networks. 1-5 - Tarek El Salti, Nidal Nasser

, Tarik Taleb:
A Set of Topological Graphs for 2-D Sensor Ad Hoc Networks. 1-6 - Hisham M. Almasaeid

, Ahmed E. Kamal:
On the Minimum k-Connectivity Repair in Wireless Sensor Networks. 1-5 - Sergio A. Bermudez, Stephen B. Wicker:

Connectivity of Finite Wireless Networks with Random Communication Range Nodes. 1-5 - Yash P. Aneja, Ataul Bari, Arunita Jaekel, Ramaswamy Chandrasekaran, K. P. K. Nair:

Minimum Energy Strong Bidirectional Topology for Ad Hoc Wireless Sensor Networks. 1-5
Medium Access Control
- Eirini D. Karapistoli, Ioannis Gragopoulos, Ioannis Tsetsinas, Fotini-Niovi Pavlidou:

A Directional MAC Protocol with Deafness Avoidance for UWB Wireless Sensor Networks. 1-5 - Min Song, Yanxiao Zhao, Jun Wang, E. K. Park:

A High Throughput Load Balance Algorithm for Multichannel Wireless Sensor Networks. 1-5 - Zhenxia Zhang, Azzedine Boukerche:

An Efficient MAC Layer Handoff Scheme for WiFi-Based Multichannel Wireless Mesh Networks. 1-5 - Marzieh Veyseh, J. J. Garcia-Luna-Aceves, Hamid R. Sadjadpour:

OFDMA Based Multiparty Medium Access Control in Wireless Ad Hoc Networks. 1-6 - You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo Lee:

An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols. 1-6
Routing Protocols
- Pinyi Ren, Jia Feng, Ping Hu, Jun Cai:

Energy Saving Ad-Hoc On-Demand Distance Vector Routing for Mobile Ad-Hoc Networks. 1-5 - Zhenyu Yang, Kai Zeng, Wenjing Lou:

FSA: A Fast Coordination Scheme for Opportunistic Routing. 1-5 - Fabrice Theoleyre

, Eryk Schiller, Andrzej Duda
:
Efficient Greedy Geographical Non-Planar Routing with Reactive Deflection. 1-5 - Cong Liu, Jie Wu:

Efficient Adaptive Routing in Delay Tolerant Networks. 1-5 - Sudheendra Murthy, Prasad Hegde, Arunabha Sen:

Design of a Delay-Based Routing Protocol for Multi-Rate Multi-Hop Mobile Ad Hoc Networks. 1-6
Deployment Strategies
- Xu Li, Hannes Frey, Nicola Santoro

, Ivan Stojmenovic:
Localized Sensor Self-Deployment for Guaranteed Coverage Radius Maximization. 1-5 - Andreas Konstantinidis

, Kun Yang, Qingfu Zhang
:
Problem-Specific Encoding and Genetic Operation for a Multi-Objective Deployment and Power Assignment Problem in Wireless Sensor Networks. 1-6 - Liang Liu, Xi Zhang, Huadong Ma:

Exposure-Path Prevention in Directional Sensor Networks Using Sector Model Based Percolation. 1-5 - Nadjib Aitsaadi, Nadjib Achir, Khaled Boussetta, Guy Pujolle:

Potential Field Approach to Ensure Connectivity and Differentiated Detection in WSN Deployment. 1-6 - Fadi M. Al-Turjman, Hossam S. Hassanein

, Mohamed Ibnkahla
:
Connectivity Optimization for Wireless Sensor Networks Applied to Forest Monitoring. 1-6
Link Layer
- Emanuele Coviello, Abhijeet Bhorkar, Francesco Rossetto, Bhaskar D. Rao, Michele Zorzi:

A Robust Approach to Carrier Sense for MIMO Ad Hoc Networks. 1-6 - Kaushik R. Chowdhury

, Ian F. Akyildiz:
Interferer Classification, Channel Selection and Transmission Adaptation for Wireless Sensor Networks. 1-5 - Simon Odou, Steven Martin, Khaldoun Al Agha:

Idle Channel Time Estimation in Multi-Hop Wireless Networks. 1-5 - Simone Sergi, Fabrizio Pancaldi

, Giorgio Matteo Vitetta
:
Cooperative Communication Techniques for Wireless OFDMA-Based Ad-Hoc Networks. 1-6 - Qing Wang, Pingyi Fan

, Khaled Ben Letaief
:
On the Log-Normal Fading Networks: Power Control and Spatial Reuse. 1-6
Reliable Data Delivery
- Yan Yan, Baoxian Zhang, Zhuang Zhao, Xiaojun Shen, Jian Ma:

Mechanism for Maximizing Area-Centric Coding Gains in Wireless Multihop Networks. 1-5 - Carlo Fischione

, Stefano Tennina, Fortunato Santucci
, Fabio Graziosi
:
Reliability and Efficiency Analysis of Distributed Source Coding in Wireless Sensor Networks. 1-6 - Saad B. Qaisar

, Hayder Radha:
Multipath Distributed Data Reliability for Wireless Sensor Networks. 1-5 - Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun Wang:

HybridCast: A Hybrid Probabilistic/Deterministic Approach for Adjustable Broadcast Reliability in Mobile Wireless Ad Hoc Networks. 1-6 - Dmitri V. Truhachev, Sumeeth Nagaraj, Christian Schlegel:

Throughput/Reliability Tradeoffs in Spread Spectrum Multi-Hop Ad-Hoc Wireless Networks with Multi-Packet Detection. 1-5
In-network Data Storage and Query Optimization
- Salah A. Aly, Moustafa Youssef

, Hager S. Darwish, Mahmoud Zidan:
Distributed Flooding-Based Storage Algorithms for Large-Scale Wireless Sensor Networks. 1-5 - Konrad Iwanicki

, Maarten van Steen
:
Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks. 1-6 - Susumu Ishihara

, Tatsuya Suda:
Replica Arrangement Scheme for Location Dependent Information on Sensor Networks with Unpredictable Query Frequency. 1-6 - Ravi Thanawala, Jie Wu, Avinash Srinivasan:

Efficient Resource Discovery in Mobile Ad Hoc Networks. 1-5
Network Longevity
- Maggie X. Cheng, Xuan Gong, Scott C.-H. Huang:

Improving Sensor Network Lifetime Through Hierarchical Multihop Clustering. 1-6 - Tianqi Wang, Wendi B. Heinzelman

, Alireza Seyedi:
Minimizing Energy Consumption in IR-UWB Based Wireless Sensor Networks. 1-5 - Aravind Kailas, Mary Ann Ingram:

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity. 1-5 - Stefano Basagni, Alessio Carosi, Chiara Petrioli

:
Heuristics for Lifetime Maximization in Wireless Sensor Networks with Multiple Mobile Sinks. 1-6 - Jiucai Zhang

, Song Ci, Hamid Sharif, Mahmoud A. Alahmad
:
Lifetime Optimization for Wireless Sensor Networks Using the Nonlinear Battery Current Effect. 1-6
Modeling
- John S. Baras, Vahid Tabatabaee, Punyaslok Purkayastha, Kiran K. Somasundaram:

Component Based Performance Modelling of Wireless Routing Protocols. 1-6 - Giovanni Resta

, Paolo Santi:
Latency and Capacity Optimal Broadcasting in Wireless Multihop Networks. 1-6 - Ruifeng Zhang, Jean-Marie Gorce

, Katia Jaffrès-Runser
:
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks. 1-6 - Qiao Li, Pingyi Fan

, Dapeng Oliver Wu
:
Energy Efficient Routing in Ad Hoc Networks with Nakagami-m Fading Channels. 1-6 - Shengshan Cui, Alexander M. Haimovich, Oren Somekh, H. Vincent Poor

, Shlomo Shamai
:
Throughput Scaling of Wireless Networks With Random Connections. 1-6
Wireless Network Security
- Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen

:
DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks. 1-6 - Alina Olteanu

, Yang Xiao
:
Fragmentation and AES Encryption Overhead in Very High-Speed Wireless LANs. 1-5 - Lei Zhang, Jian Ren, Tongtong Li:

Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping. 1-5 - Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:

Towards a Taxonomy of Wired and Wireless Anonymous Networks. 1-8 - Masoud Ghoreishi Madiseh, Shuai He, Michael L. McGuire, Stephen W. Neville, Xiaodai Dong:

Verification of Secret Key Generation from UWB Channel Observations. 1-5
Sensor Network Security
- Rahul Khanna

, Huaping Liu
, Hsiao-Hwa Chen:
Reduced Complexity Intrusion Detection in Sensor Networks Using Genetic Algorithm. 1-5 - Lei Kang:

Protecting Location Privacy in Large-Scale Wireless Sensor Networks. 1-6 - Uday Acharya, Mohamed F. Younis:

An Approach for Increasing Base-Station Anonymity in Sensor Networks. 1-5 - Huw Read

, Andrew Blyth, Iain Sutherland
:
A Unified Approach to Network Traffic and Network Security Visualisation. 1-6 - Jian Ren, Yun Li, Tongtong Li:

Routing-Based Source-Location Privacy in Wireless Sensor Networks. 1-5
Information Systems Security I
- Michael Brinkmeier, Michael Rossberg, Guenter Schaefer:

Towards a Denial-of-Service Resilient Design of Complex IPsec Overlays. 1-6 - Ayumu Kubota, Yutaka Miyake:

Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking. 1-6 - Hung-Shen Wu, Nen-Fu Huang, Guan-Hao Lin:

Identifying the Use of Data/Voice/Video-Based P2P Traffic by DNS-Query Behavior. 1-5 - Wael Khreich

, Eric Granger
, Robert Sabourin, Ali Miri:
Combining Hidden Markov Models for Improved Anomaly Detection. 1-6 - Abes Dabir, Ashraf Matrawy:

Design and Analysis of a Hierarchical IP Traceback System. 1-6 - Ahmet Onur Durahim, Albert Levi

:
Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks. 1-6 - Romano Fantacci

, Leonardo Maccari
, Matteo Rosi, Luigi Chisci
, Luca Maria Aiello
, Marco Milanesio:
Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach. 1-5 - Benjamin Fabian

:
Implementing Secure P2P-ONS. 1-5 - Kejie Lu, Shengli Fu, Yi Qian, Tao Zhang:

On the Security Performance of Physical-Layer Network Coding. 1-5 - Gail-Joon Ahn

, Moonam Ko, Mohamed Shehab
:
Privacy-Enhanced User-Centric Identity Management. 1-5 - Yosuke Himura, Kensuke Fukuda, Kenjiro Cho, Hiroshi Esaki:

An Automatic and Dynamic Parameter Tuning of a Statistics-Based Anomaly Detection Algorithm. 1-6 - Svetlana Radosavac, Ulas C. Kozat, James Kempf:

On the Use of Admission Control for Better Quality of Security. 1-5 - Mohamed Hamdi, Noureddine Boudriga:

A Progressive Chaotic MPEG-4 Video Encryption Scheme for Wireless Networks. 1-5
Intrusion Detection and Denial of Service
- Georgios Oikonomou, Jelena Mirkovic:

Modeling Human Behavior for Defense Against Flash-Crowd Attacks. 1-6 - Aubrey-Derrick Schmidt, Rainer Bye, Hans-Gunther Schmidt, Jan Hendrik Clausen, Osman Kiraz, Kamer Ali Yüksel, Seyit Ahmet Çamtepe

, Sahin Albayrak
:
Static Analysis of Executables for Collaborative Malware Detection on Android. 1-5 - Christian Callegari

, Stefano Giordano
, Michele Pagano
:
On the Use of Compression Algorithms for Network Anomaly Detection. 1-5 - Randall W. Klein, Michael A. Temple, Michael J. Mendenhall, Donald R. Reising:

Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance. 1-5 - Kyle Smith, Ehab Al-Shaer, Khalid Elbadawi:

Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. 1-5
Authentication
- Silvana Greco Polito, Mohit Chamania

, Admela Jukan:
Extending the Inter-Domain PCE Framework for Authentication and Authorization in GMPLS Networks. 1-6 - Hai Huang, Zhenfu Cao

:
An Insider-Resistant Group Key Exchange Protocol without Signatures. 1-5 - Lanxiang Chen, Dan Feng, Zhan Shi, Feng Zhou:

Using Session Identifiers as Authentication Tokens. 1-5 - Aixin Zhang, Junhua Tang, Peng Wang:

Authentication Tests Based on Test Type Matrix. 1-6 - Chao Shen, Zhongmin Cai, Xiaohong Guan, Huilan Sha, Jingzi Du:

Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring. 1-5
Information Hiding and Watermarking
- Mohammad Ali Akhaee, Nima Khademi Kalantari, Farokh Marvasti:

Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling. 1-5 - Hui Tian

, Ke Zhou, Hong Jiang, Jin Liu, Yongfeng Huang, Dan Feng:
An M-Sequence Based Steganography Model for Voice over IP. 1-5 - Min-Jen Tsai, Chang-Hsing Shen, Jung Liu

:
Multipurpose Image Watermarking Based on the Wavelet Tree Contrast Level Transformation. 1-4 - Yongdong Wu, Feng Bao, Ying Qiu:

Tracing Stateful Pirate Decoders. 1-5 - Sayed Mohammad Ebrahim Sahraeian, Mohammad Ali Akhaee, Farokh Marvasti:

Information Hiding with Optimal Detector for Highly Correlated Signals. 1-5
Deployment and Management of Security Policies
- Maurizio Dusi, Alice Este, Francesco Gringoli

, Luca Salgarelli:
Using GMM and SVM-Based Techniques for the Classification of SSH-Encrypted Traffic. 1-6 - Maicon Stihler, Altair Olivo Santin

, Alcides Calsavara, Arlindo L. Marcon Jr.:
Distributed Usage Control Architecture for Business Coalitions. 1-6 - Kien C. Nguyen

, Tansu Alpcan
, Tamer Basar:
Security Games with Incomplete Information. 1-6 - Craig A. Shue, Minaxi Gupta:

Sensitive Data Requests: Do Sites Ask Correctly? 1-5 - Zonghua Zhang, Pin-Han Ho, Farid Naït-Abdesselam:

On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. 1-5
Information Systems Security II
- Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang:

A Lightweight Fast Handover Authentication Scheme in Mobile Networks. 1-5 - Raphael Chung-Wei Phan

, Jean-Philippe Aumasson:
On Hashing with Tweakable Ciphers. 1-5 - Stefan Rass

, Peter Schartner, Michaela Greiler:
Quantum Coin-Flipping-Based Authentication. 1-5 - Rajesh M. Bodade, Sanjay N. Talbar:

Iris Recognition Using Combination of Dual Tree Rotated Complex Wavelet and Dual Tree Complex Wavelet. 1-5 - Fazirulhisyam Hashim, Abbas Jamalipour

:
On Accurate and Scalable Anomaly Detection in Next Generation Mobile Network. 1-5 - Telvis E. Calhoun, Reed Newman, Raheem A. Beyah

:
Authentication in 802.11 LANs Using a Covert Side Channel. 1-6 - Lorenzo Mucchi

, Luca Simone Ronga
, Enrico Del Re
:
Design and Implementation of Physical Layer Private Key Setting for Wireless Networks. 1-5 - Karina Magalhães, Ricardo Dahab

:
SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps. 1-6 - Sanping Li, Yan Luo:

Discernibility Analysis and Accuracy Improvement of Machine Learning Algorithms for Network Intrusion Detection. 1-5 - Khalid Alsubhi, Issam Aib, Jérôme François, Raouf Boutaba:

Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention. 1-6 - Basheer Al-Duwairi, Manimaran Govindarasu:

JUST-Google: A Search Engine-Based Defense Against Botnet-Based DDoS Attacks. 1-5 - Thaier Hayajneh

, Prashant Krishnamurthy, David Tipper
, Tae-Hoon Kim:
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks. 1-6 - Asmaa Abid, Qassim Nasir

, Ahmed S. Elwakil
:
Implementation of a Chaotically Encrypted Wireless Communication System. 1-5
Application Layer Security
- Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:

Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees. 1-5 - Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woolf, Alfred O. Hero III:

Revealing Social Networks of Spammers Through Spectral Clustering. 1-6 - Efthimia Aivaloglou

, Stefanos Gritzalis
:
Trust-Based Data Disclosure in Sensor Networks. 1-6 - Igino Corona

, Davide Ariu
, Giorgio Giacinto
:
HMM-Web: A Framework for the Detection of Attacks Against Web Applications. 1-6 - Shiguo Lian, Yuan Dong, Haila Wang:

A Secure Solution for Ubiquitous Multimedia Broadcasting. 1-5
Cryptography and Cryptographic Procedures
- Yang Cui, Mingmei Li, Kazuya Yokoyama, Hideki Imai:

Efficient and Adaptively Secure Append-Only Signature. 1-5 - Saleh Suleman Saraireh, Mohammed Benaissa:

A Scalable Block Cipher Design Using Filter Banks and Lifting over Finite Fields. 1-5 - Julien Bringer, Hervé Chabanne, Bruno Kindarji:

Error-Tolerant Searchable Encryption. 1-6 - Aldar Chun-fai Chan

:
Symmetric-Key Homomorphic Encryption for Encrypted Data Processing. 1-5 - Mohamed Abo El-Fotouh, Klaus Diepold:

Cryptanalysis of Substitution Cipher Chaining Mode (SCC). 1-6
IP Security
- Andrey Khurri, Dmitriy Kuptsov, Andrei V. Gurtov

:
Performance of Host Identity Protocol on Symbian OS. 1-6 - Tobias Heer, René Hummen, Miika Komu, Stefan Götz, Klaus Wehrle

:
End-Host Authentication and Authorization for Middleboxes Based on a Cryptographic Namespace. 1-6 - Ayan Roy Chowdhury, John S. Baras:

Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks. 1-6 - Xiapu Luo

, Edmond W. W. Chan, Rocky K. C. Chang
:
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding. 1-5 - Mohamed Nassar

, Radu State, Olivier Festor:
VoIP Malware: Attack Tool & Attack Scenarios. 1-6
Special Topics on Information Security
- Panagiotis Rizomiliotis, Adonis Bogris

, Dimitris Syvridis
:
Message Origin Authentication and Integrity Protection in Chaos-Based Optical Communication. 1-5 - Stamatios V. Kartalopoulos:

Security in Advanced Optical Communication Networks. 1-5 - Fangming He, Hong Man, Didem Kivanc

, Bruce McNair:
EPSON: Enhanced Physical Security in OFDM Networks. 1-5 - Kai Xi, Jiankun Hu

:
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault. 1-5 - Zan Li, Jueping Cai, Xiaofeng Lu, Jiangbo Si:

Complexity Measure of FH/SS Sequences Using Approximate Entropy. 1-5
Privacy and Peer to Peer Security
- Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen

:
Anonymous and Authenticated Routing in Multi-Hop Cellular Networks. 1-6 - Yiming Wang, Lingyu Wang, Benjamin C. M. Fung

:
Preserving Privacy for Location-Based Services with Continuous Queries. 1-5 - Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang:

A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity. 1-6 - Kaiyong Zhao, Xiaowen Chu

, Mea Wang, Yixin Jiang:
Speeding Up Homomorpic Hashing Using GPUs. 1-5 - Madhumita Chatterjee, G. Sivakumar, Bernard Menezes:

Dynamic Policy Based Model for Trust Based Access Control in P2P Applications. 1-5
Distributed Systems Security
- Andrew J. Kalafut, Minaxi Gupta:

Pollution Resilience for DNS Resolvers. 1-5 - Luigi Lo Iacono

, Hariharan Rajasekaran:
Secure Browser-Based Access to Web Services. 1-5 - Pin Nie, Juha-Matti Tapio, Sasu Tarkoma, Jani Heikkinen:

Flexible Single Sign-On for SIP: Bridging the Identity Chasm. 1-6 - Kaliappa Ravindran:

Reconfigurable Peer-to-Peer Connectivity Overlays for Information Assurance Applications. 1-7 - I-Wei Chen, Po-Ching Lin, Chi-Chung Luo, Tsung-Huan Cheng, Ying-Dar Lin, Yuan-Cheng Lai, Frank C. Lin:

Extracting Attack Sessions from Real Traffic with Intrusion Prevention Systems. 1-5
Metrics and Performance Evaluation
- Yuanzhuo Wang, Chuang Lin, Yang Wang, Kun Meng:

Security Analysis of Enterprise Network Based on Stochastic Game Nets Model. 1-5 - Wei Lin, Yi Tang, Bin Liu, Derek Chi-Wai Pao

, Xiaofei Wang:
Compact DFA Structure for Multiple Regular Expressions Matching. 1-5 - Daewon Kim, Ikkyun Kim, Jintae Oh, Hyunsook Cho:

Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique. 1-6 - Tao Qin, Xiaohong Guan, Wei Li, Pinghui Wang:

Monitoring Abnormal Traffic Flows Based on Independent Component Analysis. 1-5 - Félix Gómez Mármol

, Gregorio Martínez Pérez
:
TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks. 1-5
Vulnerabilities and Malicious Behavior
- Antonio Galante, Ary Kokos, Stefano Zanero

:
BlueBat: Towards Practical Bluetooth Honeypots. 1-6 - Jie Wang, Jianxin Wang, Jianer Chen, Xi Zhang:

An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding. 1-6 - Nasir Jamil, Thomas M. Chen

:
A Mathematical View of Network-Based Suppressions of Worm Epidemics. 1-5 - Dimitris Geneiatakis, Costas Lambrinoudakis

, Georgios Kambourakis
, Aggelos Kafkalas, Sven Ehlert:
A First Order Logic Security Verification Model for SIP. 1-6 - Jon W. Wallace:

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits. 1-5
Relaying
- Georg Zeitler, Ralf Koetter, Gerhard Bauch, Jörg Widmer

:
On Quantizer Design for Soft Values in the Multiple-Access Relay Channel. 1-5 - Haishi Ning, Cong Ling, Kin K. Leung:

Near-Optimal Relaying Strategy for Cooperative Broadcast Channels. 1-5 - Josephine P. K. Chu, Andrew W. Eckford, Raviraj Adve:

Optimization for Fractional Cooperation in Multiple-Source Multiple-Relay Systems. 1-5 - Peter Rost, Gerhard P. Fettweis, J. Nicholas Laneman:

Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference. 1-5 - Volker Kühn, Sebastian Vorköper:

Information Combining for Relay Networks. 1-5
Two-way Relaying
- Min Chen, Aylin Yener:

Power Allocation for Multi-Access Two-Way Relaying. 1-5 - Xiao Juan Zhang, Yi Gong

:
Adaptive Power Allocation in Two-Way Amplify-and-Forward Relay Networks. 1-5 - Rafael F. Wyrembelski, Igor Bjelakovic, Tobias J. Oechtering

, Holger Boche:
On the Capacity of Bidirectional Broadcast Channels under Channel Uncertainty. 1-5 - Chin Keong Ho, Kiran T. Gowda, Sumei Sun:

A Generalized Two-Way Relay Channel with Private Information for the Relay. 1-6 - Abdulla Firag, Peter J. Smith

, Matthew R. McKay
:
Capacity Analysis for MIMO Two-Hop Amplify-and-Forward Relaying Systems with the Source to Destination Link. 1-6
Network Information Theory
- Abdellatif Zaidi, Luc Vandendorpe:

Achievable Rates for the Gaussian Relay Interferer Channel with a Cognitive Source. 1-6 - Ravi Tandon, Sennur Ulukus:

On the Capacity Region of the Gaussian Multiple Access Channel with Noisy Feedback. 1-5 - Etienne Perron, Suhas N. Diggavi, Emre Telatar:

The Interference-Multiple-Access Channel. 1-5 - Ersen Ekrem, Sennur Ulukus:

Ergodic Secrecy Capacity Region of the Fading Broadcast Channel. 1-5 - Mohamed Abdel Latif, Ahmed K. Sultan

, Hesham El Gamal:
ARQ-Based Secret Key Sharing. 1-6
Ad Hoc Network Capacity
- Raymond H. Y. Louie

, Matthew R. McKay
, Iain B. Collings
:
Spatial Multiplexing with MRC and ZF Receivers in Ad Hoc Networks. 1-5 - Changchuan Yin, Long Gao, Tie Liu, Shuguang Cui

:
Transmission Capacities for Overlaid Wireless Ad Hoc Networks with Outage Constraints. 1-5 - Kien T. Truong

, Steven Weber, Robert W. Heath Jr.
:
Transmission Capacity of Two-Way Communication in Wireless Ad Hoc Networks. 1-5 - Cédric Westphal:

A Study of the Percolation Threshold for k-Collaborative Wireless Networks. 1-6 - Shirish Karande, Zheng Wang, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:

Network Coding Does Not Change the Multicast throughput Order of Wireless Ad Hoc Networks. 1-5
Poster Session I
- Giuseppe Thadeu Freitas de Abreu

:
Arbitrarily Tight Upper and Lower Bounds on the Gaussian Q-Function and Related Functions. 1-6 - Mingsheng Gao, Wee-Seng Soh

, Meixia Tao:
A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels. 1-5 - M. R. Heidarpour, Mahmoud Modarres-Hashemi, Mohammadali Khosravifard, T. Aaron Gulliver:

Improving the Performance of LP Decoders for Cyclic Codes. 1-5 - Vo Tam Van, Hajime Matsui, Seiichi Mita:

Low Complexity Encoder for Generalized Quasi-Cyclic Codes Coming from Finite Geometries. 1-6 - Chia-Hao Tsai, Tzu-Yi Liao, Cheng-Yuan Chang, Guu-chang Yang

, Wing C. Kwong:
Design of Two-Dimensional Wavelength-Time Codes for Fiber-Optic CDMA Systems. 1-4 - Mamoun Guenach, Jérôme Louveaux, Luc Vandendorpe, Phil Whiting, Jochen Maes, Michaël Peeters

:
Performance Analysis of the Signal-to-Noise Ratio Assisted Crosstalk Channel Estimation for DSL Systems. 1-5 - Iraj Hosseini, Norman C. Beaulieu:

Low-Complexity Multisampling Multiuser Detector for Time-Hopping UWB Systems. 1-6 - Stylianos D. Assimonis

, Michail Matthaiou
, George K. Karagiannidis
, Josef A. Nossek
:
Parametric Construction of Improved Nyquist Filters Based on Inner and Outer Functions. 1-5 - Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc Moonen:

Green DSL: Energy-Efficient DSM. 1-5 - Onkar Dabeer:

Optimal Transmitters for Hypothesis Testing over a Rayleigh Fading MAC. 1-5 - Pedram Pad, Mahdi Soltanolkotabi

, Saeed Hadikhanlou, Arash Enayati, Farrokh Marvasti:
Errorless Codes for Over-Loaded CDMA with Active User Detection. 1-6 - Filippo Tosato:

Near Successive Refinement of Gaussian Vectors in Grassmannian Space. 1-5 - Ted C.-K. Liu, Xiaodai Dong, Wu-Sheng Lu:

Compressed Sensing Maximum Likelihood Channel Estimation for Ultra-Wideband Impulse Radio. 1-5 - Young Gil Kim

, Norman C. Beaulieu:
A Greedy Cophasing Scheme for MIMO Beamforming Systems Using Quantized Feedback. 1-6
Wireless Networks
- Chris T. K. Ng, Muriel Médard, Asuman E. Ozdaglar:

Completion Time Minimization and Robust Power Control in Wireless Packet Networks. 1-6 - Deli Qiao, Mustafa Cenk Gursoy, Senem Velipasalar:

Energy Efficiency of Fixed-Rate Wireless Transmissions under QoS Constraints. 1-5 - Eduard A. Jorswieck

, Holger Boche:
Energy-Aware Utility Regions: Multiple Access Pareto Boundary. 1-5 - Virgilio Rodriguez, Rudolf Mathar:

A Generalised Multi-Receiver Radio Network and Its Decomposition into Independent Transmitter-Receiver Pairs: Simple Feasibility Condition and Power Levels in Closed Form. 1-5 - Sibi Raj Bhaskaran, Stephen V. Hanly

, Nasreen Badruddin, Jamie S. Evans
:
Maximizing the Sum Rate in Symmetric Networks of Interfering Links. 1-6
Network Coding
- Maximilian Riemensberger, Yalin Evren Sagduyu, Michael L. Honig, Wolfgang Utschick

:
Comparison of Analog and Digital Relay Methods with Network Coding for Wireless Multicast. 1-5 - Daniel Enrique Lucani

, Milica Stojanovic, Muriel Médard:
Random Linear Network Coding for Time Division Duplexing: Energy Analysis. 1-5 - Amir Hamed Mohsenian Rad, Jianwei Huang, Vincent W. S. Wong

, Sidharth Jaggi, Robert Schober:
A Game-Theoretic Analysis of Inter-Session Network Coding. 1-6 - Mohammad H. Amerimehr, Farid Ashtiani, Mohammad Bagher Iraji:

An Analytical Approach for Throughput Evaluation of Wireless Network Coding. 1-5 - Rui Zhang

, Chin Choy Chai, Ying-Chang Liang
, Shuguang Cui
:
On Capacity Region of Two-Way Multi-Antenna Relay Channel with Analogue Network Coding. 1-5
Cognitive Radio
- Rui Zhang

, Xin Kang, Ying-Chang Liang
:
Protecting Primary Users in Cognitive Radio Networks: Peak or Average Interference Power Constraint? 1-5 - Omar Mehanna, Ahmed K. Sultan

, Hesham El Gamal:
Blind Cognitive MAC Protocols. 1-5 - Keith Q. T. Zhang:

Advanced Detection Techniques for Cognitive Radio. 1-5 - Sepideh Zarrin, Teng Joon Lim

:
Composite Hypothesis Testing for Cooperative Spectrum Sensing in Cognitive Radio. 1-5 - Ali Tajer, Narayan Prasad, Xiaodong Wang:

Distributed Beamforming and Rate Allocation in Multi-Antenna Cognitive Radio Networks. 1-6
Poster Session II
- Pejman Goudarzi, Farima Ayatollahi, Mohammad R. Nezami Ranjbar:

Enabling Differentiated QoS Based on Cross-Layer Optimization in Wireless Ad Hoc Networks. 1-5 - Jianxiao Yang, Benoit Geller

, Anne Wei:
Approximate Expressions for Cramer-Rao Bounds of Code Aided QAM Dynamical Phase Estimation. 1-5 - Xiao-Xin Zhang, Yuping Zhao, Li Zou:

Optimum TCM Codes Design for Gaussian Channels by Considering Both Euclidean and Hamming Distances. 1-5 - Beatriz Soret

, M. Carmen Aguayo-Torres
, José T. Entrambasaguas
:
Capacity with Probabilistic Delay Constraint for Voice Traffic in a Rayleigh Channel. 1-5 - Wai Pan Tam, Tat M. Lok:

Rate Allocation for the Multi-Source Downlink Channel with Minimax Optimization. 1-5 - Yiyue Wu, A. Robert Calderbank:

Construction of High Rate Super-Orthogonal Space-Time Block Codes. 1-5 - Cédric Herzet, Velotiaray Toto-Zarasoa, Aline Roumy:

Error Resilient Non-Asymmetric Slepian-Wolf Coding. 1-5 - Antonio Assalini, Emiliano Dall'Anese

, Silvano Pupolin
:
Linear MMSE MIMO Channel Estimation with Imperfect Channel Covariance Information. 1-5 - Meng Zeng, Rui Zhang

, Shuguang Cui
:
Optimal Transmission for Dying Channels. 1-5 - Su Gao, Cong Ling:

Multi-Dimensional Nested Lattice Quantization for Wyner-Ziv Coding. 1-5 - Ning Kong:

Performance Comparison Among Conventional Selection Combining, Optimum Selection Combining and Maximal Ratio Combining. 1-6 - Holger Boche, Martin Schubert:

A Unified Framework for Interference Modeling for Multi-User Wireless Networks. 1-6 - Jianwen Zhang

, Marc André Armand, Pooi Yuen Kam
:
A Mutual Information Approach for Comparing LLR Metrics for Iterative Decoders. 1-5 - Sérgio Crisóstomo

, Udo Schilcher, Christian Bettstetter, João Barros
:
Analysis of Probabilistic Flooding: How Do We Choose the Right Coin? 1-6 - Marcio Monteiro, Neiva Lindqvist, Aldebaro Klautau

:
Spectrum Balancing Algorithms for Power Minimization in DSL Networks. 1-5
MIMO Systems
- Matthew R. McKay

, Iain B. Collings
, Antonia M. Tulino
:
Exploiting Connections Between MIMO MMSE Achievable Rate and MIMO Mutual Information. 1-5 - Chengshan Xiao, Yahong Rosa Zheng

:
Transmit Precoding for MIMO Systems with Partial CSI and Discrete-Constellation Inputs. 1-5 - Tobias J. Oechtering

, Rafael F. Wyrembelski, Holger Boche:
On the Optimal Transmission for the MIMO Bidirectional Broadcast Channel. 1-5 - K. Pavan Srinath, B. Sundar Rajan:

A Low ML-Decoding Complexity, High Coding Gain, Full-Rate, Full-Diversity STBC for 4 × 2 MIMO System. 1-5 - Vinod Kristem

, Neelesh B. Mehta
, Andreas F. Molisch:
Optimal Weighted Antenna Selection for Imperfect Channel Knowledge from Training. 1-6
Capacity
- Dario Fertonani, Tolga M. Duman:

Upper Bounding the Deletion Channel Capacity by Auxiliary Memoryless Channels. 1-5 - Cecilio Pimentel

, Fady Alajaji:
A Discrete Channel Model for Capturing Memory and Soft-Decision Information: A Capacity Study. 1-6 - Negar Kiyavash, Todd P. Coleman, Mavis Rodrigues:

Novel Shaping and Complexity-Reduction Techniques for Approaching Capacity over Queuing Timing Channels. 1-5 - Ahmed A. Farid

, Steve Hranilovic:
Capacity of Optical Intensity Channels with Peak and Average Power Constraints. 1-5 - Shi Jin, Matthew R. McKay

, Kai-Kit Wong, Xiao Li:
Low SNR Capacity of Double-Scattering MIMO Channels with Transmitter Channel Knowledge. 1-5
Multiuser or Network MIMO
- Patrick Marsch, Gerhard P. Fettweis:

On Uplink Network MIMO under a Constrained Backhaul and Imperfect Channel Knowledge. 1-6 - Nihar Jindal, Jeffrey G. Andrews, Steven Weber:

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas. 1-6 - Changxin Shi, David A. Schmidt, Randall A. Berry

, Michael L. Honig, Wolfgang Utschick
:
Distributed Interference Pricing for the MIMO Interference Channel. 1-5 - Symeon Chatzinotas

, Muhammad Ali Imran
, Reza Hoshyar:
The Multicell Processing Capacity of the Cellular MIMO Uplink Channel under Correlated Fading. 1-5 - Bin Song, Martin Haardt:

Effects of Imperfect Channel State Information on Achievable Rates of Precoded Multi-User MIMO Broadcast Channels with Limited Feedback. 1-5
Modulation and Coding
- Soon Xin Ng, Yonghui Li

, Lajos Hanzo
:
Distributed Turbo Trellis Coded Modulation for Cooperative Communications. 1-5 - Alex Alvarado

, Erik Agrell, Leszek Szczecinski, Arne Svensson:
Unequal Error Protection in BICM with QAM Constellations: Interleaver and Code Design. 1-6 - Leila Musavian

, Sonia Aïssa:
Adaptive Modulation in Spectrum-Sharing Systems with Delay Constraints. 1-5 - Alireza Kenarsari-Anhari, Lutz H.-J. Lampe:

Performance Evaluation of QAM-Based BICM: An Analytical Approach. 1-6 - Willie K. Harrison

, Steven W. McLaughlin:
Physical-Layer Security: Combining Error Control Coding and Cryptography. 1-5
OFDM/OFDMA
- William Weiliang Li, Ying Jun (Angela) Zhang

, Moe Z. Win
:
Slow Adaptive OFDMA via Stochastic Programming. 1-6 - Guowang Miao, Nageen Himayat, Ye (Geoffrey) Li, Shilpa Talwar:

Low-Complexity Energy-Efficient OFDMA. 1-5 - Robert F. H. Fischer, Christian Siegl:

Successive PAR Reduction in (MIMO) OFDM. 1-5 - Chenggao Han, Takeshi Hashimoto, Naoki Suehiro:

Constellation Rotated Vector OFDM and Its Performance over Rayleigh Fading Channels. 1-5 - Marc Adrat, Jan Leduc, Stefan Couturier, Markus Antweiler, Harald Elders-Boll:

2nd Order Cyclostationarity of OFDM Signals: Impact of Pilot Tones and Cyclic Prefix. 1-5
Channel Coding
- Alex Alvarado

, Víctor Núñez, Leszek Szczecinski, Erik Agrell:
Correcting Suboptimal Metrics in Iterative Decoders. 1-6 - Thomas A. Courtade, Richard D. Wesel:

A Cross-Layer Perspective on Rateless Coding for Wireless Channels. 1-6 - Michael Lunglmayr, Jens Berkmann, Mario Huemer:

Vertex Packing Decoding. 1-6 - Huan Deng, Margreta Kuijper

, Jamie S. Evans
:
Burst Erasure Correction Capabilities of (n, n-1) Convolutional Codes. 1-5 - Alexandros Katsiotis, Panagiotis Rizomiliotis, Nicholas Kalouptsidis:

New Constructions of Low-Complexity Convolutional Codes. 1-6
Fading Channels
- Chung-Chin Lu, Shih-Chuan Chou, Dong-Tsai Huang:

A Design of Space-Time Codes for CPFSK Modulation over Multipath Fading Channels. 1-5 - Ranjan K. Mallik

, Jack H. Winters:
Deterministic Combining for Fading Channels. 1-5 - Shuo Liu, Julian Cheng, Norman C. Beaulieu:

Large SNR Analysis of Diversity Schemes on Rayleigh Channels with Arbitrary Correlation. 1-5 - Ronghui Peng, Rong-Rong Chen, Behrouz Farhang-Boroujeny

:
Low Complexity Markov Chain Monte Carlo Detector for Channels with Intersymbol Interference. 1-5 - Nathan Ricklin, James R. Zeidler:

Block Detection of Multiple Symbol DPSK in a Statistically Unknown Time-Varying Channel. 1-5
LDPC Codes
- Cuizhu Shi, Aditya Ramamoorthy:

Design and Analysis of E2 RC Codes Using EXIT Chart. 1-5 - Cedomir Stefanovic

, Dejan Vukobratovic
, Dragana Bajic
:
Low-Complexity List-Based Frame Synchronization for LDPC Coded Transmission. 1-5 - Bin Zhu, Defeng Huang

, Sven Nordholm
:
Performance Analysis of Verification-Based Decoding for Packet-Based LDPC Codes over Binary Symmetric Channel. 1-5 - Qingchuan Wang, Chen He:

Practical Dirty Paper Coding with Nested Binary LDGM-LDPC Codes. 1-6 - Xia Zheng, Francis Chung-Ming Lau

, C. K. Michael Tse
, Yejun He
, Morris M. Z. Wang:
Evaluation of the Extremely Low Block Error Rate of Irregular LDPC Codes. 1-5
Software and Protocol Technologies
- José Carlos Brustoloni, Nicholas L. Farnan, Ricardo Villamarín-Salomón, David Kyle:

Efficient Detection of Bots in Subscribers' Computers. 1-6 - Yi Zhao, Kai Zheng, Haichuan Wang, Zhiguo Gao:

Tale in the Multi-Core Era: Is Java Still Competitive to Host SIP Applications? 1-6 - Lars Geiger, Frank Dürr

, Kurt Rothermel:
On Contextcast: A Context-Aware Communication Mechanism. 1-5 - Javier Rubio-Loyola, Carlos Mérida-Campos, Steven Willmott, Antonio Astorga, Joan Serrat, Alex Galis:

Service Coalitions for Future Internet Services. 1-6 - Richard Haywood, Saty Mukherjee, Xiao-Hong Peng:

Investigation of H.264 Video Streaming over an IEEE 802.11e EDCA Wireless Testbed. 1-5 - Esa Piri, Kostas Pentikousis:

Towards a GNU/Linux IEEE 802.21 Implementation. 1-5 - Mina Guirguis, Hideo Goto:

HELP: // Hypertext In-Emergency Leveraging Protocol. 1-5 - Géza Szabó, Andras Veres, Sándor Molnár

:
Effects of User Behavior on MMORPG Traffic. 1-6 - Glauco Estácio Gonçalves

, Gustavo G. B. Santos, Joseane Farias Fidalgo, Judith Kelner, Djamel Fawzi Hadj Sadok, Stenio F. L. Fernandes:
On the Use of an ADSL2+ Testbed for Video Quality Assessment. 1-6 - Allen Y. C. Yu, Ka Lun Eddie Law:

Atomic Distributed Semaphores for Accessing Networked Data. 1-5
Multimedia Applications and Services
- Vaidyanathan Ramaswami, Rittwik Jana, Soohan Ahn:

Limited Chain Relay - A Novel Multimedia Distribution Algorithm and Its Analysis. 1-5 - Emilio Bonilla, Michael Stier, Saverio Niccolini, Marcus Brunner:

Automated Real-Time Recommendations for IPTV. 1-6 - Alexander Eichhorn, Pengpeng Ni:

Pick Your Layers Wisely - A Quality Assessment of H.264 Scalable Video Coding for Mobile Devices. 1-6 - S. Mohsen Amiri, Ivan V. Bajic:

Subset Selection in Type-II Hybrid ARQ/FEC for Video Multicast. 1-5 - Sohail Bahmani, Ivan V. Bajic, Atousa Hajshirmohammadi:

Improved Joint Source-Channel Decoding of JPEG2000 Images and Reed-Solomon Codes. 1-5
Peer-to-Peer Services
- Zhenbao Zhou, Zhenyu Li, Gaogang Xie:

ACNS: Adaptive Complementary Neighbor Selection in Bittorrent-Like Applications. 1-5 - Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Wei-Zen Huang, Wei-Jin Tzeng:

A Resource-Efficient Traffic Localization Scheme for Multiple BitTorrents. 1-5 - Albert Cabellos-Aparicio, Rubén Cuevas Rumín, Jordi Domingo-Pascual, Ángel Cuevas

, Carmen Guerrero
:
fP2P-HN: A P2P-Based Route Optimization Solution for Mobile IP and NEMO Clients. 1-6 - Fangming Liu, Ye Sun, Bo Li, Xinyan Zhang:

Understanding the Roles of Servers in Large-Scale Peer-Assisted Online Storage Systems. 1-5 - Dario Rossi, Marco Mellia

, Michela Meo
:
Evidences Behind Skype Outage. 1-6
Peer-to-Peer Media Delivery
- Jongtack Kim, Yugyung Lee, Saewoong Bahk:

SALSA: Super-Peer Assisted Live Streaming Architecture. 1-5 - Tai T. Do, Kien A. Hua, Alexander J. Aved

, Fuyu Liu, Ning Jiang:
Scalable Video-On-Demand Streaming in Mobile Wireless Hybrid Networks. 1-6 - Tianyin Xu, Jianzhong Chen, Wenzhong Li, Sanglu Lu, Yang Guo, Mounir Hamdi

:
Supporting VCR-Like Operations in Derivative Tree-Based P2P Streaming Systems. 1-5 - Guanjun Ma, Yinlong Xu, Kaiqian Ou, Wen Luo:

How Can Network Coding Help P2P Content Distribution? 1-5 - Tareq Hossain, Yi Cui, Yuan Xue:

Rate Distortion Optimization for Mesh-Based P2P Video Streaming. 1-6
Fixed and Mobile Service Platforms
- Zhaoyong Xun, Jianxin Liao, Xiaomin Zhu, Chun Wang, Yufei Cao:

A Group Based Service Triggering Algorithm for IMS Network. 1-6 - Lukasz Czekierda, Miroslaw Jedynak, Tomasz Masternak:

IGCP: A Platform for Interactive Communication in Groupware Applications. 1-6 - Liang Xu, Changcheng Huang, James Yan, Tadeusz Drwiega:

De-Registration Based S-CSCF Load Balancing in IMS Core Network. 1-5 - Mario Kolberg

, John F. Buford, Krishna Kishore Dhara, Xiaotao Wu, Venkatesh Krishnaswamy:
Managing Distributed Feature Interactions in Enterprise SIP Application Servers. 1-6 - Mauro Femminella, Roberto Francescangeli, Francesco Giacinti, Emanuele Maccherani, Alessandro Parisi, Gianluca Reali:

Design, Implementation, and Performance Evaluation of an Advanced SIP-Based Call Control for VoIP Services. 1-5
Network and Service Management
- Qian Lv, George N. Rouskas:

An Economic Model for Pricing Tiered Network Services. 1-6 - Diego Costantini, Paolo Bellavista

, Saverio Niccolini:
PreQuEst: A Scalable and Proactive Quality Enrichment for Presence Services. 1-6 - Farid Baguenine, Abdelhamid Mellouk:

QoS Swarm State Dependent Routing for Irregular Traffic in Telecommunication Networks. 1-5 - Ala I. Al-Fuqaha

, Ammar Rayes, Mohsen Guizani, Mrinal Khanvilkar, Mohammed Ahmed:
Intelligent Service Monitoring and Support. 1-6 - Yu-Chun Pan, Yeali S. Sun, Chun Hsu, Meng Chang Chen:

A User-Decided Service Model and Resource Management in a Cooperative WiMAX/HSDPA Network. 1-6
Poster
- Vitor Jesus

, Rui L. Aguiar
, Peter Steenkiste
:
Supporting Dynamic Inter-Domain Network Composition: Domain Discovery. 1-6 - Wendy Ooms, Fabian A. Walraven, Martin van der Werff:

Integration of IMS and DVB-RCS for Interactive Content Delivery. 1-6 - Weiyi Zhang, Xiaojiang Du, Kendall E. Nygard, Tie Wang:

Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint. 1-6 - Wen-Hsin Yang, You-Chiun Wang, Yu-Chee Tseng, Bao-Shuh Paul Lin:

Spatial and Temporal Packet Recovery Schemes for DVB-H Systems through IP-Relay Wireless Networks. 1-5 - Xin Huang, Sivakumar Ganapathy, Tilman Wolf

:
Evaluating Algorithms for Composable Service Placement in Computer Networks. 1-6 - Christoph Sorge, Jan Seedorf:

A Provider-Level Reputation System for Assessing the Quality of SPIT Mitigation Algorithms. 1-6 - Elena Baralis, Andrea Bianco

, Tania Cerquitelli
, Luca Chiaraviglio
, Marco Mellia
:
NetCluster: A Clustering-Based Framework for Internet Tomography. 1-5 - Chaojiong Wang, Ning Wang

, Michael P. Howarth, George Pavlou:
An Adaptive Peer Selection Scheme with Dynamic Network Condition Awareness. 1-5 - Luca Chiaraviglio

, Marco Mellia
, Fabio Neri:
Reducing Power Consumption in Backbone Networks. 1-6 - Midori Terasawa, Masahiro Nishida, Sho Shimizu, Yutaka Arakawa

, Satoru Okamoto, Naoaki Yamanaka:
Recover-Forwarding Method in Link Failure with Pre-Established Recovery Table for Wide Area Ethernet. 1-5 - Clarissa Cassales Marquezan, Jéferson Campos Nobre, Lisandro Zambenedetti Granville

, Giorgio Nunzi, Dominique Dudkowski, Marcus Brunner:
Distributed Reallocation Scheme for Virtual Network Resources. 1-5 - Rui Campos

, Manuel Ricardo
:
A New Efficient Mechanism for Establishing IP Connectivity between Ambient Networks. 1-6 - Yusuke Shinohara, Hideyuki Shimonishi, Hideki Tode, Koso Murakami:

Programmable and Scalable Per-Flow Traffic Management Scheme Using a Control Server. 1-5 - Moazzam Islam Tiwana, Berna Sayraç, Zwi Altman:

Statistical Learning for Automated RRM: Application to eUTRAN Mobility. 1-5 - Qiang Wu, Tilman Wolf

:
Support for Dynamic Adaptation in Next Generation Packet Processing Systems. 1-6
Routing
- Lei Shi, Jing Fu, Xiaoming Fu

:
Loop-Free Forwarding Table Updates with Minimal Link Overflow. 1-6 - Eiji Oki, Ayako Iwaki, Akeo Masuda, Kohei Shiomoto

:
Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. 1-5 - Pedro Amaral

, Luís Bernardo
, Paulo Pinto
:
DTIA: An Architecture for Inter-Domain Routing. 1-6 - Ashwin Gumaste, Mohit Chamania

, Admela Jukan:
An Evolutionary Approach to End-to-End Addressing and Routing in All-Ethernet Wide-Area Networks. 1-6 - Chung-Ming Huang, Chao-Hsien Lee, Po-Han Tseng:

Multihomed SIP-Based Network Mobility Using IEEE 802.21 Media Independent Handover. 1-5
Architecture
- Lijun Dong, Hongbo Liu, Yanyong Zhang, Sanjoy Paul

, Dipankar Raychaudhuri:
On the Cache-and-Forward Network Architecture. 1-5 - Lars Völker

, Denis Martin, Christoph Werle, Martina Zitterbart, Ibtissam El Khayat:
Selecting Concurrent Network Architectures at Runtime. 1-5 - Wladek Olesinski, Hans Eberle, Nils Gura:

Scalable Alternatives to Virtual Output Queuing. 1-6 - Eren Gürses, Jin Xiao, Raouf Boutaba:

Service Engineering for Inter-Domain Overlay Networks. 1-5 - Luca Muscariello, Diego Perino, Dario Rossi:

Do Next Generation Networks Need Path Diversity? 1-6
Security
- Csaba Király

, Renato Lo Cigno
:
IPsec-Based Anonymous Networking: A Working Implementation. 1-5 - Yan Luo, Ke Xiang, Jie Fan, Chunhui Zhang:

Distributed Intrusion Detection with Intelligent Network Interfaces for Future Networks. 1-5 - Roland Bless, Martin Röhricht:

Secure Signaling in Next Generation Networks with NSIS. 1-6 - Federico Menna, Renato Lo Cigno

, Saverio Niccolini, Sandra Tartarelli:
Simulation of SPIT Filtering: Quantitative Evaluation of Parameter Tuning. 1-6 - Jianli Pan, Raj Jain

, Subharthi Paul, Mic Bowman, Xiaohu Xu, Shanzhi Chen:
Enhanced MILSA Architecture for Naming, Addressing, Routing and Security Issues in the Next Generation Internet. 1-6
Peer-to-peer networks
- Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei:

Peer-to-Peer Application Recognition Based on Signaling Activity. 1-5 - Jing Xie

, King-Shan Lui:
Modeling Random Walk Search Algorithms in Unstructured P2P Networks with Social Information. 1-5 - André König, Matthias Hollick

, Ralf Steinmetz
:
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems. 1-5 - Zhipeng Ouyang, Lisong Xu, Byrav Ramamurthy:

A Cooperative Scheme for Dynamic Window Resizing in P2P Live Streaming. 1-5 - Stefan Zöls, Quirin Hofstätter, Zoran Despotovic, Wolfgang Kellerer

:
Achieving and Maintaining Cost-Optimal Operation of a Hierarchical DHT System. 1-6
Peformance-1
- Raffaele Bolla

, Roberto Bruschi
, Andrea Ranieri
:
Green Support for PC-Based Software Router: Performance Evaluation and Modeling. 1-6 - Thorsten Biermann, Christian Dannewitz, Holger Karl:

An Adaptive Resource/Performance Trade-Off for Resolving Complex Queries in P2P Networks. 1-6 - Qiang Fu

:
Improving Throughput in High Bandwidth-Delay Product Networks with Random Packet Losses. 1-6 - Frank Lehrieder, Michael Menth:

PCN-Based Flow Termination with Multiple Bottleneck Links. 1-6
Peformance-2
- Jong-Hyouk Lee, Sri Gundavelli, Tai-Myoung Chung:

A Performance Analysis on Route Optimization for Proxy Mobile IPv6. 1-6 - Xiaolong Li, Homayoun Yousefi'zadeh:

Distributed ECN-Based Congestion Control. 1-6 - Tariq M. Ali, Mohammad Saquib, Chaitali Sengupta

, Yuan Kang Lee:
Modeling of User-Perceived Web-Browsing Performance over a WLAN/3G Inter-Working Environment. 1-5 - Ryoichi Kawahara, Tatsuya Mori

, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa:
Adaptive Bandwidth Control to Handle Long-Duration Large Flows. 1-6 - Xi Yang, Tom Lehman, Kenichi Ogaki, Tomohiro Otani:

A Study on Cross-Layer Multi-Constraint Path Computation for IP-Over-Optical Networks. 1-6
Network Survivability
- Aden Grue, Wayne D. Grover, Matthieu Clouqueur, Dominic A. Schupke, Dimitri Baloukov, Diane Prisca Onguetou, Brian Forst:

CAPEX Costs of Lightly Loaded Restorable Networks under a Consistent WDM Layer Cost Model. 1-6 - Miguel Rodelgo-Lacruz, Cristina López-Bravo

, Francisco J. González-Castaño
, H. Jonathan Chao:
Practical Scalability of Wavelength Routing Switches. 1-6 - Christopher Pluntke, Michael Menth, Michael Duelli:

CAPEX-Aware Design of Survivable DWDM Mesh Networks. 1-6 - Peera Pacharintanakul, David Tipper

:
The Effects of Multi-Layer Traffic on the Survivability of IP-Over-WDM Networks. 1-6 - Moritz Kiese, Elisabeth Georgieva, Dominic A. Schupke, Biswanath Mukherjee, Jörg Eberspächer:

Availability Evaluation of Hybrid Wireless Optical Broadband Access Networks. 1-6
Protection and Restoration
- Samir Sebbah, Brigitte Jaumard:

A Resilient Transparent Optical Network Design with a Pre-Configured Extended-Tree Scheme. 1-6 - Amir Askarian, Suresh Subramaniam

, Maïté Brandt-Pearce
:
Evaluation of Link Protection Schemes in Physically Impaired Optical Networks. 1-5 - Diane Prisca Onguetou, Wayne D. Grover:

Solution of a 200-Node p-Cycle Network Design Problem with GA-Based Pre-Selection of Candidate Structures. 1-5 - Sávio R. A. dos Santos Rosa, André C. Drummond

, Nelson L. S. da Fonseca
:
Lightpath Establishment in WDM Networks with Best Effort Shared Path Protection in Impaired-Transmissions. 1-6 - Salah A. Aly, Ahmed E. Kamal:

Network Coding-Based Protection Strategy Against Node Failures. 1-5
Network Architecture
- James Yiming Zhang, Jing Wu, Gregor von Bochmann, Michel Savoie:

Differentiated Static Resource Allocation in WDM Networks. 1-5 - Yueping Cai, Eiji Oki, Motoharu Matsuura, Naoto Kishi, Tetsuya Miki:

Optical Broadcast-and-Select Network Architecture with Centralized Multi-Carrier Light Source. 1-5 - Jian Qiu, Yong Liu, Gurusamy Mohan

, Kee Chaing Chua:
Fast Spanning Tree Reconnection for Resilient Metro Ethernet Networks. 1-5 - Kyriakos Vlachos, Apostolos Siokis:

A Service-Transparent and Self-Organized Optical Network Architecture. 1-6 - Chongyang Xie, Nasir Ghani, Qing Liu, Wei Wennie Shu, Ashwin Gumaste, Yan Qiao, Min-You Wu:

Multi-Point Ethernet over Next-Generation SONET/SDH. 1-6
Poster Session
- Mingbo Niu, Julian Cheng, Jonathan F. Holzman, Liz McPhail:

Performance Analysis of Coherent Free Space Optical Communication Systems with K-Distributed Turbulence. 1-5 - Shigeo Urushidani, Kensuke Fukuda, Yusheng Ji, Michihiro Koibuchi, Shunji Abe, Motonori Nakamura, Shigeki Yamada, Kaori Shimizu, Rie Hayashi, Ichiro Inoue, Kohei Shiomoto

:
Implementation and Evaluation of Layer-1 Bandwidth-on-Demand Capabilities in SINET3. 1-6 - Liang Chen, Brian S. Krongold, Jamie S. Evans

:
Performance Evaluation of Optical OFDM Systems with Nonlinear Clipping Distortion. 1-5 - Chieh-Hung Hsieh, Guu-chang Yang

, Cheng-Yuan Chang, Wing C. Kwong:
Constructions on 2D Wavelength-Time Codes for CDMA Fiber-Optic Systems. 1-5 - Wenzhe Zhang, Steve Hranilovic:

Short-Length Raptor Codes for Mobile Free-Space Optical Channels. 1-5 - Mikaël Morelle, Stephanie Sahuguede, Anne Julien-Vergonjanne, Jean-Pierre Cances:

Theoretical Performance of Multi-Weight Spreading Codes for Multimedia Optical Access Network. 1-5 - Tamer Khattab

, Maged Elkashlan, Hussein M. Alnuweiri:
Chip-Level Modulated BPPM Fiber-Optic Code Division Multiple Access. 1-6 - Jude Akpuh, John Doucette:

Designing Demand-Wise Shared Protection Networks with Specified Minimum Dual-Failure Restorability. 1-6 - Kostas Tsagkaris

, Nikolaos D. Tselikas
, Nikos Pleros
:
A Handover Scheme Based on Moving Extended Cells for 60 GHz Radio-Over-Fiber Networks. 1-5 - Yi Zhu, Ankitkumar N. Patel, Jason P. Jue:

A Novel Graph Model for Dynamic Multicast Flow Aggregation in Optical Networks. 1-5 - Lehan Meng, Chadi Assi, Martin Maier, Ahmad R. Dhaini

:
Resource Management in Stargate-Based Ethernet Passive Optical Networks (SG-EPONs). 1-5 - Nestor D. Chatzidiamantis

, Murat Uysal
, Theodoros A. Tsiftsis, George K. Karagiannidis
:
EM-Based Maximum-Likelihood Sequence Detection for MIMO Optical Wireless Systems. 1-5 - Fuad E. Alsaadi, Jaafar M. H. Elmirghani

:
Adaptive 2.5 Gbit/s Optical Wireless Systems Employing a Two Dimensional Beam Clustering Method and Imaging Diversity Receivers. 1-8 - Dexiang Wang, Arvindhan Kumar, Madhan Sivakumar, Janise McNair:

A Fault-Tolerant Backbone Network Architecture Targeting Time-Critical Communication for Avionic WDM LANs. 1-5 - Taiming Feng, Lu Ruan:

Design of Survivable Hybrid Wireless-Optical Broadband-Access Network. 1-5 - Zeyu Zheng, Jianping Wang

, Jin Wang:
A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications. 1-6
Optical Switching
- T. Venkatesh, Y. V. Kiran, C. Siva Ram Murthy:

Joint Path and Wavelength Selection Using Q-learning in Optical Burst Switching Networks. 1-5 - Guy E. Weichenberg, Vincent W. S. Chan, Muriel Médard:

Performance Analysis of Optical Flow Switching. 1-6 - Xiaolong Yang, Yunfeng Peng, Keping Long, Fenfen Dong, Sheng Huang, Xiaolin Duan:

VB-Rescheduling: An Efficient Data Channel Rescheduling Algorithm Based on Virtual Burst for OBS Networks. 1-5 - Y. V. Kiran, T. Venkatesh, C. Siva Ram Murthy:

A Multi-Agent Reinforcement Learning Approach to Path Selection in Optical Burst Switching Networks. 1-5 - Arush Gadkar, Suresh Subramaniam

:
Optimal FDL Design for Time-Wavelength Crossconnects and Optical Packet Switches. 1-5
Routing and Wavelength Assignment
- Demetris Monoyios, Kyriakos Vlachos, Marianna Angelou, Ioannis Tomkos

:
On the Use of Multi-Objective Optimization Algorithms for Solving the Impairment Aware-RWA Problem. 1-6 - Kostas Christodoulopoulos

, Konstantinos Manousakis
, Emmanouel A. Varvarigos
, Marianna Angelou, Ioannis Tomkos
:
A Multicost Approach to Online Impairment-Aware RWA. 1-6 - Subir Bandyopadhyay, Quazi Rahman, Sujogya Banerjee, Sudheendra Murthy, Arunabha Sen:

Dynamic Lightpath Allocation in Translucent WDM Optical Networks. 1-6 - Diego Lucerna, Andrea Baruffaldi, Massimo Tornatore

, Achille Pattavina:
On the Efficiency of Dynamic Routing of Connections with Known Duration. 1-6 - Lei Wang, Jie Zhang, Guanjun Gao, Xiuzhong Chen, Xue Chen, Wanyi Gu:

Noise-Aware Wavelength Assignment for Wavelength Switched Optical Networks. 1-6
Resource Allocation
- James Yiming Zhang, Jing Wu, Gregor von Bochmann, Michel Savoie:

Resource Criticality Analysis of Static Resource Allocations in WDM Networks. 1-5 - Daojun Xue, Yang Qin, Chee Kheong Siew:

Deterministic QoS Provisioning with Network Calculus Based Admission Control in WDM EPON Networks. 1-6 - Vaidhehi Lakshmiraman, Byrav Ramamurthy:

Joint Computing and Network Resource Scheduling in a Lambda Grid Network. 1-5 - Hassan Zeineddine

, Gregor von Bochmann:
A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks. 1-6 - Ming Xia, Charles U. Martel, Massimo Tornatore

, Biswanath Mukherjee:
Service Cluster: A New Framework for SLA-Oriented Provisioning in WDM Mesh Networks. 1-5
Traffic Grooming and Resource Management
- Mete Yilmaz, Nirwan Ansari

, Jung-Hong Kao, Pinar Yilmaz:
Active Queue Management for MAC Client Implementation of Resilient Packet Rings. 1-5 - Kevin Corcoran, Seth R. Flaxman, Mark Neyer, Peter Scherpelz

, Craig Weidert, Ran Libeskind-Hadas:
Approximation Algorithms for Traffic Grooming in WDM Rings. 1-6 - Ashwin Gumaste, Jianping Wang

, Abhay Karandikar, Nasir Ghani:
MultiHop Light-Trails (MLT) - A Solution to Extended Metro Networks. 1-6 - André C. Drummond

, Nelson L. S. da Fonseca
:
On-Line Dynamic Traffic Grooming Algorithms for WDM Mesh Networks. 1-5 - Yao-Tang Chang, Jen-Fa Huang, Li-Wei Chou, Kuan-Ju Wang:

Waveguide-Grating-Routers-Based Realization of Time-Spreading and Wavelength-Group-Hopping over Fiber-to-the-Home Networks. 1-5
Traffic Control Mechanisms
- Qiang Fu

:
Delay-Based Congestion Avoidance for QoS Provisioning in Wired/Wireless Networks. 1-6 - Zhongbo Li, Stefan Bruhn, Shenghui Zhao, Jingming Kuang:

Analytical and Experimental Comparison of Packet Loss Recovery Methods Based on AMR-WB for VoIP. 1-6 - Zvi Rosberg, Craig Russell, Vijay Sivaraman:

Rate and End-to-End Delay Control for Multicast and Unicast Flows. 1-6 - Rade Stanojevic, Robert Shorten:

Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control. 1-6 - Shuntaro Kashihara, Masanori Miyazawa, Kenichi Ogaki, Tomohiro Otani:

Proposal of the Architecture of a QoS Assured Network by Cooperating between IP Flow Control and MPLS DiffServ-TE. 1-6
Resource Allocation and Scheduling
- Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos:

Cost and Target-Based Scheduling for Switch Power Control. 1-6 - Zhangyu Guan, Dongfeng Yuan, Haixia Zhang:

Co-Opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation. 1-5 - Feng She, Wen Chen, Hanwen Luo, Tingshan Huang, Xinbing Wang:

Joint Power Allocation and Scheduling of Multi-Antenna OFDM System in Broadcast Channel. 1-5 - Xian Liu:

Capacity Allocation for Long Tailed Traffic in Packet Switching Networks. 1-5
Traffic Engineering
- Frank Lehrieder, Michael Menth:

Marking Conversion for Pre-Congestion Notification. 1-6 - Federico Larroca

, Jean-Louis Rougier:
Routing Games for Traffic Engineering. 1-6 - Junni Zou, Hongkai Xiong, Li Song, Zhihai He, Tsuhan Chen

:
Prioritized Flow Optimization with Generalized Routing for Scalable Multirate Multicasting. 1-6 - Ronghui Hou, King-Shan Lui, Ka-Cheong Leung, Fred Baker:

Approximation Algorithm for QoS Routing with Multiple Additive Constraints. 1-5
QoS in Emerging Wireless Networks
- Dzmitry Kliazovich, Nadhir Ben Halima

, Fabrizio Granelli
:
Context-Aware Receiver-Driven Retransmission Control in Wireless Local Area Networks. 1-5 - Jarmo Prokkola, Pekka H. J. Perälä, Mikko Hanski, Esa Piri:

3G/HSPA Performance in Live Networks from the End User Perspective. 1-6 - Pengbo Si, F. Richard Yu

, Hong Ji, Victor C. M. Leung
:
Distributed Multi-Source Transmission in Wireless Mobile Peer-to-Peer Networks: A Restless Bandit Approach. 1-5 - Asiya Khan

, Lingfen Sun
, Emmanuel C. Ifeachor:
Content Clustering Based Video Quality Prediction Model for MPEG4 Video Streaming over Wireless Networks. 1-5 - Pejman Goudarzi, Mehdi Hosseinpour:

Optimal Rate Allocation for Loss Sensitive Applications in Wireless Ad Hoc Networks. 1-5
QoS Analysis and Control
- Paolo Giacomazzi, Gabriella Saddemi:

End-to-End Delay Approximation in Cascades of Generalized Processor Sharing Schedulers. 1-6 - Dominique Barth, Thierry Mautor, Daniel Villa Monteiro:

Impact of Alliances on End-to-End QoS Satisfaction in an Interdomain Network. 1-6 - Thomas Holleczek, Verena Venus, Susanne Naegele-Jackson:

Statistical Analysis of IP Delay Measurements as a Basis for Network Alert Systems. 1-6 - Sebastian Möller, Marcel Wältermann, Blazej Lewcio, Niklas Kirschnick, Pablo Vidales:

Speech Quality While Roaming in Next Generation Networks. 1-5 - Yong-Jin Lee

, Mohammed Atiquzzaman
:
Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment. 1-5
Network Design and Control
- Jerzy Domzal

, Andrzej Jajszczyk
:
Approximate Flow-Aware Networking. 1-6 - Noriaki Kamiyama:

Efficiently Constructing Candidate Set for Network Topology Design. 1-6 - Daisuke Satoh, Kyoko Ashitagawa:

SIP Network Design to Prevent Congestion Caused by Disaster. 1-6 - Erwu Liu

, Qinqing Zhang, Kin K. Leung:
Theoretical Analysis of Selective Relaying, Cooperative Multi-Hop Networks with Fairness Constraints. 1-5 - Zlatka Avramova, Sabine Wittevrongel, Herwig Bruneel, Danny De Vleeschauwer

:
Dimensioning of a Multi-Rate Network Transporting Variable Bit Rate TV Channels. 1-6
QoS for Emerging Video Services
- Zhijia Chen, Bo Li, Gabriel Yik Keung, Hao Yin, Chuang Lin, Yuanzhuo Wang:

How Scalable Could P2P Live Media Streaming System Be with the Stringent Time Constraint? 1-5 - Ashfiqua T. Connie, Yaser P. Fallah, Panos Nasiopoulos, Victor C. M. Leung

:
Efficient Utilization of Error Protection Techniques for Transmission of Data-Partitioned H.264 Video in a Capacity Constrained Network. 1-5 - Lydia Yiyu Chen, Michela Meo

, Alessandra Scicchitano:
Caching Video Contents in IPTV Systems with Hierarchical Architecture. 1-6 - Richard MacKenzie, David Hands, Timothy O'Farrell

:
QoS of Video Delivered over 802.11e WLANs. 1-5 - Yanfeng Zhang, Cuirong Wang, Yuan Gao:

Weighted Size-Aware Packet Distribution for Multipath Live Streaming. 1-5
Communications QoS, Reliability, and Performance Modeling
- Christian Facchini, Fabrizio Granelli

:
Game Theory As a Tool for Modeling Cross-Layer Interactions. 1-5 - Francesco Paolucci, Luca Valcarenghi

, Piero Castoldi, Filippo Cugini:
A Recursive Distributed Topology Discovery Service for Network-Aware Grid Clients. 1-6 - Suleyman Uludag

, Ziyneti Elif Uludag, Klara Nahrstedt, King-Shan Lui, Fred Baker:
A Laplace Transform-Based Method to Stochastic Path Finding. 1-5 - Craig Smith, Ashraf Matrawy:

A Behaviour Study of Network-Aware Stealthy Worms. 1-5 - Junfeng Xie, Edward Chan, Guihai Chen

, Yang Guo:
Push Popular Segments in P2P VoD System: Possibility and Design. 1-5 - Mikhail A. Marchenko, Davide Adami

, Christian Callegari
, Stefano Giordano
, Michele Pagano
:
Design and Deployment of a Network-Aware Grid for e-Science Applications. 1-5 - Yan Cai, Y. Sinan Hanay

, Tilman Wolf
:
Practical Packet Pacing in Small-Buffer Networks. 1-6 - Zhengang Pan, Yiqing Zhou

, Chih-Lin I:
Bit-Wise Exponential ESM (BE-ESM) Method for Accurate Link Level Performance Evaluation. 1-5 - Muneyoshi Suzuki, Katsuya Minami:

Concurrent Heap-Based Network Sort Engine - Toward Enabling Massive and High Speed Per-Flow Queuing. 1-6 - Wai-Kit Sze, Wing Cheong Lau, On-Ching Yue:

Fast RFID Counting under Unreliable Radio Channels. 1-5 - Hans-Peter Löb, Christian Sauer:

A Modular Reference Application for IEEE 802.11n Wireless LAN MACs. 1-5 - Mark E. Snyder, Ravi Sundaram, Mayur Thakur:

Preprocessing DNS Log Data for Effective Data Mining. 1-5 - Peng Xiao, Zhigang Hu:

Deadline-Guarantee-Enhanced Co-Allocation for Parameter Sweep Application in Grid. 1-5 - Joachim Fabini, Lukas Wallentin, Peter Reichl:

The Importance of Being Really Random: Methodological Aspects of IP-Layer 2G and 3G Network Delay Assessment. 1-6 - Abdelhanin Filali, Abdelhakim Senhaji Hafid, Michel Gendreau:

Bandwidth and Computing Resources Provisioning for Grid Applications and Services. 1-6
Network Survivability
- Ananya Das, Charles U. Martel, Biswanath Mukherjee:

A Partial-Protection Approach Using Multipath Provisioning. 1-5 - Bo Sun, Zhenghao Zhang:

Probabilistic Diagnosis of Link Loss Using End-to-End Path Measurements and Maximum Likelihood Estimation. 1-5 - Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat

, Inderpreet Singh, Bhuvnesh Bhambhani, Raghu Agarwal:
On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks. 1-5 - Pawel Rózycki

, Janusz Korniak, Andrzej Jajszczyk
:
GMPLS Network Reliability Enhancement by Using the Dominating Nodes Approach. 1-5 - Andrea Di Pietro, Domenico Ficara, Stefano Giordano

, Francesco Oppedisano, Gregorio Procissi
, Fabio Vitucci:
Merging Spanning Trees in Tomographic Network Topology Discovery. 1-5
Network Modeling and Simulation Tools
- Ting Li, Jason Liu

:
A Fluid Background Traffic Model. 1-6 - Elias Weingärtner, Hendrik vom Lehn, Klaus Wehrle

:
A Performance Comparison of Recent Network Simulators. 1-5 - Qiuhui Li, John Chi-Shing Lui:

On Modeling Clustering Indexes of BT-Like Systems. 1-6 - Davide Adami

, Christian Callegari
, Stefano Giordano
, Michele Pagano
:
A New NS2 Module for the Simulation of MPLS Networks with Point-to-Multipoint LSP Support. 1-5 - Xiaolong Jin, Geyong Min, Lan Wang:

A Comprehensive Analytical Model for Weighted Fair Queuing under Multi-Class Self-Similar Traffic. 1-5
Blind and semi-blind algorithms
- Rodrigue Imad

, Sébastien Houcke, Christophe Jégo:
Blind Frame Synchronization of Product Codes Based on the Adaptation of the Parity Check Matrix. 1-5 - Abla Kammoun, Karim Abed-Meraim, Sofiène Affes:

An Efficient Regularized Semi-Blind Estimator. 1-5 - Mikael Sørensen, Pierre Comon, Sylvie Icart, Luc Deneire

:
PARAFAC2 Receivers for Orthogonal Space-Time Block Codes. 1-5 - César A. Medina, Tiago T. V. Vinhoza

, Raimundo Sampaio Neto
:
A Blind Channel Estimation Algorithm for Space-Time Coded MC-CDMA Receivers. 1-6 - Carlos Estêvão R. Fernandes, Gérard Favier, João Cesar M. Mota:

Blind Multipath MIMO Channel Parameter Estimation Using the Parafac Decomposition. 1-5
FPGA-based implementations
- Jie Liu, Yuriy V. Zakharov

:
FPGA Implementation of RLS Adaptive Filter Using Dichotomous Coordinate Descent Iterations. 1-5 - Zhi Quan, Jie Liu, Yuriy V. Zakharov

:
FPGA Design of Box-Constrained MIMO Detector. 1-5 - C.-Y. Hsu, Stevan M. Berber:

Prototyping of a Pass-Band Chaos-Based CDMA System in FPGA Technology. 1-6 - Mohamed S. Khairy, Mohamed M. Abdallah

, Serag E.-D. Habib:
Efficient FPGA Implementation of MIMO Decoder for Mobile WiMAX System. 1-5 - Hiroyuki Kitagawa

, Makoto Tanahashi, Hideki Ochiai
:
FPGA Implementation of Trellis Shaping to Control Peak Power for PSK Signals. 1-5
Synchronisation algorithms
- Jordi Vilà-Valls, Jean-Marc Brossier, Laurent Ros:

Extended Kalman Filter for Oversampled Dynamical Phase Offset Estimation. 1-5 - Jianxiao Yang, Benoit Geller

, Cédric Herzet, Jean-Marc Brossier:
Smoothing PLLs for QAM Dynamical Phase Estimation. 1-5 - Amin Emad, Norman C. Beaulieu:

Mean Time to Loss of Lock and Average Switching Rate of an Automatic Frequency Control Loop with an Interferer and Noise in a Fading Channel. 1-6 - Ronghong Mo, Ser Wah Oh, Yonghong Zeng

:
Time and Frequency Synchronization for Power Line OFDM Systems with Colored Noise. 1-5 - Xiang Nian Zeng, Ali Ghrayeb

:
CFO Estimation Schemes for Differential OFDM Systems. 1-5
Performance analysis
- Keyvan Zarifi, Sofiène Affes, Ali Ghrayeb

:
Asymptotic Analysis and Design of Multiuser Cooperative DS-CDMA Systems. 1-6 - Giuseppa Alfano

, Carla-Fabiana Chiasserini
, Alessandro Nordio
, Antonia M. Tulino
:
Asymptotics of Multi-Fold Vandermonde Matriceswith Applications to Communications and Radar Problems. 1-5 - Lin-Kai Chiu, Sau-Hsuan Wu:

The Modified Bayesian Cramer-Rao Bound for MIMO Channel Tracking. 1-5 - Francesco Benedetto

, Gaetano Giunta
, Luc Vandendorpe:
On the Performance Improvements of Max-SINR Equalizers in Wireless Communications. 1-5 - Achraf Mallat

, Claude Oestges, Luc Vandendorpe:
CRBs for UWB Multipath Channel Estimation: Impact of the Overlapping Between the MPCs on MPC Gain and TOA Estimation. 1-6
Beamforming
- Tomohiko Taniguchi, Nordin Bin Ramli

, Yoshio Karasawa:
Subband Adaptive Array with Reduced Pilot Signal Using Maximal Ratio Combining Scheme. 1-6 - Veria Havary-Nassab, Shahram Shahbazpanahi

, Ali Grami:
General-Rank Beamforming for Multi-Antenna Relaying Schemes. 1-5 - Søren Skovgaard Christensen, Rajiv Agarwal, Elisabeth de Carvalho, John M. Cioffi:

Weighted Sum-Rate Maximization Using Weighted MMSE for MIMO-BC Beamforming Design. 1-6 - Daniel Benevides da Costa

, Sonia Aïssa:
Beamforming in Dual-Hop Fixed Gain Relaying Systems. 1-5 - Duy H. N. Nguyen, Ha H. Nguyen, Hoang Duong Tuan:

Distributed Beamforming in Relay-Assisted Multiuser Communications. 1-5
OFDM and MIMO
- Abolfazl Ghassemi, T. Aaron Gulliver:

A Simplified Suboptimal Algorithm for Tone Reservation OFDM. 1-5 - Luc Vandendorpe, Jérôme Louveaux, Onur Oguz

, Abdellatif Zaidi:
Power Allocation for Improved DF Relayed OFDM Transmission: The Individual Power Constraint Case. 1-6 - Mai Abdelhakim

, Mohammed H. Nafie
, Ahmed F. Shalash, Ayman Elezabi:
Adaptive Puncturing for Coded OFDMA Systems. 1-5 - Yen-Cheng Liu, Kuhn-Chang Lin, Yu T. Su

:
Initial Synchronization for Multi-Cell OFDMA Systems. 1-5 - Hisham A. Mahmoud, Hüseyin Arslan

, Mehmet Kemal Özdemir, Francis E. Retnasothie:
IQ Imbalance Correction for OFDMA Uplink Systems. 1-5 - Ernest Kurniawan, A. S. Madhukumar

, Francois P. S. Chin:
Low Complexity Antenna Selection Scheme for Multiuser MIMO Broadcast Systems. 1-5 - Eduardo Lopez-Estraviz, Valéry Ramon, André Bourdoux, Liesbet Van der Perre

:
Symbol Based Search Space Constraining for Complexity/Performance Scalable Near ML Detection in Spatial Multiplexing MIMO OFDM Systems. 1-6 - Sheetal Kalyani

, Krishnamurthy Giridhar:
Low Complexity Decision Directed Channel Tracking for High Mobility OFDM Systems. 1-5 - Gen Li, Ying Wang, Tong Wu, Jing Huang:

Joint Linear Filter Design in Multi-User Non-Regenerative MIMO-Relay Systems. 1-6 - The-Hanh Pham, Ying-Chang Liang

, Arumugam Nallanathan
, Hari Krishna Garg:
Iterative Receiver for Multi-Input Multi-Output (MIMO) Two-Way Wireless Relay Systems. 1-5 - M. R. Raghavendra, Markku J. Juntti

, Markus Myllylä:
Co-Channel Interference Mitigation for 3G LTE MIMO-OFDM Systems. 1-5 - Wen Xu, Christian Schroeder, Peter Adam Hoeher:

A Stochastic MIMO Model for Far-End Crosstalk in VDSL Cable Binders. 1-5
Implementation and platforms
- Jianwen Chen, Qing Wang, Zhenbo Zhu, Yonghua Lin:

An Efficient Software Radio Framework for WiMAX Physical Layer on Cell Multicore Platform. 1-4 - Ritesh Rajore, S. K. Nandy, H. S. Jamadagni:

Architecture of Run-Time Reconfigurable Channel Decoder. 1-6 - Min Li, David Novo, Bruno Bougard, Claude Desset, Antoine Dejonghe, Liesbet Van der Perre

, Francky Catthoor:
A System Level Algorithmic Approach toward Energy-Aware SDR Baseband Implementations. 1-6 - Luis G. Barbero, David L. Milliner, Tharmalingam Ratnarajah, John R. Barry, Colin Cowan:

Rapid Prototyping of Clarkson's Lattice Reduction for MIMO Detection. 1-5 - Jian Qi, Sonia Aïssa:

On the Effect of Power Amplifier Nonlinearity on MIMO Transmit Diversity Systems. 1-5
Precoding-related algorithms
- Christos Masouros, Emad Alsusa

:
A Hybrid MC-CDMA Precoding Scheme Employing Code Hopping and Partial Beamforming. 1-5 - Christos Masouros, Emad Alsusa:

Selective Channel Inversion Precoding for the Downlink of MIMO Wireless Systems. 1-5 - Jaehyun Park, Joohwan Chun, Haesun Park:

Efficient GSVD Based Multi-User MIMO Linear Precoding and Antenna Selection Scheme. 1-6 - Eckhard Ohlmer, Gerhard P. Fettweis:

Link Adaptation in Linearly Precoded Closed-Loop MIMO-OFDM Systems with Linear Receivers. 1-6 - Johannes Brehmer, Wolfgang Utschick

:
Utility Maximization in the Multi-User MISO Downlink with Linear Precoding. 1
Theoretical and implementation topics
- Hufei Zhu, Wen Chen, Feng She:

Improved Fast Recursive Algorithms for V-BLAST and G-STBC with Novel Efficient Matrix Inversion. 1-5 - Lok Tiing Tie, Ser Wah Oh, Karen J. M. Kua:

Efficient Implementation of Binary Sequence Generator for WiMAX and WRAN on Programmable Digital Signal Processor. 1-5 - James E. Hicks, Tim Meehan, Frank Kragh:

Maximum a Posteriori Bit-Unstuffing. 1-6 - Thomas Ussmüller, Robert Weigel, Ralf Eickhoff:

Highly Integrated Fractional-n Synthesizer for Locatable Wireless Sensor Nodes. 1-5 - Ali-Azam Abbasfar:

Generalized Differential Vector Signaling. 1-5 - Hui Lv, Hongkai Xiong

, Li Song, Zhihai He, Tsuhan Chen
:
Graph Matching Based Side Information Generation for Distributed Multi-View Video Coding. 1-6 - Ghaya Rekaya-Ben Othman, Laura Luzzi, Jean-Claude Belfiore:

Algebraic Reduction for the Golden Code. 1-5 - Tadahiko Kimoto:

An Advanced Method for Watermarking Digital Signals in Bit-Plane Structure. 1-5 - Duc-Minh Pham, A. Benjamin Premkumar, A. S. Madhukumar

:
Efficient Sample Rate Conversion in Software Radio Employing Folding Number System. 1-5 - Shakti Prasad Shenoy, Irfan Ghauri, Dirk T. M. Slock:

Multiuser Extensions for Closed Loop Transmit Diversity in HSDPA. 1-5 - Issam Wahibi, Meryem Ouzzif, Jérôme Le Masson, Samir Saoudi

:
Crosstalk Cancellation in Upstream Coordinated DSL Using an Iterative MMSE Receiver. 1-5 - Jérôme Louveaux, Ali Kalakech, Mamoun Guenach, Jochen Maes, Michaël Peeters

, Luc Vandendorpe:
An SNR-Assisted Crosstalk Channel Estimation Technique. 1-5 - Duy H. N. Nguyen, Ha H. Nguyen:

Channel Estimation and Performance of Mismatched Decoding in Wireless Relay Networks. 1-6
Iterative receivers and sequential methods
- Kyungchun Lee, Lajos Hanzo

:
Iterative Detection and Decoding for Hard-Decision Forwarding Aided Cooperative Spatial Multiplexing. 1-5 - Niamh O'Mahony

, Cillian O'Driscoll
, Colin C. Murphy:
Performance of Sequential Probability Ratio Test for GPS Acquisition. 1-6 - Emna Eitel, Rana H. Ahmed Salem, Joachim Speidel:

Improved Decision-Directed Recursive Least Squares MIMO Channel Tracking. 1-5 - Salam Akoum, Ronghui Peng, Rong-Rong Chen, Behrouz Farhang-Boroujeny

:
Markov Chain Monte Carlo Detection Methods for High SNR Regimes. 1-5 - Pei Xiao, Mathini Sellathurai

:
Iterative Receiver Design for MIMO Systems with Improper Signal Constellations. 1-5
Equalisation
- Peiman Amini, Behrouz Farhang-Boroujeny

:
Per-Tone Equalizer Design and Analysis of Filtered Multitone Communication Systems over Time-Varying Frequency-Selective Channels. 1-5 - Mohamed Musbah, Xu Zhu

:
Low-Complexity Equalization Based on Least Squares Support Vector Classifiers for DS-UWB Systems. 1-5 - Chia-Peng Chou, Chien-Hsing Wu, Tsung-Hsien Liu, Yin-Tsung Hwang:

Space-Frequency-Coded MIMO OFDM Receivers Based on Gaussian Message Passing. 1-4 - Ian Y. Chen, Woon Hau Chin:

Channel Spectral Flattening in Time Domain Equalizer Design for OFDM Systems. 1-5 - Hossein Zamiri-Jafarian, Morteza Rajabzadeh:

SVD-Based Receiver for Downlink MIMO MC-CDMA Systems. 1-5
Channel Estimation
- Maduranga Liyanage, Iwao Sasase:

Steady-State Kalman Filtering for Channel Estimation in OFDM Systems Utilizing SNR. 1-6 - Bin Jiang, Feifei Gao, Xiqi Gao

, Arumugam Nallanathan
:
Channel Estimation for Amplify-and-Forward Two-Way Relay Network with Power Allocation. 1-5 - Olutayo Oyeyemi Oyerinde

, Stanley H. Mneney:
Decision Directed Channel Estimation for OFDM Systems Employing Fast Data Projection Method Algorithm. 1-5 - Bayarpurev Mongol, Takaya Yamazato

, Masaaki Katayama
:
Channel Estimation and Tracking Schemes for the Pulse-Shaping OFDM Systems. 1-5 - Carles Navarro i Manchon

, Bernard H. Fleury, Gunvor Elisabeth Kirkelund, Preben E. Mogensen, Luc Deneire
, Troels B. Sørensen
, Christian Rom:
Channel Estimation Based on Divergence Minimization for OFDM Systems with Co-Channel Interference. 1-6
Detection and decoding
- Qasim Zeeshan Ahmed

, Lie-Liang Yang, Sheng Chen
:
Reduced-Rank Adaptive Least Bit Error-Rate Detection in Hybrid Direct-Sequence Time-Hopping Ultrawide Bandwidth Systems. 1-5 - Björn Mennenga, Andreas von Borany, Gerhard P. Fettweis:

Complexity Reduced Soft-In Soft-Out Sphere Detection Based on Search Tuples. 1-6 - Tinoosh Mohsenin, Dean Truong, Bevan M. Baas:

An Improved Split-Row Threshold Decoding Algorithm for LDPC Codes. 1-5 - Olusegun O. Odejide, Cajetan M. Akujuobi, Annamalai Annamalai, Gerald L. Fudge

:
Application of Analytic Wavelet Transform for Signal Detection in Nyquist Folding Analog-to-Information Receiver. 1-5 - Marnix Heskamp, Cornelis H. Slump:

Sub-Noise Primary User Detection by Cross-Correlation. 1-6
Optimisation
- Wang Yao, Sheng Chen

, Shuang Tan, Lajos Hanzo
:
Particle Swarm Optimisation Aided Minimum Bit Error Rate Multiuser Transmission. 1-5 - Eduard A. Jorswieck

, Rami Mochaourab
, Martin Mittelbach:
Effective Capacity Maximization in Multi-Antenna Channels with Covariance Feedback. 1-5 - Hao Zou, Aakanksha Chowdhery, Sumanth Jagannathan, John M. Cioffi, Jérôme Le Masson:

Multi-User Joint Subchannel and Power Resource-Allocation for Powerline Relay Networks. 1-5 - Javier Vía

, Victor Elvira
, Ignacio Santamaría
, Ralf Eickhoff:
Analog Antenna Combining for Maximum Capacity Under OFDM Transmissions. 1-5 - Christian Guthy, Wolfgang Utschick

, Guido Dietl:
A User Grouping Method for Maximum Weighted Sum Capacity Gain. 1-5
Situation Management
- Qilian Liang:

Situation Understanding Based on Heterogeneous Sensor Networks and Human-Inspired Favor Weak Fuzzy Logic System. 1-5 - John F. Buford, Xiaotao Wu, Venkatesh Krishnaswamy:

Spatial-Temporal Event Correlation. 1-6 - Chao Chen

, Carlos A. Pomalaza-Raez
, M. Colone, Robert Martin, Jim Isaacs:
Modeling of a Public Safety Communication System for Emergency Response. 1-5 - Kellyn Rein, Ulrich Schade, Michael R. Hieb:

Battle Management Language (BML) As an Enabler. 1-5 - Denis Garagic, Bradley J. Rhodes, Neil A. Bomberger, Majid Zandipour:

Adaptive Mixture-Based Neural Network Approach for Higher-Level Fusion and Automated Behavior Monitoring. 1-6
Data Storage
- Satoru Higashino, Shoei Kobayashi, Tamotsu Yamagami:

Matched Spectral-Null Code with Run-Length Limitation for Optical Recording Channels. 1-5 - Thomas Mittelholzer, Michele Franceschini, Luis Alfonso Lastras-Montaño, Ibrahim M. Elfadel

, Mayank Sharma:
Rewritable Channels With Data-Dependent Noise. 1-6 - Rathnakumar Radhakrishnan, Bane Vasic:

Joint Message-Passing Symbol-Decoding of LDPC Coded Signals over Partial-Response Channels. 1-5 - Haralampos Pozidis, Giovanni Cherubini:

Probabilistic Data Detection for Probe-Based Storage Channels in the Presence of Jitter. 1-6 - Gabi Sarkis, Shie Mannor

, Warren J. Gross:
Stochastic Decoding of LDPC Codes over GF(q). 1-5
Networked Services
- Aakanksha Chowdhery, Sumanth Jagannathan, John M. Cioffi, Meryem Ouzzif:

A Polite Cross-Layer Protocol for Contention-Based Home Power-Line Communications. 1-6 - Eric Karmouch, Amiya Nayak

:
A Distributed Protocol for Virtual Device Composition in Mobile Ad Hoc Networks. 1-6 - Jochen Maes, Mamoun Guenach, Michaël Peeters

:
Statistical MIMO Channel Model for Gain Quantification of DSL Crosstalk Mitigation Techniques. 1-5 - Azzedine Boukerche, Raed Jarrar, Richard Werner Nelem Pazzi

:
A Novel Interactive Streaming Protocol for Image-Based 3D Virtual Environment Navigation. 1-6 - Mubashar Mushtaq, Toufik Ahmed

:
End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control. 1-5
Vehicular Communications and Networks
- Xiang-yu Bai, Xinming Ye, Jun Li, Hai Jiang:

VLS: A Map-Based Vehicle Location Service for City Environments. 1-5 - Joo-Han Song, Vincent W. S. Wong

, Victor C. M. Leung
:
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks. 1-6 - Ismail Salhi, Mohamed Oussama Cherif, Sidi-Mohammed Senouci

:
A New Architecture for Data Collection in Vehicular Networks. 1-6 - Azzedine Boukerche, Cristiano G. Rezende, Richard Werner Nelem Pazzi

:
A Link-Reliability-Based Approach to Providing QoS Support for VANETs. 1-5 - Hanan Saleet, Rami Langar, Otman Basir

, Raouf Boutaba:
A Distributed Approach for Location Lookup in Vehicular Ad Hoc Networks. 1-6
Cognitive Networks 1: Spectrum Sensing
- Guodong Zhao

, Ye (Geoffrey) Li, Chenyang Yang, Jun Ma:
Proactive Detection of Spectrum Holes in Cognitive Radio. 1-5 - Bassem Zayen, Aawatif Hayar

, Kimmo Kansanen
:
Blind Spectrum Sensing for Cognitive Radio Based on Signal Space Dimension Estimation. 1-5 - Alan J. Coulson

:
Spectrum Sensing Using Hidden Markov Modeling. 1-6 - Tuncer C. Aysal, Kandeepan Sithamparanathan

, Radoslaw Piesiewicz:
Cooperative Spectrum Sensing with Noisy Hard Decision Transmissions. 1-5 - Jihoon Park, Rajeev Jain, Danijela Cabric

:
Spectrum Sensing Design Framework Based on Cross-Layer Optimization of Detection Efficiency. 1-6
Cognitive Networks 2: Modeling and Security in Dynamic Spectrum Access
- Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi

:
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. 1-5 - Tingting Zhao, Yuping Zhao:

A New Cooperative Detection Technique with Malicious User Suppression. 1-5 - Goce Jakimoski, K. P. Subbalakshmi

:
Towards Secure Spectrum Decision. 1-5 - Chung-Wang Wang, Li-Chun Wang

:
Modeling and Analysis for Proactive-Decision Spectrum Handoff in Cognitive Radio Networks. 1-6 - Matthias Wellens, Janne Riihijärvi, Martin Gordziel, Petri Mähönen:

Spatial Statistics of Spectrum Usage: From Measurements to Spectrum Models. 1-6
Cognitive Networks 3: Spectrum Management and Policy Issues
- Xiangwei Zhou, Jun Ma, Ye (Geoffrey) Li, Young Hoon Kwon, Anthony C. K. Soong:

Probability-Based Combination for Cooperative Spectrum Sensing in Cognitive Radio Networks. 1-5 - Ömer Ileri, Jens Zander:

Broker Coordination in Demand Responsive Dynamic Spectrum Access Settings. 1-6 - Joseph Mitola III:

Cognitive Radio Policy Languages. 1-4 - Nicola Baldo, Tamma Bheemarjuna Reddy

, B. S. Manoj
, Ramesh R. Rao, Michele Zorzi:
A Neural Network Based Cognitive Controller for Dynamic Channel Selection. 1-5 - Armin Banaei, Costas N. Georghiades:

Throughput Analysis of a Randomized Sensing Scheme in Cell-Based Ad-Hoc Cognitive Networks. 1-6
Poster Session: Selected Topics in Communications
- Lionel Gueguen, Berna Sayraç, David Depierre:

Spectogram Reconstruction from Random Sampling: Application to the GSM Band Sensing. 1-5 - Óscar Trullols-Cruces

, Julián David Morillo-Pozo, José M. Barceló
, Jorge García-Vidal:
A Cooperative Vehicular Network Framework. 1-6 - Jing Liang, Qilian Liang:

UWB Radar Sensor Networks Detection of Targets in Foliage Using Short-Time Fourier Transform. 1-5 - Iraj Saniee:

Decentralized Control and Optimization of Networks with QoS-Constrained Services. 1-6 - Viktória Fodor, Ioannis Glaropoulos, Loreto Pescosolido

:
Detecting Low-Power Primary Signals via Distributed Sensing to Support Opportunistic Spectrum Access. 1-6 - Abdur Rahim Biswas, Tuncer C. Aysal, Kandeepan Sithamparanathan

, Dzmitry Kliazovich, Radoslaw Piesiewicz:
Cooperative Shared Spectrum Sensing for Dynamic Cognitive Radio Networks. 1-5 - Hancheng Lu, Feng Wu, Chang Wen Chen:

Stateful Scheduling with Network Coding for Roadside-to-Vehicle Communication. 1-5 - Yonghong Zeng, Ser Wah Oh, Ronghong Mo:

Subcarrier Sensing for Distributed OFDMA in Powerline Communication. 1-5 - Chiara Mingardi, Marcus Brunner:

IPTV Quality of Service Management in Home Networks. 1-5
MIMO I
- Xin Jin, Yubo Yang, Lin Tian, Di Pang, Jinglin Shi, Eryk Dutkiewicz

:
QoS-Aware Optimal Power Allocation with Channel Inversion Regularization Precoding in MU-MIMO. 1-5 - Ahmed Zaki, Saif K. Mohammed, Ananthanarayanan Chockalingam, B. Sundar Rajan:

A Training-Based Iterative Detection/Channel Estimation Scheme for Large Non-Orthogonal STBC MIMO Systems. 1-5 - Jin-Sung Kim, Sung Hyun Moon, Inkyu Lee:

A New Reduced Complexity ML Detection Scheme for MIMO Systems. 1-5 - Mehran Nekuii, Timothy N. Davidson

:
A Semidefinite Relaxation Approach to Efficient Soft Demodulation of MIMO 16-QAM. 1-6 - Shinya Sugiura, Sheng Chen

, Lajos Hanzo
:
Markov Chain Minimum Bit Error Rate Detection for Multi-Functional MIMO Uplink. 1-5
Cooperative Networks I
- Shaolei Ren

, Khaled Ben Letaief
:
Minimum Sum Expected Distortion in Cooperative Networks. 1-5 - Koji Ishii, Koji Ishibashi, Hideki Ochiai

:
A Novel Cooperative Diversity Based on Multilevel Coded Modulation. 1-5 - Toshiaki Koike-Akino

, Petar Popovski
, Vahid Tarokh:
Denoising Strategy for Convolutionally-Coded Bidirectional Relaying. 1-5 - Paul A. Anghel, Mostafa Kaveh:

On the Performance of Selection Cooperation ARQ. 1-6 - Huiming Wang, Xiang-Gen Xia, Qinye Yin, Lin Bai:

A Distributed Linear Convolutive Space-Frequency Coding for Cooperative Communication Systems with Multiple Frequency Offsets. 1-5
Capacity and Performance Analysis
- Mohamad Charafeddine, Zhu Han, Arogyaswami Paulraj, John M. Cioffi:

Crystallized Rates Region of the Interference Channel via Correlated Equilibrium with Interference As Noise. 1-6 - Adeel Razi

, Daniel J. Ryan, Iain B. Collings
, Jinhong Yuan
:
Sum Rates and User Scheduling for Multi-User MIMO Vector Perturbation Precoding. 1-5 - Felix Brah, Luc Vandendorpe:

Constrained Ergodic Rates Maximization for Mobile WiMAX with Statistical Channel Information. 1-5 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID